Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 05:00
Static task
static1
Behavioral task
behavioral1
Sample
a3e5ec2240c487d42cef6e5a8b063a0b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a3e5ec2240c487d42cef6e5a8b063a0b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a3e5ec2240c487d42cef6e5a8b063a0b_JaffaCakes118.html
-
Size
67KB
-
MD5
a3e5ec2240c487d42cef6e5a8b063a0b
-
SHA1
6c5e5d0e38858fd5aa6b2fabe780fe9fca55c1f5
-
SHA256
4b1c7d2e64fc87426240eb020152cd5c55966733763f601b7c01732d36853777
-
SHA512
1dfb9296a8484a09d51fee9fa0819eafa1b50ded50c2ab724bb4bcd6a1c940c5a94a6b8a7d9ef304d06ed33431d93ff91d7835cc63d7e89f7d64c3cc0fe3956a
-
SSDEEP
768:JimCgcMiR3sI2PDDnX0g6+s6UboTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8X:J1jTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DE815E41-2941-11EF-9F86-7EEA931DE775} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424416703" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80772bb34ebdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ec6b25a844c31a4f9f417d08ef349d8800000000020000000000106600000001000020000000d5e62c5599677772b4e63e68182bbe501406e3a0cb6569ad575aa09cd5d89e8d000000000e8000000002000020000000abd5a08c5c1ebf2c96e3c6647a06161d9049423ba4ed6bde128994cb1efaa57720000000077722cf352306fe92454ab0f81d66eb4d387b65b9d26a111b914750f25015ef40000000a819efee41bdfab604bd96af1dc64740e9b7c1f438b7e8e41fdac58cf34cde86a88d60d9e0a57dccffc3814528493f974d4d74c25006544f9a9f2d401f138454 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2168 iexplore.exe 2168 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 3012 2168 iexplore.exe 28 PID 2168 wrote to memory of 3012 2168 iexplore.exe 28 PID 2168 wrote to memory of 3012 2168 iexplore.exe 28 PID 2168 wrote to memory of 3012 2168 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a3e5ec2240c487d42cef6e5a8b063a0b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574e3d6635a0d9b5b6acbbb47ddec90ea
SHA13f27da25a594c897621504529647a700bd853296
SHA256f7da43c952e8dbe7fce9306023ca11f000c8e1b29b8cc4b7916b2ff898b0dfbb
SHA512405f6ca9bfcead20762583ed83c3ef631d2bc219c012e2e84f9f77f45b0b26ed478e58c074f8a094a62ca555656976e45fc36f9a50c4490ad7f367af84402fe0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559707df9d5dc06c4d55aea5eafe68596
SHA129e7b4dcc3442644f86ace22d402ef718c12ba7e
SHA256021af515acaea1be8fe571b1f1b185ef3e1956194690a68d88119c3428a6c455
SHA512306fb7936fe532004007666d36f15400ca42f8a247c5ca90a7a7c247460f34d239738e14198d77508b1d24d763aaf483387ec9acbbc5c7fb9984aaa2fde84989
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c663356f099c402a5e140bdda3e04f41
SHA1739c71b567e23ec1c140612491700a2f0423cbaf
SHA2561de11de4572e0f2a1fca30196ce2aaa5e25aa5c669aaec865df0ed8d77983503
SHA51297d4ce4b8206252cbb6ad80759f15b5860b7578186ca9dbcfbdbcfa58230c78a6d8ecf0092446d68b7a86996b60feb8209b43947f7e3e63b9454131e7e9a862c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5704a796f981439f610479e69efc2b55e
SHA13d9ec340ccfc0bdf8c2b7a36acb5427067217615
SHA25685169087f744d9bba6bf86be41e970e6c8d3328f3bfee5d73c840d748aa2e0da
SHA512336e5da5f0f3687008e946fd73f4b7c59d7c1b1e1c262dc03a3c0bf82df46c15403dfa50628213d3c941925c3bdffad91f57cb0a85f66852e5456edd672b2ffa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cd7b2b7819956b704e5c1360b15f6c0
SHA16bd70748efb0fc2d26f228803296a429461f0ddf
SHA2569cc28060c9f47702919c8d2fd42ac67914fa1aa769c88c85643eac16fcd1aafe
SHA5127369a3e4af4f04da528913d1df97f203ade69498402aa6182ce9660f86d3e123d18a7bba2d882aca2b148087ba66a4571fa83f771e474a134c03baa7f480979a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566792cbdc0133b06ae72928d89906188
SHA18e32941be6b1c2a77428c9a8b9868b29b4032bc8
SHA2561ac08dd8dbd5004518f97d9c6c0ebf4da78268021860a20a606dd69f314c91bf
SHA5121ecba9699aba5f6ab1d709f79378bc67b09cc0d5107d9f2a57e07c4a9be205b61a7ce5288334312f5e126829f0bfb7c2f3761d836083872bad3e529000fb8371
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b35f7d86a8fec20b4280c70160a2eb3e
SHA1ab033d0703c00a6ce18fdb1bfd4f5925a29b2724
SHA2565768ce545321915643ef8b9f0a95fb9796235039a8142693e673726e48ae094d
SHA5121a7ab649d7876c591d0eb9c3303a91a0f1f86428203f91fb85efeb4f97e3050fa45630d86ee1e835eca60ce231f59458619a093ddb7d7d405e06fcc312847e59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1d478e94ce2c03b92696d476df3ce1e
SHA1336ccb43bfe6c6cd20cf93f69a35c9d6806291cd
SHA2562a16d063607ab04c636ef31dc4ffd9ac907a42eb6781b944a4a6bab7b86fa40e
SHA5120f74af476463fda160514b2a37ea95fd2405f6a663a4d8eaabf397a6de6402e6b6c0fe89a953ad12465cb44b584edc553e4e72174a8c9edc9807d8300358bb33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f15481b10dbb07a4cb9e9f18d834d89a
SHA1e6faeebcd4aeb864db9681d1e42902549e705c6e
SHA2561df466bdca35002519727ef1831a8938c88ce8d1e3f194f14e575306140e23e3
SHA512f838513cc1668ae1bd55bfc3ee30d391204c0b7b3f5edc45ff4c317ae4ff406f41cb3c57906456f280462a4433126cd5f85f349a0ba1d91686fdbf5edabc11f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5d9cedc788b09df393b6ad67aa5ce7e
SHA173f7d839ca0d1da40bec9bdaa705d84b56851d1e
SHA2560e0d851f72804e7d422d5a06527bd94f85b0a97a130e2ff998b513de65b111cd
SHA5129f2d2a738ae92d9c44487b9bd68b611546a6171cde011383e0cedf9c65b1e81c1a5840e6934c5abcdf7e41858d62c63eeccefd029ff7a6dadcc544c9eb9e1326
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5727c3b0fd1f86ed48ab733dc1b2e2c72
SHA1ea91a7b538b79639b989b2b055e58321b8beac3b
SHA2560283166e470d075dc0f84271514b7dbbe0ffc3fd88cab077f6ec224f1a9c09b5
SHA512fb1d8c31550c35992b8d63feb59e835e4fa36f31bdbabf1477e7c469ebe00271f6b7fb130fd9c1f076f9a40a6ef603c29241f9812fc48d7b6b0beb64a990596d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f76b8a03d4e21b8f160524e936d0118c
SHA1f61720cd03e7f605fdc1eb8c4caf4195f2aae9ff
SHA2566e42447fe6f90e79e18e5a364ef0d1c7a80e0012fd2175412835a5c56babb464
SHA512043db7180defd4a3687099f2957881d6ebf23b4b74ee7ca372fd6b1547a853dd30c46b5728f5425e2ed10c708a26aa1ca184c288c6f3d6ad55ce58e911bf6eda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5742a8716e4ee328749a901fa495c6087
SHA16129525ea23642cce749c3310cdf744181a232f9
SHA2565460c9594771bf2f3c7b62389a60a6a9d9a63da28ac77019e258b8015f741629
SHA512b1c0c999117d8265bccb9229eb46c6d0bcb5f7f65010b01add8b048324ee6ac659fbe2f241883a2afba6df92e546eca606134d08bd1953d0fc6574072a3fedfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f1e47b3dc71d2c16c8b03c275882b8c
SHA1c212604bd841d592833bd5f4bfc24a501d847e5b
SHA256acc2bbaf05e42ece6a44011c0cee9c7e0632564a6d8586565b2d62aff0af1547
SHA5128429d75470bbd8a7ae5d10e4965f5ac8d4b8e8b1e20ef62ecf84488d4310a5869235d78078d0c08f4b5b58a67491d8306a07775353546c0128990851c4a18d0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c3d19afea39ac86a7d6d5a03cd17f59
SHA1e04e2a604766f6279d8799cdd64a99d6ca4bc02f
SHA256c3d9eb189b2da939496358f5c0c1b34e8576735f7270bb2eaa460ac08d3eb0ce
SHA51269829d32d8d742300b77687f9a368b5f8528027676b70fa68af704231cafeda11ff11e58fcc469c53d5b41dff85d71a3741c0c3903d63d9189564bae429f7fe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561a5fe35f2f2982e355eff9f9b581a51
SHA1929ece185336ae2dd2fa598ed5a59979cdb72e7e
SHA2562f10cbf862cfa741ed9ba20f4075b1786f3f70632b1d4f8dc77471c60ea80be1
SHA51233211ef8b68ec814ec91f6e1882654744a609fed4eb1df50b5e0421980c74fef5696163a0806db9014c250e90c379ef49e1bfc8d6ddef6da2c3f6e3fb0959f3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc6ff6160e2f052344aed2537f0d034e
SHA127638016811a5b2f09d8c6f63d801e4c7e3b7e17
SHA256e6a532d391e95bc8be5a769fb0e3914da734147fce60d04fce6f28a5d3911234
SHA51276e067da534ac17fc82e0e0f149a6a7859d7286f798d11eec322b8add983f988bae647e4804a62e67818b273e549728ddc1e23b4a4ef569d2ccb2e7ed89a05ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511c510ff41c27bcae884b08adfdcc668
SHA1689a82d289f7e715da390363a9d7b4ed98dd1d8b
SHA256a732ddf43a0f7fa2cfbad6a25b5b63442eb4f01508e56f7ff1054d8329f67e35
SHA512f3a25bedea104cba77cf203c8371619bc4598ff10265a5764141d2b55e2a0b05ecdbc518217f81c1f0a1938b5a88f06d5dbd999ad92784037501f58a7c4a5fec
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b