Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 21:29
Static task
static1
Behavioral task
behavioral1
Sample
320ace4547596af170ced3da9afdd2c7_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
320ace4547596af170ced3da9afdd2c7_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
320ace4547596af170ced3da9afdd2c7_JaffaCakes118.html
-
Size
6KB
-
MD5
320ace4547596af170ced3da9afdd2c7
-
SHA1
6be63e2d4f6509024e42f4500d4b69c8abd7133e
-
SHA256
cdb8ab77a8e04cfd1380669682f37691d55c5919f9c88e0993c1ec21e371d707
-
SHA512
cfffda1b6136ff8ca1b4f1eb21f5a4c3db7d48c1b0fbd49c9de7c3a1600df7af00e28bf56b1e69c0a39914488a1cc1114ac0f9bdff90d946b616df843e6350aa
-
SSDEEP
96:uzVs+ux704LLY1k9o84d12ef7CSTUBMcEZ7ru7f:csz704AYS/xb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000bc3dfa3dcfbe5bfe3b40eb1adb7d6dcd5506d4e921b2e74ec09e02e034b100b4000000000e8000000002000020000000f10aab98247bb7de59a0f8f96c08bddb06aeff7e03f70b1a7ad79ed73e48cdd4200000002189952e97c256b47d4ad1177078209a8bef307709065bff8cdeded04a3c6ada40000000eec229fabe7e99a141dff84823b9ec95cead9a7d7055a284ccd6bec4358c722a93235c9a334d25376bb5000e935e307f3aff235d36e39c477e63c923b08e566b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426723443" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AAA82991-3E3C-11EF-B7ED-52723B22090D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60ea418049d2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2668 iexplore.exe 2668 iexplore.exe 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2840 2668 iexplore.exe 31 PID 2668 wrote to memory of 2840 2668 iexplore.exe 31 PID 2668 wrote to memory of 2840 2668 iexplore.exe 31 PID 2668 wrote to memory of 2840 2668 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\320ace4547596af170ced3da9afdd2c7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d90c1a5fa4c3c45727896f6b9d651ebc
SHA1f574656a358f6d57818bea62a9319982721a2bef
SHA256c2207bce9e393e21e7fee9f813413ec60152a12ac403f013aeb11e4805da6028
SHA512f2626c219318901b79afbc00ba28aa27c78a590be9df33c41cdbb6205186bb7753d9e42a08b29746ed05f127fd94e5758c7ea15ec0e59fedf1a67af01251f493
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a19ff4b06be03e3f70b685645dce4191
SHA157dc5f8441eee9d070633faf6a112b988ade3dfe
SHA256500086e178707596e579954cb608b3502b38614c483fdf24c2121b4902ac43c7
SHA512a687aa6a4477d9eb349d7d782dced84fd79a8fc30dfa1f973a85ef958372f2edb09a3d54212edcce94b4184cc52e87d77183019ffa6ba8237ba5ae1f06bcecce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510b04141a94b85cd0c3154337ddd2fbc
SHA1d6af7fa3bdc73aee20813c9aedcb6c7d002c0576
SHA256351ea7edeffc6c118f6a709072fa4323926d85ebb27da5d668f7a0b889234e96
SHA512a47f3ff6ad4d5977814f666e0a5d815386d7e3712c7e19c20b06e3dca34d103c93badbe1decd5def03d816cf44f366e11c949c3eb05859dd752fa4e182dac3fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e28549345209e7a84eae03854baf370
SHA1c0b1e79c7f706f3d73953225685208c1f7399efa
SHA256da73a4a00dbabcb014ac418d6668a64d3e7e76a54992ec7699e51a33bea595d7
SHA51235faffeaecc36e44ce22b402c32fa636b8086f98fa9a603e40a1c1be3b5f7b9028d6b8ad455b1f0a6bbb77a268f8027c0aef8c312a034070acb6a11d8565ce4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5967735c8b10f77837c2d3b38dd42d835
SHA1d3d37c314a480ccb3adfba929a1d101c4fb203f1
SHA256525178caf4008b5a06a202fae6dc1042681abfb6ac25613568d20a4041288a73
SHA5129a36db9ce487408c976b2d2b89876980067f6a228d7aa2d5ebc7cb64b10941e791b6b4851721bedf6fd6612163db23eecaefdc2bb5001e20ab83c1d248bd3e83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a4938c16784a27fe3cbb48d6e8f7295
SHA1cf5e1c4b552a9447807264c6cde563aba77d8005
SHA25687495b2af0ecc8f52c2aba4dc986a4073d5149a1a774a54b3cc0ea2597337f18
SHA512f5a3dbf22eb86a31f85dad57a4ae67c4680845bf492481b243dc446269113a6b7b89257f7f663622bc2fcdaef3eb2881ac2e15e94bc2066a19f34197ef75c623
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54db56397aa2292d96e785b0c7044992b
SHA1c813f4af062ccab80907be0c74ac525950691bcc
SHA256e81040b43f283727b2c6f2e4fd2a8ddba4578fd364224508529880a71c439198
SHA512ee73d4b8e4f09a447ef3f7de99f8b652bf253638dde8880106d75bf32b7cfeeb5ff1e188d0fe03a4d3368b4be02c21ebf527454eb0a619b93f10d0966bd444a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd30f0efff5b46c7d398405045c60e67
SHA1211e451f0dc8821dea0d916a4bb4aa3e4464b6bd
SHA256b8373bdd543802df7e3658353a8f5668b121f4d92817af2ee262788cb36b4517
SHA5120d24a60781bfad18b730cda764ec10a61da31603fb6b08b8e36e5ba4177a866163fc0cfccd8f415133a2a7320bd75089adb710810c6cd1d00c87299b4511fbf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd529d96d1d009acbe9907c9fb37d310
SHA1ca66b7ede53470f3ea8a1c822118f01973f8e1fb
SHA256f579afde533c2b008801efc6e187eb852e2f4d6e8d84a660e6ec2d875050f49f
SHA5129b433d50223d661c01b4b28603147ed546f764dbafd37a008937fcabd6033acb9336c39d9a3c324630339fd1ebf1cd2a264dea833230d076848881298991b0d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5974001b25199d1d0d2d4fe712a21c056
SHA124bcc020f8363ca87bfa5159dd16cfcee106f246
SHA256f15e6cd7a94faaeb2fa86aeaa68aa6766214939d97d74bed9058d61c9ca8025c
SHA512205fa3275b0129c85c2e5baddced83bddabb7f071ca7b58f61e1fda2917a875e022bed83933d346ad5d732105ae19daa172cd4316bc20f513e8ac15d845104c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e58b94c4bb9be39fb88aa863bb611d1c
SHA1066919c17415434ef4de4d20dd008cce870ca111
SHA256e03a0ed838138e4ef84c802287628d92733473e9e3f1f8c6e3c51fe20ad08b4d
SHA512856df1a46e9ed87ab254e7014d1c5d722eb74c8d4b9e224ad92ada56ddc4aec254f587c5fe6b9be5a5741e167db0d830ee1d72871536030b1b9d1f4be329edd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b54a3cc91a02e02989dc2b71566d5d0
SHA1aec4a6be5e4e1ed4a573078dc72fa1be2edea8fa
SHA2560a0f27b445c5452ccd4c462cc28ce565dca7000f451c4cceedb9d883d2fde739
SHA5120df4e50c31fce2c8789f08a9fd8f2b745b03d9f1cfd8024167a5b6a1f9ef56f6a62d0e90af918c49efdeb98a86d373688c3df17dd1fab7dabcb55f00e838420b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596de63c575a3ed918ad3da611614cfdb
SHA167aa90bfae6631297b94dabe38908eed71ec9347
SHA256af4873199243535dd6539399c3cb15accf96ba9a46edd708ca8caff21ea0256f
SHA512b6fa5ec7839e79dda25ddd9fcc40deac3ce75a5b71e6a09d3abe7912078b4ddac0b9a689c144e4cdfedae4248a5b38c6788694f1bf461f371648114c8a22dd3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a6a1d75465a459c9d958091c38ba87f
SHA19242649470eca9fbbd8a53927ad4abe4dcb61dba
SHA256077ed2838d4428427f23b2014b5ab84b7bd74f64faeb64928490c9d0bf4880d2
SHA5128d90b71d960d0f1a1d1bf8737703703af37b0ecc164d37dd8ea5451205f0c5642c245c01c45d2771ffaa84b9aa83666d55a2a3082d97e2c48935f5d93c919b01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5307e2cf70d1b42c2617ba4d2e25669fb
SHA1d42cba5b241449975a178579db5cb13e3d5fdb79
SHA256107832e98bbbdd00787b98f85d4cfdcf3b23abbbf830c44287a0f9b5c46b0c62
SHA51286142bd23a776c4d86905f8e1621c65563347c6a8e83210d5955a26cbe6cbdc84bf92953b3692ecd9bc78822d4a8b82636a1424818c9a4554229eaa5cf0a7ad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f6f2074a6b6a14be5621bd15c7b31da
SHA10c10f6fcdca452f73327953f9ab0bf7646be5798
SHA256fad17e4147332f8cdef71a72a7c5f16b47f1d3f2b0a1d5468022309f66001d78
SHA512313b398d52b6fd53f2b3bebfc975d8803b5a59ba4800ba61264b28d17c709f225124002e9756d5369e0453d3ac565f5004171067f29a5edb23e0da844f8549ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51143c2460acfc0d0d8ff3276e404bc99
SHA18e640aac116fd498638442e06921985fe099c630
SHA256106398efb6c6d3cf311637264c2860cfe59f7958e6e2073f7968629cd598108d
SHA512e55905ddc21106ed93943aaf9609600f34a916bc0cf9011c36ac7567cc691614b502f773d8b86f92890702b3933cafc75dfdadf046a48d124a87be2c22501311
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527ef58b4b562df39733de64ec36a433c
SHA1bd171a482f828cc3e3d34160f0b9597d9296793e
SHA256bca34aae70583590af34563f75bad8e1b6e863f1ff21e7eb1f50ec80b0104b4a
SHA51241f65ff401f187d7d5b3d5427ca4437fb31d72779934641901fbf867f1554776153cb8ebf0e63e9ee467aa583f4c959d226cdb6e3ca4de9afa9464f2eb785f08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdbaacf360dac3fdf8bea03b6af938d7
SHA1760da6958b0db2d6c38d7145d64d7ed4e4a03f6d
SHA2560cf9e1d649c90476d6f25f342f2615fc4c0ca59f6ecc8d7f815819e16b1a8f0d
SHA51297692a2acdcaec4e54e344a04b64b5922b0cf100d782cd9da1332e63cd956828c13e904a539fb77548c450a21f74c7bfa350aac15e8117cf2a37bc999bfdc25b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb4844d8209ae0185088a07f22605864
SHA183b198f3f1d998fd22a7ada510422241980fc77b
SHA25635272d64e2b795e10faca0184b0d907dd69cdeb79e79d4018d921006b3998715
SHA512beaebc1a3769a1f04b33fb19d1f4d857c344434f7c2725fab12e83bd5a90da59f6a0e5c0662ef0d08ac7d2d2742ac417057fb03c98426d2a19c670794e3db73a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b