Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 22:56
Static task
static1
Behavioral task
behavioral1
Sample
29812bda7372e4e0ae12ca1dd7cb5123_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
29812bda7372e4e0ae12ca1dd7cb5123_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
29812bda7372e4e0ae12ca1dd7cb5123_JaffaCakes118.html
-
Size
13KB
-
MD5
29812bda7372e4e0ae12ca1dd7cb5123
-
SHA1
13559a098e16051b08cfb4a6e9ee85d9c8620ed8
-
SHA256
4082ed9a98518a40f49b5f5470e4f9e2e80d4abc9d6be940a44255bab7f3503b
-
SHA512
e53130dab4252a9455b19acefb08dc5fd33849862b97d6013bb840b49fc54d499d83dd9ff5b7f633a4c71fb258d454b0965a76d0d230bdac8e26b74e729f80d9
-
SSDEEP
192:XVf8A5FpksZ4LXHb1TYcl8FiQNFynnGXU1dzbrXASqFYxOazmA8:lfb5v6D71sceiQN8GXU1dHr6dX
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f077029021d0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7B144081-3C14-11EF-81CE-7667FF076EE4} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426486281" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000b1ebfebfe70bc0282fcd04acc822de91f0bea24e69b354af17a70dd30ab483bf000000000e800000000200002000000036d2eacedf62ca39dfb95560289e9af92824e1265cac93e44a67c6a2e7b491af200000003ef6d612cef8b3461498c150072afbb722f4e293c32784c173ccb0dbfba6e60b400000000ea25772f333ad0dd126d66214957584091591846486d37d84939b688564bd7cffca509735326dd125e32a2bc0bebc6731f33e87bc2efb961f5a6a705ab38dec iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1952 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1952 iexplore.exe 1952 iexplore.exe 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE 2088 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2088 1952 iexplore.exe 30 PID 1952 wrote to memory of 2088 1952 iexplore.exe 30 PID 1952 wrote to memory of 2088 1952 iexplore.exe 30 PID 1952 wrote to memory of 2088 1952 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\29812bda7372e4e0ae12ca1dd7cb5123_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e9212dbfaefbb49a57804d2fe678907
SHA16d0f5942a7412a1623ea540019978839075bf48e
SHA256669af5f3004161f8cec2ee7c632ff67c525718f710bc4e8dc27be8bb415685ac
SHA5120f54acf4bfbde50c57016a6f742c3ffc5a0d5f3ead2804b30b6fdec7efe9a1d6ac9b8dd19f2f5d7f6b8bb1e39b915769183e741380f7f5fabe2ff60a377c8767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533ab5e04db7c6c082e201c46274f8123
SHA13eaacad070cbd6a58a293408d8f9280ae4137c22
SHA256a2890d36e7863d098038d26e0e0fe15b03bc306cea311078909b2d166180cdf8
SHA51211ee967496e10fab7c88a5bb7390b71e874e624c6b9006392108fb2735e6ea8d9714345f7cbd2d5c5d91132fe0005fa1a9a789d49cbb9ba6cab493143f4c7fe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5402c6d2d4e1b52ff36d3ef7c5741e790
SHA138bdd232299adbc72df37dc7ef777a34ea4ee0de
SHA256852848e11d369b0183ad46879f29fe795a2a3782fad30d6f0bb985c6d3eead3d
SHA512e824a50bf4be7395a01370732381c0d1c49599cd610910ff8c2ab56b47099b62a00ff80b45d3dca853361e2b29ed5cf34c3fc156bcbdc38b1d2552d9b501e4ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f276b682ca541445b0463ed0d886c071
SHA1ea2e9e56dedbd4a9e1b40b76eda6190577c744fd
SHA25621e348f7f45547c1a82180e220f6b420741cd16db2d5c2db5e91460a3d387bd5
SHA5121168d01260e88fdc295dfef82afe18e5e09b6bb8b04fcd74eb38844cfe797704a06f2b68a9bb39203802f751dc23ad693f923a5a2759da55685d693cbc8aa463
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f125dca906f2f9374920529e4e10ee58
SHA114c7b6cd724ba119dc1f13905ead1b4d4444ad52
SHA25685d1a89cc6041fa00aa58d4fef09024440ffc388de1ea2e59f52856326476c49
SHA512c3be762c4a094cc393838392e2dce978e68a6a9895bd0e4a4079940baaac4c8ace75614ea4cb0833a6f32cbc886718453bc45bfeb78f8d2715507a32a3201f69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd2cf406206d7be1f5819bebe71073d6
SHA141c9df387b3696f151dba7b66f5e0cb111c8b8b8
SHA2564a718f7864d8ab945535f45d072eda7b00d1530534a7ad6a5065fb3777e5e48b
SHA5128d9e720e4e7646f497f1f19f4a4870c7808f142aa2246e69858adaadc136490aa32ad850d2bb371f6fa3e5e94b5faa44027a9b33a3e1d82c02d59acb4d3daf3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bfe7b6dbe9a4eda313142d70f668c3c
SHA19039a3682ea71ebdc2e63bce16d4537d81734eab
SHA25644895df42a9d38e1c2e92adbcc78d163004ed5356e2476ad3ca7a46210ebbb15
SHA51219851737adf6262e0c59e731f96e626537dc27afb49b345202842f87e2732f5e7197d2b379a7b4381f860523c2cefd160646431e770a557927d00960a762478d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8fa38d8127cbdb4f6be2d53abaf27fc
SHA1ddeb8e85441ab77ba6ce603bb305728f176b1d1e
SHA25682429b9c65be52bbfa3bb94bced334f34aa401cace2e656dc21bfd04ab67d3b0
SHA5123f94aa242425e3cbc146b4fad0ae38119fb3878573d4ebb24f71b6c8a8d2a085fe0a7519e505c6f66a437d377397870732d954f2d5aee06d8659bd4b2dac3958
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587828bcab22a429a0e23907de4f3e647
SHA1b8b48dae41d43272f3c9374915b8ce58a90ef602
SHA25642732aa6c7bdac837b22cf89edc6c27c633e17cecd42af17bd27a707a25c2de9
SHA51250a3d35be40a2c1be1480e35638077fbd455d908e05bfc7e7df5ed5d8cd04f3fb2433eafd8901ed2d09906106939e46c59498ecf1f481cc5aed0101663f7b3dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d087e046f5badeae5fb15425e271f320
SHA1e915272a77b2a2e8024d8ad81757cefafb337702
SHA256bbf650936d1066f11452b90e39908e338e9efa152a6c8b57b89c15360135190c
SHA512ebadd7926e3ecb017206c8a1167e554c9c45af18769b8d422f7289e1fd549a326ded2a102cdf95de08fe6e1230bb6512123d269331009024ea2aa1722bb9cccf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534f3b4b02cb14a037a2c29d735f8205c
SHA1f1e3d6f3d6d80f51de8e986c16db2392c30fcc7d
SHA256db5c7d3c135169564285fb4791f42ec83eb5f1100fe1882083b24c5d8bdc7f8f
SHA512d9450fe8cdfc3ffb80c54d1a37c2c499f6a49063fe70e90146fac3dc6688c9a7766fc8559688ef1ad006da82a0fa1f7e7315dc239bef95d6b5e814d741124609
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517589e1760cace103458f2067db618ae
SHA1e87983bc23e9181c23390815c707bdf4d2930ff4
SHA256fd3108ac423829a45b75e65b471baf0cb1935481abc7616ba27073e2e6e7e278
SHA51237b88dd6f8dfa8d323b46da20f37d9487e88825fdd39853f42ca059dc86fec2d5ffd2382ba44ab18cb32c5037c6e6c1f804575a4f3f4beb31c0105c7129ab607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b30030ea1e9fa3200d7354310c4164c8
SHA1ef0b9b9eccff13a4dcc25e9fc1e6a8c9de4ace0a
SHA256fb6ea8f1fbe861369c30586301bad6cec743beb1bf3044c9759335543bcacf07
SHA512d12502b00e945de2398416824d040d6bd2794bc6546b33e99233435852fd7e5ebd35a032dd7af4253fc301f9fe5bd7aae1b6fb58ab3fa09adad51c34db32a89c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55937d44732c3e8bb6f21ac799f940ed0
SHA136d3626976ff4fd2379414cd6f905ff30438b213
SHA25680c0720a92fc99f1f100386ebb8da7322058d6b344e71d12f46da034e56d268d
SHA5120c54f4b7e7556a81a027f356e8f61aa563848a3edf98993c69df304044b6aad5ec7677a0e27d3295cf15cb19a7aeb24f304e6a97ebb6cd103ada038c8d7587f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eccf2a5937baaffd15837831ed73e9bf
SHA1857291b83c8a56b6cf30dd7dc5b6bfd8697c84a0
SHA256e67d4181e3c07dece4b7671a5f46ab56eeec58b2367fd5217084eba6bb5cc454
SHA5120722674227cfb26a48e3e6b349eb4a81664af0d1638654aab4b7d524222e1abe469ec260e7e6dab1a4907b3f2f4c49ba1a59086d22f1018c06ae3fbb85b3cb56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f7315a131cc90507cd35810f206d081
SHA1df910dc9209e4ca7866a1e2aafa501271ea4f773
SHA256c92adfe0037f732ba480725cc5c48196948cb7f5f16c5a1a610deecd43674fd3
SHA5125663dd28780fc85df85761ed145701239347092b67b2a4c59fbcaddb36075dd1c57eac4efdaf7cc3c97a74bd0bdd3866752f6d897407003aab6940f70e6860bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5888ed9d5b7847e8d7db58e43b4a2cdbd
SHA1a81f8bca6d535cbba62e519735b96f80b454b754
SHA256bd0f0e6a3d6668fe77ef482b85f6deb022fdfd12f0c10090917ec3689f947534
SHA5127df83320018efa6342f2bab8e21e9c6b48881faf8c57a910c714ab1c706037d8603b390d6565c88f279544a12d7135b5cfbffadfebd9ef7b1007726f488d1faa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543b696bcffe56f06d8bb99c932ab3ddf
SHA15e012fa50d9df84b8a76b0ec7f4d2bae7f9817a3
SHA256a2fb665fa081b6d8b17ce54f2607aea0b0d91e185e58503dff71542438a9b263
SHA51234683c42684489eebacbfc59585d0d206481e00e6b07f26dc80ec424e70a8898e8a70bdd9bd0d03398de78e4801e6690b7dc5ef0417520ffab255474eabd759b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de396e175f111e592e49d4823a35ea09
SHA1b2f9a1cd0a2b06fe8a73c84dad91e3ac7ab9041b
SHA2561a4fb8d4b62787f632e6db944127ac65ad1046f682203499f9862cdfab2352b3
SHA512f18e02e21b4f652a0af541680e8edc01bc714a0572ca895455fc0b033d37fbd0c7839c3dded5b931069aeb70c4e17142563446c803438db947e954b668b13994
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b