Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 16:28
Static task
static1
Behavioral task
behavioral1
Sample
311eac08455322c4b71391d72c2a9183_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
311eac08455322c4b71391d72c2a9183_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
311eac08455322c4b71391d72c2a9183_JaffaCakes118.html
-
Size
10KB
-
MD5
311eac08455322c4b71391d72c2a9183
-
SHA1
10d4be6bf4b04fd2a149add5fe37d09d0e0877d8
-
SHA256
44f4e596d1aaa203a008da81aaf734ca1c80c99a5c15690e119698a66aba47fa
-
SHA512
9bd21eec752bbd8ad08e9e1a04563ca8fde92dda61ca6923b333fd2ee715654ac48d4899db6e7b48c232c2d3d65b99bde5e188df1b00342b51423da7c9fd830a
-
SSDEEP
96:uzVs+ux77VdLLY1k9o84d12ef7CSTUWGT/kP+pSps31DvMdlwe60UYRDvMdldlVy:csz77VdAYS/r8SgaNUYRravPHb76f
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0bfe05421d2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b700000000002000000000010660000000100002000000085dcaf997e6811cff1f291a861436ed64b2df256cd1f07cc1443ad2f6249d99a000000000e8000000002000020000000e7818b3f67ecdb9ac632a675f5aa25e345495ef514b46376461ac472c87c952a2000000098b2e6dd94358e91b45069e050b68a3f9c473b6fdfaf9e5d58207fa25e8047a340000000f57438c6c4772fc026603d121025bf6e9cfb2cf145d27b89b6bb1a1297b3196f915098d18b91f1f2f70f222f15e6a0309c7a389f60d7a0ea04c8653ac92d3ec7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7F867911-3E14-11EF-A69A-C2666C5B6023} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426706192" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2128 2072 iexplore.exe 30 PID 2072 wrote to memory of 2128 2072 iexplore.exe 30 PID 2072 wrote to memory of 2128 2072 iexplore.exe 30 PID 2072 wrote to memory of 2128 2072 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\311eac08455322c4b71391d72c2a9183_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563ccb2bb58ebb8d48445b377434cfec4
SHA1c8f4aeb4a2d4d244bd789c541eb55fc9336ec97b
SHA2565509dc92883141aa2bea1526370fe4510909a1a418aa350771ce1a7a9d5745f1
SHA51208610f02ba6614c64afadf37a830dbe1f35898bbfb43c518353a1a9b4fda0745344966e9be04d3e4f98921588c9d9edc8df1a91058f35f8d84d7494982e872b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f66c04460b1e179cf18be17c6944e1c
SHA14376f22b892eb261c7ce20fa1c70b4cc38a3a778
SHA256be29b56b9cf55da8edd353f6412bfd1ceae508ddbcf4699034b7e683df211bac
SHA512b007d3f16abcc6b21a0f7de75594b781353f40427453549315e421d7dfc47a0b77515d79d51de1906dff9b036f7f47adb29a6ecfc4306866880c0fd994eb02f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559b5dbc6cc8775d911454f7f0bd95db9
SHA1ddbc237c3e7cd1a079996a4fb2f6b6019b2909dc
SHA256bf5a8efc58f68347a46faef1dfddeaa80c082dc78b8a97a7aff3e32d214ec48f
SHA51267b71d05f5bf997977c1d4774650be141d12df232aed40b9995dc2385f0edc05a92baea4cfbed3fa588232d9810f869aae76d90b8240b88ee6768eaada664b05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9282bdb124269ff8df5326d181ac131
SHA1491612524c54e64e0d0bf0dcfa454b89b42e3f0e
SHA2568cf1ada55945fb206edbc5e2b36f7d7db73fe46ff92273af699bf2427dfaf30a
SHA51203b7a194575712d99833fedc5eb5e1e8ec672b609c5bc95ef5abc5872b841daf5a791f47a9bcc29b6778b013ca525e581840977d1f93bbe2a2f7d4cffa843665
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce01deae14efc5c70f2c1e3d2b5fd570
SHA1b1a8e0646eb0cfdf2bb311ef7bd9a69edd14fb91
SHA2565944a8078d3b624c0795b84671ba977f0f655c135315dda6a6dfa57ab2de6b02
SHA5127b586101d2835921696b35f6c492fe3405f073ebc5d5dcf96d3e7fdb7e7d55a870992e495c97c90632279a6322dffa08910a64cd4f0355c2b185cc2b2fc737de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3e7d40092625b940c1434f2651d6b02
SHA14427b90c3d6b5cf40507f15f37bad1ac97bda7cd
SHA256b4f5e60c30f29a3425f98b2d9c4a03d8a1517169f2aec5fe88ca46977ec34d01
SHA512db00b53ae4beabfd275d2d2e9a9d9709c7e82f6ce9f469fff573fc33c1374146d6fa4a8534727e405d9a4bf98f1ea1f46b44317710647ba8a173d353f4f20470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533e0614c3dae340683d866d5ff3e3504
SHA1b68c6e354ab8b473a7c5b2237a3450d9ed170c40
SHA256eefab7fd7a39b43e11a45c9025beae9f60b4cfc181ab86ad3f0fee87e70d8750
SHA51250c7034b416e091ed377214d1b48dbdd63b67bb06a17db318f914d994259285674e44d861099fd21bee4fc28ab30ed42f081118d3ac2142ae0e278df938f8188
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ad1338dd85efa37e517aa0162ef1864
SHA1b42b7a3f12f72b1d85d602ce46f0e11a1a33d1cf
SHA2563eb6c01143d6096828fe0e80dcd6234ff53dedf364d3299d810d3a94bfccd872
SHA5125c6d0bb9d8ddd21af7f98887e51e2956bcceea9ea8d8fe185a6a2355d3b2a63c3a90e5642d11d932d79301c17f0bb78cf07d6a2dd53a2b63d5e07741b2eee273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578e1e5a7443db697c7fb1d1f69f2062c
SHA14f648ecc13acc1c0f9cf1a6bb1f1beed541e1191
SHA2568b37880d50aaa681396ad0fb4cc63cfbd4084c0d4d86aea5307b35360c1e14cf
SHA512d56fbd2593971ea55f1cac46f086cb4d57f3e09ea8d7c79bba4c2c4703ef376ab9da6f65c519ab7e5126db101043571f54afada2d0b6e22739be07376cd8a405
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5109ff9bfa7ac99c6d43a40e2ea628ff5
SHA1e0520dcf9622378e7b78b3056e45e4dc446c87e2
SHA2566780f6828d44bb71224c95a8cf53d7bfc384769ae5379cc008094fc7e11880e8
SHA5127781d95159a2119b9d9dda2a84e6e1f32077309b47717ee0c3a8cc5a03e4f3423c0cb3dfdc4f7896c2b02f96b2a16e68909504d05cfa91bf80483d089f073440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4b0eb64948750a8888fc3ea76336465
SHA1defb7746db7561cda182a62a22510e0c0d473f42
SHA2567385a8adf6e8a62c955338c10eaf5c768a9e64a7ae314e6064d596908455fa4b
SHA512e4bac9303c3744a75adbef3c3ce51e4d057e0b84c76b6c6f66c1287ad4f367c9246f1481a1c38e161208f09a5d4c7c36f36c1d597d439854094a648a07b36f27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ff435b5852875a849cfdffe29b53691
SHA18cf69c46fc8fa34fef139c7a476a97ed124fadc6
SHA256dd584a974795cff6f1144975118d5b0617184c24b37469e83e9acd844499e6f4
SHA512c6473657564446ae4e53358884b6d1a56c0a717e7a96b79119a77e1a821ede907ebc5be1c7f3f94a5fe29f9f51d0b0ebf83bccb95541cec1e375dfd5024bb85c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a0b89df65b4cdef2d4ce475d4486655
SHA11004d778f3a064a71d6fa363a746139acc980028
SHA2562582962e856cc10f09e224ea69f31a57584c5955eef2d7a7ebe2c5534a52cf4b
SHA512136449469068a0326fa39427f65f34c69daaa54eca015ec21e378565659a43110b297c2867e6395cadf60c2b3f23ccc1ab52d55a393759304ea694ea08e05773
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535c120f9414affd3506db85683437fa1
SHA19e256739330c3431a7b323c5a24cd6e0c9208966
SHA256d2525415211b0611c4f8959ea9b203c29f18f7a3155588a28f86bdd1f6b9470f
SHA5129e7c8540f7927f6d884d30f56c562be9983e6bcae3ce20af29eee8e6162f2b99c7455f4ff4ad1447478d997f11e24782efee0e90c9debc96da315753e39f39e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eec1052a878811bd89755c73507be7f2
SHA1584e767f4ed104a947c75969676ace9a7fe43c83
SHA256e47bc265a6513392767089c305ddd72807c0b16c8342f371f8efd4d6009dd82b
SHA512edcc383bbc2ef4fe022e364f3a1810bdb636e7f2fa438b3682d653776ce6aecf69f0976704084491727206b43b8e12da4301bb272218a1d9c644a21fcd62e7e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500010e579772158db69332140887ab50
SHA17287f999a1a757c4d65377d5203e03cf8b498eaa
SHA256df19c962ab7d787b616989f497a996b7d096a31decad8857d19a3861ab4d1423
SHA512d2a8878e91e9a7a995a3d8027488a19ac23c23ef2c3ea408f9b67ddcd28f41cb302c30efa440465ef712e1759c6c668e3f2176bf1cf4e25c15c584a9ebd8795a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5896292cdf2c2a63eae050e4a29151caf
SHA17141347075f7d5d42b7e0fe42c76c986f12d4463
SHA2567d06475924670b1c23571142a30869313e7beb125634ed5c12201f499f6b00c7
SHA512db2a75830242954ec2e73261a476592f90a7b9e6940759a5a2a7f79d9ba39c69ad22d56f7412ad6332f5c5d4f8d881e45ee9e4250c3229a6b54c65a700e85da5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d13f58ca1fa5fef60b0ace4bd54cbdc
SHA129d4f56aa16952d1041f3e522aed5d257916f555
SHA2568e8e8df05b55b1b1c04c98b2095d7cedcc2954ace815438e8e8bfa2c0629b1d9
SHA512e1114fe9a241757bbb931db17d905bed3de3218bfbfa6e8fd6479409278ff2a5815d04118d5f37fc42d5e1069df8d1ac1b3a3fcb0fa2819d04806d76dde5efd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3d1a6178c8ca5311937f69c60a8ccbe
SHA17775ea767145260438d2e05b945dd9eaef1648fb
SHA2560f3b97fab6f2d9e9acee8709f5e359488c025118cf154adfd8e70cfbf1760f0e
SHA512152cd2080f06b97d51fe062970fcd1825f07c9bc8861629b38fdadd66b3f03533c8a2028f47f6c176c0d9571d27dc62818d80dc7a59e784a191bc001528ced90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ee6d25f53ea2514b113a8f2b998097b
SHA1b92f77116bc7fc42815cf28447f34c24a735c9a3
SHA256f02be4fd2c4206aebb1419c2ac5ec924e761ced873b87c1d8329196e164875e6
SHA512647cc155edee3b97749d36147966c1b93cb836fd319ec89a3ed6bacd816edc892138738443b832df5450d6bfff827f342c5fdedc8b6e84d3b2283d551667c9de
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b