Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
68s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 08:05
Static task
static1
Behavioral task
behavioral1
Sample
33e85f607b5b8d7ef466f22bde0a94ba_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
33e85f607b5b8d7ef466f22bde0a94ba_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
33e85f607b5b8d7ef466f22bde0a94ba_JaffaCakes118.html
-
Size
53KB
-
MD5
33e85f607b5b8d7ef466f22bde0a94ba
-
SHA1
7b4e80bdec790cadb02fddfc36ca1ca748985190
-
SHA256
d50ed1a229715ce37a38dc4aee785b941bce12e48ddc9af3b83c71e207814dc3
-
SHA512
dce3c6e0a4d6211e83d6c510981a38809f2d63f6df8449cb46b87dde25f4d45fecf99dbacfce84a13640646b1bf2f5262ad661d4dfeebb3d5f82d8ad600bac74
-
SSDEEP
1536:CkgUiIakTqGivi+PyUxrunlY963Nj+q5VyvR0w2AzTICbb0o2/t9M/dNwIUEDmDO:CkgUiIakTqGivi+PyUxrunlY963Nj+qS
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{39D5F2E1-3E93-11EF-A850-F62146527E3B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000aab3dfaa449621febed1ab05341ea1d9c831e6dc124dd1418e41c92d12153044000000000e8000000002000020000000f5793a85f5b576a17c8e9c7627d1bf1e1b5b87b78c317d38f1f146a88e17a94d200000000f73baeebe67fe4796cd8ddd2220fbc46b6176742971dc3998bf1f33e029026a40000000c2a21065ca437041d96d5676ed6127eb8255210db8ae0330b4011d4ed47f66fb4d55f0b3ce6f3b2ab265eb4cb96dc7e92271cf84885294d90c543240612c52b6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426760620" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10a0c30fa0d2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1820 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1820 iexplore.exe 1820 iexplore.exe 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE 3000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1820 wrote to memory of 3000 1820 iexplore.exe 30 PID 1820 wrote to memory of 3000 1820 iexplore.exe 30 PID 1820 wrote to memory of 3000 1820 iexplore.exe 30 PID 1820 wrote to memory of 3000 1820 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\33e85f607b5b8d7ef466f22bde0a94ba_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1820 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc3649e76d62d748a91816af1d6d1413
SHA1603cb9a573b73b709c40f9a48e0d8e60f23fd1cc
SHA25662ecdc1c42758f89043183f5771c2f821b35a153c8b3f1fa8b608d5bf0191e78
SHA5126344a9e575d97ec87c9e9311ff89fbb00f59f6b5f03ee8d99cde3f724d92f580fe207f4eb3396e00da81e6fe4c3fdccf1f30bd22d6183c518a6e73a4b23691e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be3166e8823a51de2d03bb93c8899743
SHA18a7ac9eb38a65a6aafcdb71bb9cc5f81f637e3a8
SHA256d8c66795e22a2ee66b625ee5e136e9f5f303db940c848c008589bea5380f5eab
SHA51285267924ab46be70d7114881e8102e652dc909a6baf44e24e9df4954d12e324e0044f133b3391834efcd86080a2a3a92526c05f78214d62ca0effcf31fc3ef2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df88c2dbdc9a8e283d29b6cecee13afa
SHA1845ccac0a994bdfc0260e68c048d630ef2e992a1
SHA2562042ecb642f5f2c89b088c4d2f28a79543c2f397d1752a12d86872249b8f762f
SHA512d936aab0c98348874852764066ec02752a4ba4f6ab3fac6c15245cdefebe5b6a79ee791f0bf614e79a2accecfae74dbac44a8456f63f994bdd47bf2b3589ce49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c562ea9b15944d5b75854729cbc5191e
SHA163ba266620b43addf2de30d30fc21384f671259d
SHA256ae5bc3c1ce53e54c99261e545a421b71eeb53b625cce82bb08e6e3c71fd64fff
SHA512e49ca5e887993ec1e32775d06ab13028ff80f368f2599d2e65fcde2bd49963cb30e57435d43e45dbb07069694c85a13181ee1cd9609e133549e5262a699dfb6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f81ed6fd57422de6af50ae1a9cbbf6b
SHA1fee1e073002d46e5d7e99921847729e392ee74c8
SHA256d425508f927319b23a4cd0afc2b491dbc137995e363fe5ad680874c9d505958b
SHA5126df8aeb013a1d6d48c74c9626ecb535f8463a7e511900b918518a660012ecb7d9441391f91a2fcdcd257d5596c4c780c8e86fe26613b284a697c3176dc687010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530937b69f5446790024e23915287375c
SHA1848c32e4addc95f0b346d00ce834fb17b3977fa1
SHA2565124594c76e71a6b96ff29ba3b846912a908b1790ea67d09abb130740fcc1ebb
SHA512551514de8d21c80b589753874c0b0f50af9ce28d08b4de3a7d3c30a4e3b9ace8b4bce36b7e7daed5af31a26eb68cedee242dc67e2e96d4971e3c8c7977770205
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de3c415606db31981728ac707a94ca3a
SHA17c407fc5ed50c6325f3c51f780750b5f68941212
SHA256c54fcab3f04a45938135b25089795d0ee01416f4cf2006ad698ba378616ef9f2
SHA5129fe417d74b95aee90ee8a6305e49b600127d8ddbdaa00e8c4c3d09fd7ac32e0fb17223debbb819c2463f9cf4b5bd4769130a6d3c149f4a83d77dbd62084e64cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560db685cb0bee74921b19763f9402918
SHA11effe2df3e8fe20bfb17d89384c64bff7c8d6033
SHA256e169e2cf8bdcc7d2847021fe83a52274856c04675df9d979005b9ebbbef024e0
SHA5128156f520c27cf63fe763f9aefeb4985043af3d95889c713c4f255d7d255b50ab4de663100670fce1ca01c086aed9aa99f02814a75d5e61292da1022ec863bd0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3fa851f09ff04721cce17a9753fa778
SHA1782a315feab4fbda078c908a364e1746b1b52a26
SHA25618dfdb4d1295c382e8abe810a5e8df1c05647de04e86147924bb51be5e7bdc1d
SHA512037f67320dca4c9b43ecc97b343a9a6b29c5fd52af359cf9ee58a0f1ee292d7ce336c474bf5375efbabd98f36cd8d36a600581402a88438c8e1ebdb4a3d0958a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558b2a1739a7b66715d3bc9e417079485
SHA184d49fbe6c397681cad743450b6de8000a5b9d40
SHA256e2957da4b2d9fce1804e521cd6fe002c11bb70aa80bd1285d54cf42273550504
SHA51234d93e6f5d35b2ac01b095a1bd433c3406ad3a55d83f471ba9216cf04896dbbed035ef3ea7327eebeab3c0e62c4ebd85275e48d46041e5ec630ebb7d120144b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6baa05ab75d1ab6352e2ebe31571513
SHA1846e10dae545d9dde20e51a4532096d5ec1aefc9
SHA25673b967836e1a7edda05bea68a651f505250801ee9c8088a1defdac92c73d7457
SHA512644134d9679603c9eb0c749e937628b020c1e41b336a4049f5bb84eb3b7b1e147233b13683a937e760db92a2972a071113cc9c1db90bfff7b16237998cb5e99c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a8b7c2e64c1f1adf079a616e40a576d
SHA14846d13e78ad34378dd070ffbe30533155aad738
SHA2560b1e51c0947269da1d22340902b1bc134ba9dc7c8ec9758d1d6c42e7b73cacdd
SHA512ada6c3e94945ffb0f2a116a4aecd79af957fe5ad0e07dda599c5c95377fdb478ebba1c43ac32c85eae4cc3ba4f81e1039c19be3230f58ec26658d667c6844117
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579396e3eb964676982c04dd5d66842ec
SHA18a5bd387f0c0cee45d79aba3b496e17186028da2
SHA256a6f0232a089ef2cad95f8c5d557052f064440d0d345a113734ef63132ab38a28
SHA512a8801771196253297e043da2da2620afde9dad137bcc5505a9256f76e8a42a9d001185763a37d4edb5ba15b965e5c9a1dbbc268c1aace42c37d34edb60bdd3d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9220a8be6aa4b4def07225a0e5551ed
SHA112ae0d677feef31757acb5ae5b45598051ad9edb
SHA256335f7ff386dcf89959b75b803a8ab9c0344f7e3e28b90b54dc0e141f2d058fde
SHA512bfb39e7b22586e0dd6663e3105b839e608d9312136720416e58038c12fe26b4d77e723dddedd78ee24c1149173b83b77919e4f69f77836f24f1024d4f3140d47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f0c50c6938b17dc663c32ed628fce26
SHA16dd87e5cd4fd60ab730e7e500e94af13fe79eb14
SHA256c48dea7427471734066bdd028684b5ae96db3921ae278f31a1c9e486ecb9a402
SHA512f71d7894d3b88e5c21472310ae25bd9e4672876da8286ada2cde77ace7cc501deb6fb45d776b57d8667c2ed8a92ff852a065dc3c1be39ee22b73a957c70518f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51baffda7f5aa2134e214ee75c7b015a4
SHA19c14160757665fd6058bc5a5d8256d3e59f570e6
SHA256e26dbfda267a7e1746c93c3b0270343c5a91fbeb0c6059ed8609838156d82f0c
SHA5123ac5c79b7dfa42dcfa0824222733fd6ad8df61021fe602e2eec7adb47f8aaa00bb4d3edb806206d0c93efa1c3c36f9236af57e7a7654da1519f4d4af75008c24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd9c897e645ac8e1ebc3b731156501e0
SHA1ca33fb14f515b866d41371a9709d293c099f9e1d
SHA256be04d2d581aa0b7706663cdbc9be0d39974e75d0c3936e4eece7ff72551b33bc
SHA512e9afa98fff1bdfae2a34f588ce52ee1fd0a3a36d2b81d83663095fba57d94af34ce683185263b70f9dea6f1ad1c845049fb7e3e31b5fb9da73055ff2f1bbad9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beec0e8421de03f8380bdddf31ad2127
SHA134fd9f988bd2a5a3e8e0880f6fdc7b7e9afecf7c
SHA256659091973a28b5323af7b5aee9e017e45f1fe37381d63a98b365ff148728bc31
SHA5125dab20a4fa4decf5d4bf710d17b302a58aff67651e397e6351f743e03705b32e37da7f873b84af1837131d83882bfac7af7308a8892537b2d9049798758c6e65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57780166ac82ca74c37b15b44f41ad03f
SHA13b8afd46dcede4a99c675d4c146927f4714e1128
SHA2569c4ea3b32180a46c449a472e508fbbed0a9512e6544254b6165e4e80d0421923
SHA512b6da9e692ec1f61740dcb9bc7d0293e6093bf341c60456bccabb30802a400e656b6ca0043bff02347163d41aab22f1bb4a5035355c87cbc5494de7daef8de515
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5J67VDZD\style[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b