Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 18:04
Static task
static1
Behavioral task
behavioral1
Sample
3169a65ef2d4a5ed69452c9fb4acb753_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3169a65ef2d4a5ed69452c9fb4acb753_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3169a65ef2d4a5ed69452c9fb4acb753_JaffaCakes118.html
-
Size
31KB
-
MD5
3169a65ef2d4a5ed69452c9fb4acb753
-
SHA1
11e9d5b97f76aec8c3349180b86c8606216c81c2
-
SHA256
ccc517de0ba42281dc900d00efb8100b2c9dd8a69a206072d664e448c5f3114f
-
SHA512
be41ae9a5f07b263662cb74c30b5a1b14419778ba0953ada976b13aaf0f0e6e8e9b0a63887eb188818f038676c6cd7d2393aae9580e9b154a22cc818a5dbbe8d
-
SSDEEP
384:/SlIcqtQ4HPGTHGagz+eAM7tj9saTGs1era1KH17ktuuQFkxchxUmFBt/gvWagud:RyGYvlBlg+axLZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000007fc736b31081e9e688e660009dec7a2ffc9c9574d21a4a8162036cb2430e94b9000000000e8000000002000020000000885e13348c737073b4467c920d93c0eb029c35cc12ebe9384cf05cb9e9ce0f3020000000bf09e0e0238128cc9a7c6c1f78cad954880320ad550db325745e633681a95bb7400000006f31a7319dd704cfa7fcdc7e74f4c8db01c10e2a5f59ed0f3c64058f9048064790e893ebd42ab65cee6b4facfe4f5d62f0a04f9a0f22c1d1becdbaa05739ab73 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CEA2BD61-3E23-11EF-AB3C-C2666C5B6023} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 604cd0cb30d2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426712766" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2368 iexplore.exe 2368 iexplore.exe 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE 2756 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2756 2368 iexplore.exe 30 PID 2368 wrote to memory of 2756 2368 iexplore.exe 30 PID 2368 wrote to memory of 2756 2368 iexplore.exe 30 PID 2368 wrote to memory of 2756 2368 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3169a65ef2d4a5ed69452c9fb4acb753_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f721eb9fbabf8760837515e8d9134402
SHA1d6edf630895b8b7aa9d264cd3fdedc5e8a6f2b4a
SHA256658baaf217a4b50b4a60b5ceff43673be528ac9fe90982d46e3220b2841372c8
SHA5129dd97d1026490a784dce77071ef1bc6d5ff43f933058e6765152cc249817e8468e3d214a84f87f37cfca09fe349bc99f59003e430b55d6bb54c72da5f0d42e59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df958fa9eeeb7da2c365c9ee28bc061e
SHA12b71a1d4003419442196e5106257b148afe0db82
SHA256fe99a39cb04300ffe8005a9dbfc1d24687c39f33f31572564cb8b0b5569c9f46
SHA51226a8915d04486a1a99ac2f8dfff947235c597de109fc9ed4d5e632cfef3d584b4e60007533d25bf4a7c803da6b73bd2e324173d9bfb710ac36ff42c6a7141937
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c33375e1a2ad34b91f81875821ef614
SHA1e10b316fe5444cabb034bf52712d5fea1807ec76
SHA2560d60fa6e0fbb7de6f910ef4678ac0fddfb5f29cbc43068efe09da9a0e8969639
SHA512f94a178759f5344b63daad716b3e7e1eec056f882b75f125cc11610a6958d93b7eb969b4fa389818460b0fea0bc7879d45199bcfe6801f2a683adeacf8997e28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d85140b76cc87fcb1dab20e65e264303
SHA1926b7a32d18a94e8081dc3b8ffac7ade3e49d904
SHA25685e858168e77f4f5c0cb19df4078850c0faab2ec33552b1481b90a285c568f2f
SHA512ae5940e834d785ab46e1252d7cf0d20bcb90b836de46896db9aa3c6321f3b44d02b0905886986f7cc3e59e81bcd9f457a949e4906e7b84f7b74465dfee3fa533
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549e6f060a47e7b924ebfd78677ea0e85
SHA1cd4a83a4ead76e2d9bb206f2831318038643849c
SHA256897aed559da841eeac99b61977d99327922da640d68b4fddc0012d2daf1ab8cc
SHA5126c8a5ef5fc26b290a3ed0398e23992946d12604cdba8021284056de9a24a44603a3bfe0fcad68405aae4d9166f432ea4fd5b79fbdc4af777508e1c58665cd8be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ced674bd90ffa0cbcba18b4bf95c549
SHA147ac864505c279f1024c67797d557339fe04f5c7
SHA25633096f4af9d2ea31763e8de426076c1fd41891639899ae4c7796c9375b40cf5b
SHA512dee82e687811907b9482b33390ff95ca914f6d84dfe36c674866ac3e99d118f03b126f39a8382a5db9ad1e87fd26eccc4ab1db8cbc06b34cdd6b35fc9a103b08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557393687cb0efc40ef1ac35b8e963a9d
SHA18e3d98a546b74eedbc86e9e2932c0fa5dc47fdca
SHA2565d9986d69bdfe07f169d73ba50ab8e823ffb4983ebaf613899d3562cbf5c848f
SHA5129ef81df6d7be29b72f2bdbe25b9fef0c4d9c8a7106d032c916707ba4d9e2686ab5957ebe0b8bd7a66d0ab85db9ccfa85c12e19feb05da4f97f6644b00cce865c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1a6e1a7915b0c446bc42692c532b03a
SHA12fa6820b5916efa1fcdf2f18835bd7d1615247e1
SHA256d51a8e97882b8c10b9d111360034971df838e7f32ea39b37110abb8f234a6c1e
SHA512a179ddcf839563aa85b9053adc6eca0bde574a8be89ebc83e7e5bb582c70c5ec1cf4a0eebb46b5c587342a5cce4f28ab1de7a66a55c1ca6c31bb9bed353b340f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518c59c16d2d8f06653948a9b163866e5
SHA1829f830b508931b4489099a3743de15bb43972f3
SHA256d91d076799bbc7799596c1d84e08dc547cc10becd473e3b230bb160e49d6cdce
SHA512c4f1092e6a246479e009c236e4e5c399b8b4fae190a755d7bffe871889666d067ef81a2067bc3d503c6d2a81ff5719213245937adddcfdff7ee622814846ccbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50824574cc6a011314d80ff4e701d0c1b
SHA1fabfa5c3b1556a9ba30f53266df51f00acd628d6
SHA25660dd3de76e42a5adde86612a08e8901619c8d74df698eee3a20853e80369c56d
SHA512c0b2d98382612ac3eadc8c66ff89a7b851046170379878fe122745a305217f81a1293dc73b177eae5dcdefb5af8c081b37c82bf08a5474a3f3f3034d3aba7db5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59db861d3afa4f87ca32f668442352712
SHA1081eb7c8f25c81f0d5ad122fe1603121d4d93f7d
SHA2565bcaeec12567257380b33473957ce4317750ec4b04bf224abbf2524a26d96c28
SHA5125497dcb6dd766726fd13c1369377c7cc6a9f947429b4de058ee7dcb9aa57ab4763b1567d2fc09307ac18c7cdc892faadb52da65001a708fedf8ba80689d53d57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dc3e3635d811e4215e0c7f023822c94
SHA123eb270c7d2afa1cfd864ee5487a7154110bd23d
SHA2563b7b8d85f828e7776710afdeeffc1c4a388153efa9c93726562dbbaa9f81873d
SHA5120ded742f6d841f3b77a3842b6a48a1fb0bef9ce58a7c7183242158a100c1c42cd4bb822120b8aa657471cd8b3cdc53a7500c6b22471d177b5e1e43ff5a342701
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4bd6abc4314b79634f2211d8ba39463
SHA12e6e84d39d54b6adc77e3cfb7b96b6009b6cf54e
SHA25669e53ed4eebcc38b2cba1598355fcf1001382b3108d7e25658dd2fde2966031b
SHA51257b2c66738fdecdcf9e1b13acc88b5ae85393dba2c1137741e8f593652e70d55254857631300cca9b6351be709509785b7887e557aa905c1cac3fb1eb27c2b97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e07a27187311958a6bb6ef140bede8d1
SHA104e78fe6ea8cc37edbc320204b397ee341bc6158
SHA256c451532a92546b67c46bfa05d4c05ccc34ffb907d809d59bc1d0f7ed052f7e13
SHA512923d0d41028010c9481e02edc3570b860443cdab235e676cb98c55cd58f5f06aadef106c4fa1fb24c9115994261fc9b6e423fbc0071c7a746cedac9e7d5c39ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e1a0797427d52e7dc8bb4a82c374d0f
SHA1ed447f097fd242512e3b469cd2062fa7db4d4181
SHA256110b63e14bb4be5aa56b1d190a5377bbd02d354fb0c890d8d32bf012c4984fd3
SHA512ee0f8c1b77468ec061a2687efe0653d709d2321acb874bfc6b853283bebb3805e9b7b7598feff6f6a4f5d62c7f971b57d5c25dfd0e3da4b50172b95bc437686a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5609593212e453013577545646da938e4
SHA154028997e4c29ce77fd85a8eae8ccc02560fb45d
SHA256f989d8348ec65d5afefa561bad796ed05749c003f88d916ae111ecb95d36fe95
SHA5121f667fa2d370e571e927ba102761cc7cb52fd7f515f3354ef4b90c7d117aa2c3250e74cbf7b8cad7724c5c8d0d93d4635b58df9172b896ddb112539c40ccbcca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57476855182b20e4c772e3db506e860cb
SHA19a0f8e24b7a48918b505e51e8ebd7d8312aed889
SHA2566d79229b18b03c657f20c60ddde1314f077c855868e4a4957ce8b11edd37f86b
SHA512aef2b36f3a412803ae3d08527cf4b1a783198e840124525a257b3cefa05cdd7c5d5b1561e9bfae6ba5186ef9f008343e5f692d9cd04416ed1d1b945e43f2f606
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b9020aaa86e2087492d1a2776de54f2
SHA1affcb41b6ca147a86e1a16eb25f9d26dab80dd67
SHA2566c4d37fd2f2ce064e54be66e23751f233234db8d4d56d36de9cece475fce295d
SHA512597156725478a8de7b2b12b5daff70ab144e2281ff6b8ab83a4e3f1d6c7d1c73481c61680915042887d213dee8b83e402c9874208cae840ce9f4820324c4395b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebaab46256fe47787111f38c5d642b3b
SHA10d86f564bce89d9f8b173ee86b37c6657066c5be
SHA256fbe4cb507471d40f7374087f259df5bc4284da12e829e77210c678f8e588b73f
SHA51228a468559b7622e9b3627288d3c55b31a1416af4f0d82bdeca9067da7eac9575c5e307d36c23fcbeb7044e00e5e08496da1e0966e98e069584f653b2b0190acf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b