Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 22:55
Static task
static1
Behavioral task
behavioral1
Sample
36bc23deb656242640c59b6ae35864a0_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
36bc23deb656242640c59b6ae35864a0_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
36bc23deb656242640c59b6ae35864a0_JaffaCakes118.html
-
Size
13KB
-
MD5
36bc23deb656242640c59b6ae35864a0
-
SHA1
4ce56459cc4898d332401c9b89d70e1c14ee9e68
-
SHA256
7fbf0f931866fee7b6ce2a29ea2eccc76c6218329934e4f5106d414b5e1b6f92
-
SHA512
1ae7e457a6185276a959a262c954d0d3667201772dbd1e3706ed45140c3b35d5e9b85c2adcdb34adefd87a981631977a48a784501320a9f8391bb7ae51229350
-
SSDEEP
384:0mf3RwMmx4pxk8UCYfNcF1J+RagQ4pAS9qgtgcVfrXK132mu:a9BQqFbXrXK1Gmu
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426814017" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50948e611cd3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d99090000000002000000000010660000000100002000000003322a9dc8d59f38a6fd1c9d1ff9804b3b9be0b61e63e00d6d4fe8ad069b8c61000000000e8000000002000020000000178c04fab484e29afb36acdd4ffffb1bca91cd14b9c13fada7dc985e1daceb94200000009ba084715989e5d62c94f1c154f8ae2ec0b1b09ba0f577cb4a0eeb7937b14f4e4000000074ae01ef85f65660d9128074fa36b611a76d1f954d32b0f8c151d29db5082d68859187336474da4f4d2c2c4139344216bd0177fd8463ae3b6939e097414675be iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8CF33881-3F0F-11EF-A1A6-7AEB201C29E3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2772 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2772 iexplore.exe 2772 iexplore.exe 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2772 wrote to memory of 2688 2772 iexplore.exe 30 PID 2772 wrote to memory of 2688 2772 iexplore.exe 30 PID 2772 wrote to memory of 2688 2772 iexplore.exe 30 PID 2772 wrote to memory of 2688 2772 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\36bc23deb656242640c59b6ae35864a0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2772 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e39667564803fce90e74f89b25735a6
SHA1f24d45bb9e1057c1b56391256aa0e5af417acd1c
SHA256d9107f994d8ee8be86c5cf59b16964d92370ace62638c69dec2ffdf29f59a78a
SHA51257776c98b04c6cf9d30088d291019052512ebe1758b4d0fc311d1d8e7d8434a41ed0a3c2fbe136518443c22fc1aa7e799ff6001940aafe9475f37b82d42541f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546b4fd8b1797f291a8cb4c22791f8ac4
SHA150a7808f77c9baa0bf66b906cf205232e866b670
SHA256bdeaa73f80526fb36f647f1a85f3f279ff8a342054069809f2500d17f84ac8d2
SHA51223979f64ae8892ca19f2cdd271d299daa2a1722f6cb6c9889cbf9c4045ecc83a37b59001b6ab77496f0e0c106f6a1d4c20c8a53a0dd83548c3e32aa5c80d2851
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da1e56e1a5f47c723080cd9e34f3d81c
SHA1ac0ff81bdd22ce260deb6e163c5d01537ba4aa7d
SHA256bb9fe50fdd83f7aa29fa456fd3bac909dca927438b64535057923d84020db0cc
SHA512e76847c0e59e886bb40c744ac7fff4df1bf884093c57f137934fb622104c77f97f863e75e6baf45f3112a9ad6b947f4b57d0e57143c1c0e41834a7b9b8b90850
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5650f9894973f982f52e5b347ce3a2f56
SHA1f31a5439b2b1a9c12339596ca2af0c2a1f4dd52f
SHA2566f035dba1745d8f6247dd18ea512bdfdb6f7371b2616918f84c6f0af63e71573
SHA512deab50daefdc0d0f55758b92b40a9c0e04cb57cf04806a85ddaaedca53e0860f6a99cfe1f9b5ae0f08d6007faa04074065f7858e4edf782c88f1b1d5a6d1cc2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9b88515b0f197e868748a31eed2a2b4
SHA152bd02c47d455176f638515ff035198dae443e0f
SHA2564c4964a098d5614d4b6604404c144e3f814b834d2ec482b581e16560f66e2cb0
SHA512ee106679163e39dbda5a2a549dd9104009410b5dc7e3df82ad779af343abde72b6cefb162f1b5eb21f95b5ac21af0dc71406fa71cbbe88bdb88031dca6e35e2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d78900aff4cb8526b7722b993eece35b
SHA1832568f20c0383ebddca99a866882a2cee087a2f
SHA256205593c8cd3fc358106d10e755007f601d981ab9b75edd2b4d107d2c60f48099
SHA512dfba19f09208e60f4daa6b4439a888fad2d86524153c79e0f3df965337d6359dc9accc08332710e4eaf788ec62a3e3f7ca9a9638c28bb2ec6e33f2578e578652
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aee356374543c5163d073936b2dce298
SHA19a710d6a924994ee589c80b56b5c7efe3f675ded
SHA2569b74514f385eccb71fc62274f2d976c6be614801c00225169622d39f1c1167f8
SHA51291efc00e864daf617966220875a47df2d6215e300825e5124763a7232165f11c8d17c622787263d6d0f88ec122a93f280bfd978471e40d7745222b6bac3bc111
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c68a038c926be2f027856a934ce24807
SHA1d0395618e72476810f476b245de36ce81d517996
SHA25694bc05bbbee2c0b899aa5d3cd0d76550dc143c64809e86561bc45fa94fc07843
SHA512c29a9da65026deb3d7a4007fde5323abc6b1e0447f1aa342afaf5f0f012125e72eb2e3b3c4c1291f20203db90ad122dc185253107a2698f665523cda432bd9d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59df8064218c21cc72cc832431bfca165
SHA15601f352ca9217027291336f09f1a83316addde7
SHA256f46450a00f3cb77f1c94a3f3e4c0645151d575b729249785572bc4b96443efa2
SHA5123a3357c0adee1c673cc209911627a2a94852513a4fc99c31df6a0eec0755c59b10f207f04547c431151a9ae2839cf7f5b3bbf1611757863070d252b8600e870b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f18e069baf46b7c465684ca9f627539
SHA13a2af6853d586ef11457a2f9c119596592691f14
SHA256f23091954d1f88f6663be639269b040df38f206fab95a2f9daaab70a2b0eb653
SHA5124b57d4f877a512a93be5ecc6fd225ae2db1eb39c08d470d0529c3268494f013831c46a3da9e7230533f4907f29c74a7d0b00040e4b833b40b9c23963b4715fe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a1864984faeda0760168faf42a3a253
SHA1effe55ac22e34b996b4c6dd376296400f0f2056d
SHA256223f99c9c4717385d25facf0621e2405a578c0613b59c9f86d103e34ef883976
SHA51215b299ca2afe774aa2fbe5909012b6f1af94e0cb50c5866fead54d331cc07b1ef6d8125184fe97348e9d39f65199bc36960adbff8c84f5ea9c014cf26057e0bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521a23938c77c165f78e3aec273e47266
SHA12d70cc5cb653d125c8f5b554b993e9bcf49d17fa
SHA25635f2e761b062a6b6a71e215a1b9b95fb159b6564a4976b0005538618e2c6cca3
SHA5122c7c6df2296a1e4b508969c25d8e731bb7cff45816509bc8743775ec697d159b9a824f303aa717c01be8c3388264fe1bbeac4594e0ffa9091510c8d166952784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4ad7e101bad1456beea414dd581029d
SHA13e972ccf6d8e4c9bec1d0ecbae235c34710cf2ea
SHA256e6a1f7ccdaf822d2e009daea0c81621375c87e83e7e06f115289d9e92df57ce7
SHA5123fa7e8449ae4b6dd3405bf30283355119c349542f9bd2ded49e1b85e364968689774928ce0cd0645fe0a85b9f07d64b559186d7b6059cd1ab5b951c6da6a2ef0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570a0dcf32b6eaba8c81ff2578d722030
SHA1745d821c44342134a4580ba7286efc164faf839d
SHA256ca298efe9d00c35dc10543c01f56e1b6a8607d837f86cca9e3f65277192eb603
SHA512b62a8af3c16374c5b8fb1c2a413385ff59834e732b22e908eabfc7a4602ff5d83e6d13858a42e67d763029abed8c270afd04bfa44d18d0ad910e4017dc4ddfff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5accdddba393a01721c85a18492bebf8b
SHA125208db8764466686801e6c017cb3026755db90c
SHA2566eed2a5b20ecb755e158148c56f9894de5571c3e8358b979b44d61b4e037e86c
SHA51206723306a108aae5587d6c5682ddd3415b9fd7589b9ac7850564af43b85fcd70fe57436bbe48935f3d3c08a64d1a20f1c3aed09d617939b8036a1d303a7b157c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583eb04b001cbffe67c063bc8bd700c1f
SHA139ea3639e734f1d70301240c1ced4cc75bcd8cd2
SHA256ba11d292a782b3ddf3ba38d525f7db7af162c278841f9dcdda406befbfe3e886
SHA5128a7c3f68df5f1195f5e32d02570465984287a18c9dff6f53f092048f87c8053cad69b039c1a564b7bfea51a359abda2244b80edc70d227484fc367c45168b2dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cca977e40127c522cf009fe6ebc5fd82
SHA166d174efdfac9843059f494c5ba623fa47a64e90
SHA256b2e11d29d0c7e0ea6e3123c14938bb8a163f6da926a92d97201f543b8eff2ece
SHA5128a49e905aee84d69d2bc41cf1cc041929f2c224824519843c1f15918779cc259581d6046bd1b4d68d6e823da785df0f060811d4805a2ca7f91823a197be91e94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6dce27a73d97e8f1683dc97e1204ff8
SHA1af359604450436dc78692a0d430c760c731afc63
SHA25633e0ab515e56cf0898cfd6609824f31e0359416e3e9e327f9ad4faeb9742796e
SHA512da321bc928253b11754810781972739adde00df3c0f2ab4408801eb56ba909823e9bbbb3e6c27eb819e3f6453f26acff15846302b96242bb9cab5de5d13ea642
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b