Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 01:29
Static task
static1
Behavioral task
behavioral1
Sample
32c9732de72ffa80e5ecf76fb3aabe0e_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
32c9732de72ffa80e5ecf76fb3aabe0e_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
32c9732de72ffa80e5ecf76fb3aabe0e_JaffaCakes118.html
-
Size
17KB
-
MD5
32c9732de72ffa80e5ecf76fb3aabe0e
-
SHA1
95f0185698e2735b7d106dd14ee3c3fb97f1095a
-
SHA256
dff173526c60624fdaea2d20fc44bb28fca59f08031d5e95aa7faf080aea6a64
-
SHA512
281dbdca43f765f686b4dd19087edd9b84623f138b3b077a80bcb24828340593a72fce04ca4acffaf54411c63a053007f7a7068f70de320a446a724e6dab70d2
-
SSDEEP
384:l2tZf76kpOcAyQ7QIe7OEkfWd6HmIDt8eWWdx0:l2TOcA37QIe7OEk0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4607F7F1-3E5E-11EF-B0EB-7699BFC84B14} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e05f89356bd2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426737877" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000786e5afeb197c184176c6cae77e43d03b797178d9b8823521c29a391e365f0de000000000e8000000002000020000000f9d725b0d9681910703fd71aa8c3585028e874bc279452595b4b6c54daf8786a200000004b495abbb4d4da2a6724ec99c64491bd724376e41a287a44c4055a76a38c84e440000000024d4743c4ed8f452b09921996c58e8e7f3cac25b0ce5bbf85ed18ac395a3fe16e8e12dcb13eaf08622bfbe0f39dcfaedb96a4700f13844dee9638189b2a28f6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2248 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2248 iexplore.exe 2248 iexplore.exe 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE 1936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2248 wrote to memory of 1936 2248 iexplore.exe 28 PID 2248 wrote to memory of 1936 2248 iexplore.exe 28 PID 2248 wrote to memory of 1936 2248 iexplore.exe 28 PID 2248 wrote to memory of 1936 2248 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\32c9732de72ffa80e5ecf76fb3aabe0e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2248 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539e788c3ff2a5161b76832162255c9a4
SHA15a34a0b21c50fb335d28e13bdbfe061bf16a2f02
SHA25637f0f871537b6301a1e9f4320b7165aa047efd05a0f2f11fc65684000df70a78
SHA512706a6d1ecca70dbf2cf295c445be0e14f0e9a9acdb3706fc3f9ffbf375460f4396cd6dcc1d9e07c9efeeb331a11e09eb5512312356c9603b5cb5e8e914630fef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f786e06a0b5d7306fac85d7ff1ea894
SHA19a9961e3248ff2c481aac7b60413cd69caff1cd5
SHA256ec2873ca381a4be1e48e48d3dcf3a07fdcef25b7fe3791716025b50cd4047767
SHA5128e2d78dd0176513f2adb90ad2f50e096bcd3fbeda2508e3cccc445d01d48b97edd9d0f77480a270b71777165c5122dfb8b0c9811eeca13d7b17a8d28365915a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e913889ad449839b4ac1f2522200b4fc
SHA1b28538fe5951b7699c16004925c8c50ab16594d8
SHA2567284503a6a9e66ad48a0e6edf047bfb047bdd1b0734f194779aa0ea19f511557
SHA51211c1793b47e4fc683abdf63603055663b399625347984c1f2a56aa3e0bd0e676ab78ae840ad913f52cf585f1bd91e381494127f10919bf1925447a5ada3632bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6f3021e4f192e65259bffbdae995cb4
SHA1db1a6f724d0afb854fc4dac7fc9ac16e40e80991
SHA2565eb555927ea5795dfd42ca54590c9a0e102aade0d0a5a07ffb5e079c41e304dc
SHA512f0ca039309bae4bd16478be165c93ceab1754827be0d876117e3a2410db49d012fb0542f16eba9bd2d5bdb7a2564869401fe14e5b3d2a340d66f60fe0e0ed5b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aeeb8d0713ae0bf9a28b333d1de93ef4
SHA1d772ceeb451d16b02246093c096437cbf71634aa
SHA256704b7846d1c0d810d86bc30b492be9f22cc537d2656712d5bb5670e331103ea6
SHA512893dd2dbb5a8b894b0162391dcaf083114750e8c47af1fa6b03b0f8b3aeff4fae7cef9b6cd446cec50c455bfc78c77c00c92a7e931d82bf85e38e6b55409ab88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525a73a86a2aec2cdc726066b235db87b
SHA18f362c940cc443a15c1d8d3a681badfb1ab8cff5
SHA25664dc660b973acb62c8ad77d4991bb9d8a2ab3395379d29caee52f40f9f6615b6
SHA5122dbf547be29bd7504cc085ef86a5310b5c4b32fbecf8e562d5a5974a7c8f2549e71fcfc966edbd8a66c2399da06c662f88df973648d1480ae1c7b711d306055f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5106de019876f8c658d6432b1b7b7929f
SHA1c90f894fe38c74e90c8d8da57623a4de78dabcc0
SHA25665676b94b332375fa43b48e03e81658e138e80cfe03502d481e537676a9d8a0d
SHA51296f6b0f6660f442c05475b7cae72ae21ad4bd22a097d0b0e70ea2822ff81b972c152ce908a7a2f8b4915b3b78588242d79a66afe64500cacf1e6f6fe25ab9743
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e9700038db9b4565876d968b95a07e2
SHA18b3657d886ab53163802a30dbf5e385f3addc5fc
SHA256cc08361a76c99778959145b23614182caaa96b655d213dad0d617e50421459a2
SHA5126411f4e9dbfeb0d0603398d4077f6a4118090c4bbfd832cfdfb43a2dad9b32ce0c7bdfd22ccb8293287055c61cab04bab7bd985c9ae81106207e03ee27602799
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a603524c0c19ea54f0b31d4eab438fdb
SHA126387dd7f13c88a23a2435d320875ca0c9ee47cf
SHA25605466f730382ed92c6bd61923166e803d8de5db62bea44093a27d7126572f27c
SHA512a997131054f0434fc09412bd7c58e8a9216da3442028075b13a7b768373cbe1b0facf9dedd54f967efe981d30c66821aaf454cc79940644c42504936db788951
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f00138e6014c654d6d69d2025930b7fa
SHA1faf4fc5b025fad73f81a284dc1a94c365c552d6e
SHA2565e1aaa6eb61f5d9213295853f55c0a0d25561435f5627710faca9b8915aa4959
SHA5129014cb60102bf37f4dea2db354dc2595680816863923dfefb0a4d89742111d904f37ec1f856f4b9761e9ba558cf4c632beda74e6e24f3613bd5f02adb6b33a82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb37045e2df450b4a92c648b50564cff
SHA1e6cc9a7cefb7b248c46283aa4ac48ad6a06fcd33
SHA256732fe42764d10c25923a35ca2d981aa4bb7d46919ebe904d29ef857cfd761461
SHA512389d805d855bb3af47746b76744fd1a804b5c0f1937bfe739b3d8ec7a955be311b117c261d57e49b0aa4fe94360abd1a0f2e0d1bf73affc617416cb2f3af0d4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5321c0d724578dfc7ed3a978ce02c4ca9
SHA16cc8d74cd04242b011faadb8aaa1b2cbc67bdaf2
SHA2562447e32dfe055e7437e2189b345263d0e7ba6078bd925a320d7bfa78f70e8d76
SHA512bfe32bee1f8efeddc2a54f335151f13f859759007ec785a6d81564de1af51ec7afe6c8adafe723c9d9c699ac571e50972cd153c7f4d085179836628e778733fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532a925569012a2d332e452b5c19bb87b
SHA12fc72a27efe4db0531cee17a71a0c2635a80954c
SHA256172883a05b4f723f60ba18c877ee4981bf9cac1ad0b7c8bf0c24f45fedae1329
SHA512c5b86311d7dc344689cff7f61a694ad9ad175fa60e7124f108ff7d0bc84a63694af5c964c2283c11ce6abbff2f41f5b1be4718aee636f309251a2dd9858bd9e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c10072fb177820fab4ff53c51979b70e
SHA133afa733f77e92ba96c9f213410687279a448ff4
SHA25671f7407c5c1a7b23242dfcc852b0ee8ca3af962e2dac5279b3ed106b4060d209
SHA5125fa544185fd324b9159134e9861220df0120fdf889989094c89167b008f946d1a70abbd18452c31f82edb3d982ae26846d6635000edf798c8aedf254245348b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540899f0f5370d70e9255e5ef0ca9b80e
SHA19a2ab9fa6ff5d72f61e602488bee1dfaea7f5221
SHA2564fa15d8964412f23fa458aa178abb2aa37c4e04a517806c60a02f11666aad024
SHA51280674561027a1ab896412343d4b34b7c90a15971cd2df632e686d776a6467e5f47a4b1d9356c172942a84c96b6497d622adaa6c6440b2733527392593b7be9e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4222d42afa246c477d038cf8bc494aa
SHA1b12356dcd5330580180a8f40b2b39ba0838c9e20
SHA2562d03867c82b57b7b0e547987556c9f1ad7e32c427af5c8b09bfd900d3545a514
SHA512f5ec0ed6d23e4f123364e528f962bc06bf43c2dbe84f59b2f81c10787a0b96f09ba108c9694b6df82dedc4f418023b48e90a718e0b4e1d1cf03b3e730efb84b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fde10e12bc32adaa36f03061595a5ca5
SHA1488c84eb16aa27dd9de369e5af68bfde5f51e4ed
SHA25605b11d404940fd593f59b8d6f568f7e93c472e60df99fb6ec803ad30ba126112
SHA5120b3e60178c33297e9e8035f81ebc3f83402ff9c9de4ed6521017cf50676af423a182565683ebbf133e501feb0ccebc5d3771f4bef3c39f5738685d5cea335997
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3917a6f32d6af5a4de8bd1c88289ed4
SHA1414583b83063962d3ebc8e535679aec41f3c3b7a
SHA256cf15e23dd8746cfa2ba55ca181d073ad578aba73ed2620592dff44a0dcb0a1b2
SHA512914df02f55754952b7fc01d9332186e62666034792213473caaebeefb9e459e5e887ccf0e767c28223bb1aec93f800f40fc33cb75af27309b742f41d6bf233b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d535f227c07ed28b237105c87ce8c0fd
SHA103ec74f68740cc2848a6a73f1f320dfcdaafc405
SHA25621ca780aa20320633525f97c504840d2a36d4b9aec392f9b18cbe2491181c69a
SHA51220a7666e7701552a0ba33492e98a58168f6cf4e77fcc26c6fe47eab088164a5bdbbe19e0675140d54a0d08a3da138885d3df1812f1a9ee63b71b6ac7b7278a3a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b