Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 10:01
Static task
static1
Behavioral task
behavioral1
Sample
4f74aeaf260ce07263ea7d74f35a3105_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4f74aeaf260ce07263ea7d74f35a3105_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4f74aeaf260ce07263ea7d74f35a3105_JaffaCakes118.html
-
Size
461KB
-
MD5
4f74aeaf260ce07263ea7d74f35a3105
-
SHA1
30d5c0c8d59c8d7b59c253bed5c87c4eab60aa7d
-
SHA256
527b8731dcb43980a881e4a20669a355f482fedec8b24a3d2f5f81f8864a3d09
-
SHA512
455fc66f6aed69e7d822f38078cfbecc97331c888e90093e650235218e6b66fb8cea1a99538623600c030a29fd13a4d1c5b50bd74536a59dcf4b072a2dbc45a2
-
SSDEEP
6144:SusMYod+X3oI+YXQhsMYod+X3oI+YmisMYod+X3oI+YLsMYod+X3oI+YQ:55d+X3M5d+X3/5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{76A2AC11-1434-11EF-BADF-D62CE60191A1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422101970" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000b2e315f2b5b921f9b44a10a35a0d9ac01c5c124d460eab9c56b1d522e14beb58000000000e8000000002000020000000a0d93b704ae7335008e17a9b8e1e9ec89e0671018d04e79674bc5a07837b8e972000000065a40e240b30455b8c6f05711081bc1c11a62d59267e18ce996223bd787e552340000000bd72b8a1f0fbb9ebecdf9554f55b53f30ef5a665352f0b0d98d1ec510abe0f0159ebfc77f0eed862d163f92ffc6c512f9459e0e8f3a3c811e639ebc12a5da9a5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 404b2d4f41a8da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1284 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1284 iexplore.exe 1284 iexplore.exe 1996 IEXPLORE.EXE 1996 IEXPLORE.EXE 1996 IEXPLORE.EXE 1996 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1284 wrote to memory of 1996 1284 iexplore.exe 28 PID 1284 wrote to memory of 1996 1284 iexplore.exe 28 PID 1284 wrote to memory of 1996 1284 iexplore.exe 28 PID 1284 wrote to memory of 1996 1284 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4f74aeaf260ce07263ea7d74f35a3105_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1284 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55319e31040cdcb7bb8dd074c45c579af
SHA150b89a570b0268d72f9f07690bc598762493b954
SHA256256a6eec65b929b6645ab6d0d0c5f25b9aa7827a183a4422d0671d756af7d048
SHA512a5a92ced41a0d103906d34f77f43d14d11e3af806ee30f57dfd943b8a66a4836d98470dd556ec80545990523b84dd0bf33e0094b87e2a2f4e37d4d64b155bbd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD534a7863962e542da1627d626e6722346
SHA12df9007754d9b185b5b9cd8093dc0b667b0860ba
SHA2561edd23eee4a5cb5c1eef4018d96d765e826a57295e28001684183b229a3ad229
SHA512428bdf1dfeac3148742c0e88cda5cf39e5c6772246bb8868176252020915dc8f1bbe5f2ffe96a06a1d12f2586680b8a2b64d5b91acac4dab0fa36c61c7ef3ff0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5739dfc634f69f22cded51ef1f1aea62a
SHA1f5b194daf8b6d9a37ace234ee87bfb927bde2ff4
SHA256fdc3c30180eb0f787bfc81e83ee4f5bfcfb89ff09d439ec121acafe856c7a2ce
SHA512f8cebc8c7e61ca93de315a8cce51e0ee86cb01da864e681804b4698548308b51c863c9a8dead8ae372a390aea9519d3651875080b6733a9eac76abe27dd72e60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5069083338695c3fd9cd2881199e93d96
SHA1e599840caa9b010ee42950c57c8a146b7aedfb38
SHA25688c47f8526b0f9c4dea52209113c6337cde3c6ec268e12471da8bc87b9fd1d87
SHA51238f14c26bb88ea7fca3415eb5264dea2f7e5a03ca89bcae5ffc0d4b1f7f3ab8063cb626454cabae8e4804d6620c0473b66fffdd37d85aaa9f26db8e9d07292df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b9140b84ce4f3f22f842c4f572d43be
SHA198571a4736dd5224dda7f86c07cafc34aae6e40b
SHA256a97bf30fc880ba4b18f49c093d9cf69357d6988cb18395f91f16b043c3d2b607
SHA512833acc968cad89983632d9f1d604ab37092b0d927d4e639c308fd0aa2391e574f60ebeee9c102b80cc9d02c7019071331d3641dbb4c4b1d951fa3c707a9705a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d46951f8ce76e576bffa5bfdde1d2ef6
SHA119316914e9686002154df71f6a79f84540b3315a
SHA2562a722b224cfbdf9e35bb764d6831b518a579b631cbf13810b1cad5ced9519a4c
SHA5122ec7e61b5c1f6740cf2519569720d4a279b0a261e93dfd54b759ca961b8beb6b199f230b295fbd6d6c4a6c42b82e5e16339da786e301f9395f22f1192d2ccb3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd68da002f7a73986c432b2a4c21a03b
SHA1d7dc15746a991bf04b0be3be3aeb4a06795eaeca
SHA256885a4787795613e9ff8b6ed18721c3cca4a15106023a3659dce550d90e7a4eea
SHA512a65af9e01e4645ade3ebaef2b394c580d299e33462ccab5e4bce8449e759d6c194cac44486b5ba3ef5cc94ef2165dfda794174982728426b6b3118a31f8dd985
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d91c23855cfb0889fd1990706cef4a28
SHA190f7afac873771ae575ce8c50bc021cd0c36f39e
SHA25677843e02344019966d9f446da8113c1cc76c32b12533bd3843c4905f1c12b91e
SHA5125acc69eaaaa21103c17ffebf193dd166fcaf7625fffb1739e271e2e1e9320ccec9f67320c21da96e96768a276718deb8c188083577fe5abbee3ece53e2a5195a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5787366b34252e6419d33039a2e9b0436
SHA11be9a9ee3b6c721cce741b12fca8d2ae5947b9df
SHA2561e751522a9cd256743c22226d8db36275d18b12dd52e0f9c62a95c2d36b23693
SHA512cf664abf05e6f8d2c353a4e82899473843f30d6a3bb82021c1e69e5fa4cd14a4246a92a131e39c354955aaa320597ec49d26524afec7bedabcff2172cec74026
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590a288b48078cc07f60cae21bb4d08b9
SHA14b510114106fd6fa8d98cdd0849366ab73bdc034
SHA2562fa70f046b4946c894f8970f6b0f894efb04bafdcc432f49e244081b7678579f
SHA512ed8417ce22cdb0e7b0d3e59e047011c8193ebce3279dcdd28af3a0279bfa5c80b3731ffa81f85c9f6bbeef74b744a92fe6984a16b8795836b4682ab1513970f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5880ad92db9947eff6676d947b1b25411
SHA1400c7a3aed387018f3cac78047b48e10dc0661bc
SHA256d5f2616551ff1e84dba75f1cb9ae90c4a6c9ae9780f61d0c406fdfc1b7954818
SHA51232d5a43958cd40b34550012ca07f777357d895a8923a3d152eef6e66e54e5b4f38d1cb9a72859bda311902cf97575345355c73541afd691a89db8a21bb35bd34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525d2a94b05715dbd5b967355377e4833
SHA16ae2d3f0f7356ffd64834d4723298bb49886fe70
SHA25686f19a514b7b1b9a950f0638dc68e21c40e2640ec3da1c46a3f68b4c8f2c28ac
SHA512aedcc914116a89a9b5b73cbe41fdc7000a54b7392479d3fdec59e35dcb60011e518e554242c229755c0041f270251ed354b21e3db3666c82eff6bce9d7f5c0a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5335be684a87c0bf8b5c8f5901ffb8b86
SHA1c3811adebcadddcd6003efb2ced1c4bc5a08f9f7
SHA256ea827a2dd0c5de8e7779f1919c81d3ffe2d445f891aa0f480cf19e910e9325e0
SHA5124733f67c402dda454d5dbdbc58246c8e9b3869d56f057d73ac3c374ec3661413c9346d9d5f3171b510b4a10d300796ceb4d43fecaef8b45cd4fad87758a36e00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54812bd3ea36736ec3c69e15a4a18ca3b
SHA10068c5e4e87be4e39e1773a18697398c6480edd0
SHA25654da19aea9904aaa8a761ce3ac04e1b1096910f719dab5fb6512e465bfc04724
SHA5125abe0e30136dbef17dd1d62d867c1d48b69f40e0bd41c9a6268e64f6b0a3c71b2d646e10e1b00bbefc2666da2abaa7d8ef0e10b1aaef4488cfd57382b1ea927c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc96d508eecb307fd8bbbafe8b75cc40
SHA15eb1f8a9ea2fb374ebe15f6642f207f36cb8a8cc
SHA2562526eb6842911b9ee1d6ecf294e51c00db9343a9886eac6e1e3feb4ab85872db
SHA5129aac1fd9d95c8abef3d406eea026366d90409d9720089bcda3b2d54743632f33cb4f9c2c83df94de6b57a8d0a39ff34e2d1667415c4f2fde90066b2035ea1dd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa2fd0d3f33dc669493b2f2ff55c164e
SHA1824c6033aacca2477899fbb94ff286beb36b9034
SHA256abe4f5b02a2eb13b6fd022cf058da9204863c9e46011202f12cf2f1d08b628a6
SHA512a011d3c6b2b52d38ed492651a743882a2453ef9e21f091560bc8fac8a359d16dba255e5676186e7e31787253b95b09760a66a063d662d312ca906ca621ad3244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eddb6be0b18bc2be5b450a2fa751abe2
SHA16318115fef3fb15b5124475bc1a400883520e33b
SHA256275b6925b9b25345170a599c42738c914e78e29c474ce5f028935045e505c9a7
SHA512113fbec00714cd730f2419a752e2b7109207f8624ae2f958aa001e313bfa11ce378314a8c4698b39fcbb0b609f80ff971b612480f523629b13bfef12eae47255
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52673c47cfd0804cf70d2c0bffc623d33
SHA17c8306e012dc931af9b0aaa93b1c800b5aec119c
SHA2562c7820697cc378e96120e7084e46acdbb2b6fee8c086cac761714b08f9ca27a7
SHA51242a18dcec58ea3e2af308ca2b7d41431d15091b0b936b513eb7276862d6b923da452528b70cc6435bb6f26ab53330c4c6e077893fd31540951f11a2f0dd862f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc27ad96a8647d2892b55d7966b30abf
SHA1d4a916c0b12df0d1c8510831fdef5d70f37ce8af
SHA256e6c076270b081df49a6eba597a88cc4c96d9eb42229404ecfd454a1851556ec0
SHA512005fcea30e4bd2dcbd1c3b35bbe07469e48cd1f973b78c714a7285b8ed1beeda3847958da3fe30994db3cb69ea7624ddb900cd150ee44c68f395d2f36829d2c6
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a