Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 04:24
Static task
static1
Behavioral task
behavioral1
Sample
7450c7f4306a731ceaff91e93ab2b5d8_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7450c7f4306a731ceaff91e93ab2b5d8_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7450c7f4306a731ceaff91e93ab2b5d8_JaffaCakes118.html
-
Size
153KB
-
MD5
7450c7f4306a731ceaff91e93ab2b5d8
-
SHA1
55e45e77c014f19753e1ffec527adc270d070b3a
-
SHA256
0202cbac69a16a0f80092c8285fd634d67ff11247ea13f717e7eed58f323e0da
-
SHA512
73455127a1fbfabaa8a83ca48f276be3291c5db04e0159fe751d98381bd699ffdfb20d3099acbb099fdc5be9bfa784e93d0f99c922cea60081b2b1dd23713366
-
SSDEEP
1536:S8tKppttttQQ77BBHH66VVPPdd88aaxxSSBB44iiBBTT5577VVqqFFHH99ddrrWO:S6Jgnw8s7D5MyC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b000000000200000000001066000000010000200000004e85fa41496016b64a1c86572f843516e7af882fb16d6424a8dd882c4426bb89000000000e80000000020000200000002d6b489913216cc863d26ae3d038a3886fff9c20d5acd1cf383a0d068118ca4f20000000e9ee2e4555d0c1b41dca95f0f2cd8562b6dd917884d4cf9a87167e6982d9ac42400000009585d3f7f598726facd8284ec5aa3bdc3bd97afbd580afc4aaaff18a22a6cca06528224da82ecbd106786bc9caca0e4cdda3b125c58ad77cc648315627a39424 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 804d7fc124afda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422859367" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EA740321-1B17-11EF-BAE0-E64BF8A7A69F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1612 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1612 iexplore.exe 1612 iexplore.exe 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1612 wrote to memory of 3068 1612 iexplore.exe 28 PID 1612 wrote to memory of 3068 1612 iexplore.exe 28 PID 1612 wrote to memory of 3068 1612 iexplore.exe 28 PID 1612 wrote to memory of 3068 1612 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7450c7f4306a731ceaff91e93ab2b5d8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1612 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2a0517d9541c27b8779dd11fa3d0e8b
SHA1953a36497120094084fe135cfeb379d8d0a25870
SHA2567b2a90fb472ff5f3baa95e134a305ba2fc7564e47d6b418bb082e6bd5031361b
SHA512327c25bc9239ba29a47a52c44f0ac6f6baffeb9f461d6e3f6a7acc8f04bbecce679c743173753235225f43b72717a84af5756c1408b43492e4050ad48c0bd890
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b417de9947a3841093def89d492aa4af
SHA17b04ee607a486a0a30ad9aefb2fd44977f60fe39
SHA2564b0883191aec68adb8978635ccf06f6616e47d1d67e57518bb41e38a92e27382
SHA51292a1aa085197eec6f1fe0431b2b77f422a94fc957d8fcf27e082f3a1e1974098346f3eb60f62e510d9de327d618ab2da9275b22f88ce825e1003d62e87a38c56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58031caeace8b6f7e23962beb046a2253
SHA1b4a0a747344db9b0b6724e845250331181d6519c
SHA256872b718e50525d777fd89e26fbea89224b1ad297840dc08bcb5be02707dfbe2f
SHA51287c81c7ec3a097c8404265699ad20a5a1c8b7491df999076f7107786632899af1c49f7a849384e2d20abe4840367a1293c2215ffb8134a6db97c926f650dca55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580bcb048e2071a0386e8d2727015c335
SHA1034dd9fff9a12d5f6b9f2792e756250cfbc800c5
SHA256423f57f976235425dfc7ba6fd1f5a8c60d87332b361ee38d6f01daecc636ea22
SHA512373590344a2f6a792c7cb73ee76b6cc9930c4e4c2342efc773f366478ac046048e0223fd61b9b2652041d3fd85e245e2b2624db175d2de6106ddd9e494418685
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ae6943b33e8a7eb8e6de8701e5b783b
SHA15b5a9f9fe0e0566672e8024a2bcf080486670de2
SHA2565b1ff74d8722e3fe831c5c42154e19532de3fb1be3b5a05ef90ab92cf7fcf96a
SHA512543ab1e13bfa3c749e9ad22aa5217d89955ef449cc3d1a7420d3b4d98d7e6741ba3f7f9b45f9f575ede542591a28e73b752308ae68d81172b63b0a9633b9035e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c754e07d467a77a6fc2052b6988e4d05
SHA131fa2d51a3e309257eaa9cd0b3da7a09cb1cb720
SHA2560981789149cf83f8e702db5b2ca23685f1dfdb9bcd449252fc937c5f479e8154
SHA5123c64a28593a01a0d58d7c6a1c78e84f2b88b6703e7fbe82d21e55a538fd2d6eda41f2134b2c8f7a85694c290034605f366f00c181b2eed42d5a24d26e35da061
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544d90976edd4114d6b4f2d979d1f3922
SHA1bba90678b3571982b68a876a20efac78522ba2ec
SHA256b3dae248d96c24e1e988d84339ad7aabd8291e922543b6cfe8ece32857f0b0f3
SHA512507e11eb739d37249e2cbd69024a5369c7b38eadc1fdc3cbc01322b72c64031d81a8ec0bff3f3cf71b7061b383626afab124d10d939f141ce7bfd536578159bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a15b5b2410fdd73800983f7d3ae68604
SHA14c79740fb83b4fb6c430206933eb646bace1ff4c
SHA256af9d8507b8fe4759a0200e0c6b15a5f80027383c5dd098d91c44c250f8b26323
SHA512017fcbe960025803df0860268eba5ab18394b9244f1823049fc17e7fe44286c9769e29a835bc15608955dc7766145fe718d7ea7b1338b10f27cc99fb3b07253d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d16fe10bfd24facdac0fd251672a84d3
SHA1b4ca3bd876be596be006213056a1318f50530166
SHA256d483b4838d1f6a645235ecbf4c9feb277de7449cfff736c7a8399b47e81dc0a2
SHA512488e4954587e716f45b5d1cb48d23decdf568066487df44637aef53a965a37e1c480e9daf99bf690aa7cecd35bf59ff02ead52b19540611ff4e5c78ac32d079b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eaf88556495c67209aed3cbaff28b69c
SHA1c451f1c04a3dae9d32eaa450ea80ae8ee21bfe64
SHA2562049670ecdba29f94cfee798e6780f7fb067dc7298322827e991b3fb48c3ade1
SHA51252fd5fd7d828ae5f4a5743a086df8f22fbaa2fd71431f11a45f0c922ff0992bb36fa3993c607311f6693062ae9d74213b7f6e7e042949e7fb642af0a1177ca00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5354cb912f6eef0b4a9e922b55d01726d
SHA1e960afafd564a27cc8f4b34a3d6eb9ae0a27b1f9
SHA25698e85ec92b5edb2ed6f78ba74ea763c0bad7a8b3b9c5bed58c3eba6ff92cf15c
SHA512d59f3191ba74f150fb592766fb6ca09ecf9ecfb4e08152540bea15aebe8d29aa26ad9a7a47b3e7d1dd95025cb872dd89dd52b640195d7321fcd0ac27d364fdb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddd0320d39dc1e8fc93e4a5d49b164d9
SHA14a8f9b7ac14adb16afdc87135719dedd14d0bed2
SHA2564b4e7ca9ef55a26ad145ce7fb6d0bc2b831d3f93d1aa3374bd13f09e46297dd5
SHA51296c4a9ca750aaa8a674e8607a441c6110b72969e4f9a97ea6a311047922753012ec17f13f742df9489a225663da88fe102855a3634708fd1075128b16975e0a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cd11f36dcdff3aea8b520bbb8206654
SHA1681fa439f00645a032c337b169308362effc7121
SHA2563542daaffecc69d1e1a4744c1ab51f502c2fbf876c9519fa68a890758c9fd5c9
SHA512b78387d4d653a9af27369b60db2d1ebe36eb66d26171ba81f0fa87f4a03ebda1d5fe9be244cf80391ad649c8e85c470527ba9b7e2d5518921fbfa036d8523aa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510de079e9189bf67a8c4b19b23515d29
SHA1a3348c2f183e429568b670fa88bb859d9590b706
SHA256c66aedf3fb735e1cadfbc8db707c39db7deae2a0408161c2e5b8947adeb6440b
SHA512be45d3bff0d1267e74026e4ecd14e57caff947458e6d12cdf5e7a0f1cb47ae091c67c2483a77a0ef522361f399affbf71014713767a1a8d29391d370e9d07639
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e067e5e35db9dd8a9b134b5829d4f2ad
SHA1dc45ad9ccc89cec9f484021e56a07fe5b7550eec
SHA25617305de3f145fb5e87c89db29512fcf58e48f2816980cf9d79f147c441a30592
SHA5122c68235533bdb155284f3cbad790a57386a56bcfedf7f9658391229e625c02528a7d16b9be122cd9f128bd62f98442c6f4a6f7e8416abf7f3e5977b796d61f16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e66a80b333984abf1fb7b091c80fc46c
SHA1ea7eb4b2a29828109e051ed26eae69ec6f397f3b
SHA256446fdf2ff98c870f123e9096313e61534b9fedc74020ee9ab1044b5507271be5
SHA512583ef8b8a279f371e2d2478713fbbec9e5c65fc65eae2b4a7cf0908d8c9d5191075b96bcc96b4a009721fff932a8f291847cb722cecb6507a35a0897e92a7d24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c45a0b69a3e962e6deec473a6fa16700
SHA16c9429b436878a46e7c9c25b758306603dd40756
SHA256fdf055046eece7d589b4affbeeec926ec28aba51035fa5a78872db7e9854df08
SHA512f4a74bffd940a9b79ed9100d82719a647ccede88297a999ed3e70f181032807089502b4a72814fc118cc644047738d7d43ee15d21cf9f3903d0061f6485106d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567667cb59e9951220ea6bc667668a4ad
SHA1a8149921d32b21482068cc4fc9f421b0b74d3d10
SHA256d7f52b7e022ddba0dada9f484f7ab869a7bee7d860c2dedcb6c18afe8c87e4b5
SHA51287417471b53bec2e8a541d9b53becda105b248fe1b9435ba215a893ea7a1b249e41cb16aa7d95bd241b899e3cc611bcbaec0cf035d402e1ca2fc693c4838daa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c45d4d1adcbe2b56e2d66ff768686859
SHA145e74ea7a386194fe0f7f3174b2c3ddec8edfc20
SHA2564bf616a8a3255b02c0b24e2b68150684a41b3b830ae14335b8bab7add08c33ea
SHA51272ca059803b516ef7a2ebbe09148b0c3f86765a3ac7ed21328af0aaed1dbf8a81d6c1e62e478356a1a1dddc2d72e97113f611d994bc8eb5a459adf283789001d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a