Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 03:15
Static task
static1
Behavioral task
behavioral1
Sample
3daea750de822eab5cbb67ba0e3621ef_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3daea750de822eab5cbb67ba0e3621ef_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3daea750de822eab5cbb67ba0e3621ef_JaffaCakes118.html
-
Size
445KB
-
MD5
3daea750de822eab5cbb67ba0e3621ef
-
SHA1
88329e60e8781f717c91fed5afa902b4135d3c73
-
SHA256
b98b460d3c63773b85581989411e3d3ed0a3322043fc51889717d3b7862bd868
-
SHA512
c98841faddd4e6eff75b88fecb37a06ebbd5eaa5da8e7073ea0ab1a94833c81b27f8924bc6c0141837677092e883676ed0f625bb2815588c08dd552afa676bc5
-
SSDEEP
6144:SRsMYod+X3oI+Y/sMYod+X3oI+YzsMYod+X3oI+YLsMYod+X3oI+YQ:i5d+X3x5d+X3Z5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90b1bd1cada5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421818425" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4815B361-11A0-11EF-965F-FA9381F5F0AB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000574366638d9c591acbf56f03ab452dffe7a276a4a6ca66cd192788fa94161d3d000000000e80000000020000200000005b0809d1524236d6d6d6837ed703dd21883fb73ba72551135f5809845f5af54720000000b5e19ed0c6a7c3c5f85ff7ac859a5e404d4f869b34842e5072c7c2d683adde5040000000328ac12aa4e8f6fbf2e93f1a9206d3cb7b5fc6b56f966a41e7276a3743a3a139a8487e77ff4ec1c543b587d5d2de8839e09245d74ad38cee245dc3212797d9f7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2176 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2176 iexplore.exe 2176 iexplore.exe 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE 2216 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2216 2176 iexplore.exe 28 PID 2176 wrote to memory of 2216 2176 iexplore.exe 28 PID 2176 wrote to memory of 2216 2176 iexplore.exe 28 PID 2176 wrote to memory of 2216 2176 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3daea750de822eab5cbb67ba0e3621ef_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2176 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2bfcca481ac06e08c5685b88510c9f0
SHA163935ec1180803b8c03f25e20cfeab22d624cf80
SHA256b53abf24e553d99e4bd3f3fe113966272e9f5267af30aa41218e360650c3b8cb
SHA51216eb19d5824fd66c7f69f9a864a77353fb3a2559ba9191f957b990f0604f5fe64adfd57d08954656e213b2b04896836404fb0d04f632e57574ba61474add217a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e8d760a2b3e0dd016a38571a701e2b7
SHA1dcd6ee031cfb6c5437f04757cc10b47ed1da2cf4
SHA256741caaf0ea6b73162cc5763be52ce302f76e9b96cf6337176f588d403edc5bb3
SHA5126d89d8b079b6670d9eace61bfdc2e4bb0a1174f86e378e83bcb31838bbb6645fcd734e578833be6b3a988db6a8770fe009847bf6f63e1ef422cf707f69966668
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5714e634f6c3b0d309fd46cf916badfe6
SHA1aae679e5fc6a04f80fbf863c9a94e01f8f11a149
SHA256c7d51117a29fccb337d532167e470a1f1a2da89a8b1a5037aeee28e5f681024f
SHA5121afa334a7c1c34bdf751b1370efc41c10e332ab6bc2851d4aa6637c7458e689a25f3f83d1ac0e1796d52baf2f30a7b760bd6e981a11be93f888e3d4b51d43a56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549831a3d03681b255ad12d36d9f62fe9
SHA1d10e23ed82e20f0e1f9ae76e896b956bc75f16e8
SHA256cb84d1e5645c6b971218b62aaf7eadd15885d45d2a2c6e086be57a987465992a
SHA512aa028c703761b88e362a94d81a17c39b4adcf02f1a83f0e02db3b0a00fc2b1bbbe49d7d0e19d588a7bc11b573c6827fb3081fe12e0e040a47b8f03eed767f79f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d128b60d793f007bb341834fe92edd9
SHA1439823034f8b87664a51d8a8e12aa883353be2a8
SHA256df01ebe6fcd582f597dea831c457172c7fecad517569c92dd9a53ad27272b139
SHA5127088d84071eae4250db780117afd515bea10f712ab86a9ade2f4041eb8d51a589b489711ea8dea0f34034636c3333d7af9ae79852b5763c961bff7a81fd1ff54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510949aae530de0a132a9301dca7b574a
SHA1fd2e44287e3ea6d13c982557fe3e4c04d76f0724
SHA256cee18b70ca9aff0917dfda2d0af7e93021accf1a59c5d21ef9ea0de24361c670
SHA512c9e44c8dbe09a927e04d9f2efd44b8aeaaa4e44eff8af5f8cb13922341a4f94b818cbd15b13d10f916620f954a7ef4090878e4174dda4f9634827844df589de7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c99b77a76be45eafd36b8761624747d8
SHA1a29991e260f8f8d3ed2400c6a2141ac3275434c6
SHA25623cb8652cc28c6e5535b42b5e785d40dec3446e6d4653f42b5e85e508bcae358
SHA512ee69d99dd6e87aff7df51d627ab7b92c4435fc599256f3f8a9609723da9e986a4a6a6e112a1a4f3b7c980eaafeaf93f500abfe48d951628870e88b2e21b1caed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5ceb6541b73bfa0c021733e03a3a204
SHA1117687194da48852b68e1c827f3e50848432cb7d
SHA25650c3359df8d27633ce6b5998f7f71379eea4fce45f792326db88ab49bcf5747b
SHA51252b09a72db0360fad46f7266421f5336b2412aa136abd9f223cc42ad91ea683a7cc4f7fb3735f087f2e4a51040f9f1650ef2e8eb64026051959c50468029e305
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4c7577d465e1e980b82365b1fdec071
SHA1593abae1afbacac83504c2b8225b0555f4028164
SHA2562691c40b3f46a2e4a0821f7cba8a46f463318f53a06aba7723a0852c487fc2b9
SHA5122f3e42100c0adcc86cae4a8e489a0ef77bd74388d4559522a4e6768a314d1855164cbe72df746324439d3a9886b2d279c931f4543344a4271ccd5134e214d813
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f802936a8091eed6532d743a874bcd4
SHA1ed32890bd2dc86394759c0dee7f9fa496928ef8e
SHA256213bd747a307d960b2da6e5eb3a78ca1dcc19a42731e952db1b06fa9647f9fd9
SHA51219ca1eb0e9312860665af7bcc069aaf9533b6adb0e11847040fe645762c5a0ef7d8caa3404664c5fac92596ca30a256625ed614f52d6b3da2a0ee8c8beb2d2a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587494d04c6ec27dd3619a0401bd0c078
SHA1aa9639681d5d609f8f4e964a518fc9feef87dd4e
SHA2568de4adb7f6c5b5db2efe9fcfad55943e67c700321283b4ad56de78c37c632ac0
SHA512ef25994d8505c1c3e6e5c4a9cafe944022bc25f8e489956492baf55c2437764a72b35981d2d149ce710bcd30f0e5a40f1af6bc24c443c22cc05cf36d2dffb379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55fc2b31efbd9114b0d5d101496f4867d
SHA18387729d23e63a8800fdd80bf340c4a45be87049
SHA256ed3f2e484ff6c08a4c8e0e46abf631fb502f7b3c1d407a59157f51c31275e122
SHA5121305e649ffe9ae3a02e3efb25c1ac0c6f03cf4c61c057df8723f8058fd6e14e07e45d626030e3a2aeb87c8343d3223f149d9b41bde628b28ac347662e3b0989b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f93edc732153f0c57c90dbcd8bf625ca
SHA135b53ca909fd412523633ba8b245103ac6e33512
SHA256e2905649f60b7dc2f6ab04b41cb311542b9f29689401f12525ae0406d1173d10
SHA512ad2da126e2832bc13a25d58d719ca8bd817a314bdd441742286ac66f085b87df3eae50820ef2166a677005b6b24cdf8766a17e60c7bfd4deb4e0ce5a2df9c2eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e130430b559a4d373a913d10b6040fc6
SHA1f720843c34197319a92bb27668c729fe879b053e
SHA2567ba1a7e8eb871dd54ecacd3efbf9a4a17873053a9c9f989ebd729ee38f1b7519
SHA5125a597360cc92369d0006e01222f19b3a303c618c01227a77b42f80afd1be6468e1894eec870f6d2109d55e1ac2d26160076afe1ebf8b913cfb7476a1ea3d145f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd671f88fe82e0a44de34ec2fa2bf1a7
SHA1150adfcf1abc83f0483fd605bf733e8ec65382cc
SHA256353082aaed145239285b171fb21c687acaf82a659cde9b4b7a550a4d760c3cb8
SHA51239bf4ab1f4489f7128d58da15908b89a8c405244f8a06602bdcd07142cbb78e6c2c797fa861dbf35b696f55771dc7aa4ea42858faa58698d1cc58ffb9850a883
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562c1fd97e273392a0a4fe894a7fb932c
SHA11d6c2c6565e9e601920871229abf4cf792e2762d
SHA2560e3205597d1b3a5cf8a7c4d2df84667b11cf87e706bf2b74eb7e6dbc5375092c
SHA512887d0845c8206720cbfde991034ca4d4b588d429f4cc205f5402216893d97c832587058f651c3b12f51320ba2e20bbc6f76d12d266a5eaeab8c1152a53d0918b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53590fba36ba171928a6e5bfb99190411
SHA1e34aa811ac6246ae712145a349125d2ccff3731f
SHA256280944dc117001ec64ecd16a49a29efae384a56ee5fa9a1336cac9909fab1a3a
SHA512a659fefba5b283e76bb759926c8d60b685b526fb1a9be3df5881ddd8b7c48df0d9dddbd8f045d912a7622a310f42f7b9c848a8ba23aaf1b9b4db1e6138a5330d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55edb43e26796528311e9a7076e197c48
SHA18f6fccf8ce7a9728d510ef95f826e794ad6e993f
SHA2560496a04a08dedef18c7a6f9bfedf546755ce845676de9ae8e6ea75d5df97ea30
SHA5127bec704d519c5480fc2ac899dc8c5bbb6093358c5cd168db210379bac79a7361eda0ed8e3ac393f78a7fd575c10fd6fbb7971a7b9f3c373510face6d4850dc9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5099dfd45da08db16da540f8a59629493
SHA1b08336b442e0e76c069ccbaa187918f90f665be1
SHA256662e5ad6c81f3ef8fd0e9ef4afce044e1bfd60b2da5dae5c0aaa127b8f3e0d0f
SHA5123650a3d48fb2eedd6e39cb321b19815e3ff17a08ffc05cc295b436b9ef03c6483682435893c0d0859bdbd0ba2d8913e01edfd053635d464ef1998e439e15d9cb
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a