Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 04:28
Static task
static1
Behavioral task
behavioral1
Sample
334d762dfa792ecec0276e1141870f9c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
334d762dfa792ecec0276e1141870f9c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
334d762dfa792ecec0276e1141870f9c_JaffaCakes118.html
-
Size
45KB
-
MD5
334d762dfa792ecec0276e1141870f9c
-
SHA1
7738ea4a868a83094554a4bc5ef277cf9ba3b7a9
-
SHA256
53898457260b6702944ae0ea26bf696b0861ef261166e8e7971643468d200525
-
SHA512
5dd0b60738f1abb185c9ceec7f0ad0cae853c162a928854ee0bfb42ec92096bfdda767c18038e2747e522d03017f41a2fb274bfbacb00df2a537c8304c34f8fd
-
SSDEEP
384:SZCX+uNV+Ff6KXhGkXlnu2+9j6FP8egUDr0/I5:SZFFxXhGkXluD9mFP8ZWruc
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426747582" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DEA89F81-3E74-11EF-9225-4E18907FF899} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00efceb681d2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000001946ca132119dcd1a3e2c2483e6d9c75a34598646ec2ffbb47a47aa66c3be794000000000e8000000002000020000000bf1007a5aabbb1caa91424c9955916115220d45688f683476ab37f69ecee0d4420000000d85982a9c3b5e26249d3c00ca0a7877ed4bb8c5a91988cc5fed6c07d13c18046400000008d980961def7e86e9ceb332c66b07aef6ab6e702e73b6c36623735aa816e767954cef4cd5fdc353cb6557dc19cb9b0b9eadd74cb73ea8746def84697cf6617ef iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2516 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2516 iexplore.exe 2516 iexplore.exe 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2380 2516 iexplore.exe 30 PID 2516 wrote to memory of 2380 2516 iexplore.exe 30 PID 2516 wrote to memory of 2380 2516 iexplore.exe 30 PID 2516 wrote to memory of 2380 2516 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\334d762dfa792ecec0276e1141870f9c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2516 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD573080f457f7ee47d34fc88d45ca1badf
SHA1c2924b8663c32f6ab05b4c2738b7a65e0a45390c
SHA2568e20559f46cb46878d25d7d709cc716db2ed8339347761f77085c1b8e157dcad
SHA51271d09fe959a6e1f24362af6c2e03ced238185dbe7ab222078e41bf5f096b9ce6bb720cc7e985771817ca5b357dbdb337248d52a9b6f19e1f918d7ff7522d421c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57f7bff69c6fdf3f7f3d2aeb028224480
SHA1de820826ae06307a070b6cb41d71bcf4b6a15a12
SHA256086dc210ab5bb9d471c033f776860f575e43769949e19912e9074e46304859f1
SHA512ff0b705bc03b4dd922bb1ab8f017ca11f3d68ea58103cdc34efe917fa18878bb3d4335ff42de3e75cdf83f8afbe4cc81a48d8644ee84530c4ba69062f7a834ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5939b071446d224a51834cded62f7d93d
SHA18f4fd618a632f175f26af81b79c09b5b50aa0f55
SHA256cd72cd90f60d5ef4f9e9a3442046aa69242f1d28e5e753a406ae41f3a9a48eb2
SHA512f2282f358231e9f048515251e18567c1ccd4c273afc4d5aead362c4dd2db25e70e1eccae2e0b2d85a95efe3f20c8d9d8ace4c2d68af8fe6be0bcbdfd8edd7adb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d09efbe74d7fb80ef0fef5bd9d77a838
SHA1bc56182122263d043fc618cea63d608b43ba0416
SHA256a3416990add46fa9092715b0820921e4bff7601078adb838ccc7c44cce9770e2
SHA5126e92d54c866c2e09658a98f126ed459d09a478fc52a430b146029b4d2af158b06e2a6b96497f4c2016289a6e865a021dbdeee294559761249fd2bcfb24267a41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56b3580e0281c7b7a484b5f110225c48c
SHA117575c0f5c6ebc76aa1f5fcdff1085a4d083b5e9
SHA2562e244bc358ee6a5f1f3bc05f4c47a5e6a6dc5fa1a53bf4812faa9e44400777b4
SHA51280e89fe873f3db47d7a0a9dd7435cc244039d096a3c457594484076c2352d9687ff05cf65ec23caf9e591355699fafa60cf201fd5fc6d7d26f1669c13fb88458
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a45227a04ead35a44a4efb8d0d955ec6
SHA16eb05de6237f018c78949b6ff086e9a52d3cb2b8
SHA256b8a98dce1939a1d2f1c7a06c248500323989b45adc064066d2e67db9160232b2
SHA512273a404f781514b4b1c5cca2710745a08520e817f7f50ab734a84fa271386343dc4b5aa262eff0dedb588d341db0e5c47d5721935f2fea4316646d4378c7726d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5582225045fa214a57efc37697ba6d0d2
SHA11134b10c54a488b160359bac38675ad5eb45fc82
SHA2561a2bf395610ccea7cca87c4a84a01e69aa60f74b292bce00a0f989e7072e6976
SHA512e550523445cba6a43a3db38fdd073c8ff37eac791b34939322757098052c426984d73ebb674cf263c0609acceb097771ec02830fc855262fcc85592c7ae0bace
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD522922b2b254228b632a085ca9040367c
SHA1ba68e8b15057e74a363dac99b096216e88e6db38
SHA256ea3243c0901a3871db4a482ad4d67423da38e5a0afdfabd1f341abf5349114b4
SHA512238b7a724f56a11a066c51549ec3111b76e1d7f54cd99f810120f1d1ae901dba851479266778a291a21076cb18b0a505048250b17b7ee08c46a3d2fb014a7f66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57216938aa20401b926a960cf17da866d
SHA16fbd45ba89445b858658786a9cd0d25f75caf097
SHA256741b3917b3dcaaaa5f2eb83e5ef59607190bc91332a2f457e08587a7355c162c
SHA512c82a6cd1ebe2144e027b8bb23f07f7ba9a5eba324df784ebd337c75a3f1ad99f7fa2ad9a29d799f8b2c7257cbc27739792690e98bccee00d7ed1118aa7319164
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51c1db90c6667c6e400910f97453585b5
SHA1e16fcca3863a647fd68e77400bc99b087dc0da18
SHA2564c91b15b44ec832adaac4a6608a0638bae86fcef27cb08e91b780056c076fbc3
SHA512e170e9903918ffdf42aac350e3451c7b2b5ecefc17e900699bf94762a27ac3cbfcb17f95a66ec0c96dc52065d34c55d91dc5ba446d5c896e816ed859a61e2f03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a127e3e01963312003b82410f713f750
SHA131b16299ccd3278ff21624f88a9cf90cafa00fbf
SHA256223d989576b9b45678c97729161bea9bfa8afad0fc8b67c0cd96274126ad51b7
SHA512d955f3f3824eefac0aa38d5fa1f2188e1f31c2bc295929a96bc42ce63cb57e68a9e714de17a4b0876130a29c26f80e6c19f422b5fc220377c3096e8d23e04478
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5efb160eaf0ac576536928e2df0735523
SHA1009736659b43a600295face79b55a60efb0f7d00
SHA256dd5e9295115d3de08f7c679a0687660ffabf0aae7bbd05d4015c6ee9cd97bf64
SHA5122fe4f23d8e42e42caa2b4bfee5afa5fb89725d39fcd3a31b940a341d082ebd1d782bace65e29514a1649938103bed6c5304a6f67b7a9ef2f9cf29d42d551a251
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5488dd1e70d614e70a39a9d2aeac8a2fc
SHA1b197050e0c95203ad5b1ce55c4f75b7ebe3a9052
SHA256d8063498f7751af213a2345e2b15e48c3f25360387e20479720ab6a467db4dff
SHA5127b858a68a62697b747c666873f48871a6fd4bc96e8b6743fd73c33369ffd1c3beb9e8bbcd96307f7c76c066a2d32d91bc140b90fc4969bcbca13c4dc188dd78a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD570cc6c25dcf40d8bfe85b00e095b0830
SHA1584db2a4695a2fc50c46c87f23c62c0ed3c6c90f
SHA25610b4e737e4e9280a355899eb1ecd11de82b9d71f4cccd43f0dae1dec67b24e75
SHA5122bac9fe6d9a77a28862b2b99568b680fcfa945ae66d23235f57fb82837836c263980059bf1e9a6a269467c4db8363bffa2809c289408dd8239d8bfa999a21476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5185303e9a30b46411bbff1e7bcc36959
SHA14a112cb8a2534be5769b8dad117a735b84ad8042
SHA256e1aea961b1f0f6d32fbd6a9753b5ef4a00d691034d34839d5dfe62327728dcfc
SHA512854ae8782d46da5f6fbc7d2f160479d26fd20104f6ef9d5f644272401ce37e8ae74dde061dcaff601d5ea56cf4b28708cd0b634059aa45fe3b36825fe5a973b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cded44b88af56f1bf80c1a2ba1fd08ec
SHA12695430cb45715ec16e68f5d5d4e71f16ae4dcdb
SHA256683f11ff75bffb7bea3e3bf91e4710b52c56f349f1150dab7f96eb4711eb0168
SHA51255f26bd5c301ce55098f00e73fbab0a27d0cb02b3a5d3624098427264e6ffa9752a72db335b42d123b7e69efb51bf43e635c5e555bc3894c5c20296fd78e629e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52a09ee09c7ddf69b6e86a7f78a1fd167
SHA1df93d30eee79ceee6ebe1f0e89c997d76595564d
SHA256dc091d7c35bc6efa510f92f473414cdd6af688913c064c16d47177b0adbed7a0
SHA512974fac6c58e64e2da70103c9b3a3ed33f8e10144d6e0d1beec29467cc19c0a003740263683e3ccd3d0c114983c7ab69d2815894854a953244c2ecefc5ab3b8fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59f1db8f6f5151563bb3f99912b89091d
SHA167500caa26c7d6c5c983a641295da948e6c5163f
SHA25601ce661b6006ee2f89f4d7a61275eca220b0d52181283f5eec4a58a0209caa19
SHA512a4195bea7d79ac425aad7176c503468b386afa7011276e8f79171d514a0cd6d340544e3dfa75fe872b796edd9c78b28451fa5609adf12e123682abf31bf95244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57be88c8f1030991972a39756579381e1
SHA17370c78d093b6221bbcc8feb8ff6f8a6c3418426
SHA2566692b71fe65c41dc145e0c3c26a7ec0faf29f27f5f48a6aa24f305eb7bede8d9
SHA51234c5419dda8ef1f8f53d07d9e0ad24dbb9120ca168f4e406d1a878edfd2f4e247287ed46cfbdf4795ac69ffdf5640577be94e486d253dce1dd21fe8a1c9eb655
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57a51c0b54220116347b2f993002b9fae
SHA10f0444ead1ee43aeac1156b55a2b08bbd9d2bb0e
SHA2566e991844124b036214fee745fa88c01c7967e9b9d1be2cbd3f4cf322b6d8a6d0
SHA512499f91b47f245316c08bb3c5646154bee0d710351671e5a30bc7235187e1c03f8326213a69cf364c9adeee7853e16f17916c7a20b9e75188f74cfa89d27f1d1a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b