Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 08:33
Static task
static1
Behavioral task
behavioral1
Sample
33fe342f6fe584ae7ca3163caa6969d9_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
33fe342f6fe584ae7ca3163caa6969d9_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
33fe342f6fe584ae7ca3163caa6969d9_JaffaCakes118.html
-
Size
6KB
-
MD5
33fe342f6fe584ae7ca3163caa6969d9
-
SHA1
a8127e407ca9af386fc6fb515725234331c384f8
-
SHA256
95e79b7b4ba5d18927fae9099c280c0f102342edcd2f2af2ed5e9d294352e664
-
SHA512
7be5caf692c22e1018bbe8127cc51168d2e8e94ed263ca74728ae27f8a544ad4a097c56cba7507f0619247f2e8d567706be5c801b149b452a6f4a7b476fc34fc
-
SSDEEP
96:uzVs+ux7ArXLLY1k9o84d12ef7CSTUVF/6/NcEZ7ru7f:csz7ADAYS/s4Nb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1DD1A8B1-3E97-11EF-937B-6ED41388558A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000006cf37739f960fdafc92b33200d1d11aff0fb519d247482df5f52da532b413090000000000e80000000020000200000009ff4d2d5a8f71e809d67b99e77dcec0932b4f7f407c6eea37e56daf6d02a57f820000000b738b0f524710df2dac00084c0713ab94003139dd157eab59367ccfddf95c4ee400000006c560b41a9fe4e9060b156b0b40476e57974c5d762e4e061472ee9e720762cdd749c346cc94c6541d52d4c6b5fc2cdc23bf0e2bddbb113774b23b41512deea81 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90785c0ba4d2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426762291" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2228 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2228 iexplore.exe 2228 iexplore.exe 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE 2736 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2736 2228 iexplore.exe 30 PID 2228 wrote to memory of 2736 2228 iexplore.exe 30 PID 2228 wrote to memory of 2736 2228 iexplore.exe 30 PID 2228 wrote to memory of 2736 2228 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\33fe342f6fe584ae7ca3163caa6969d9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2228 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a3311ad501abb814ced4e9179498fd9
SHA1a6c8612bb11cf4c981f514c508e923ef3ac7033a
SHA256a2915c4ea909c4f9639735f265d2887362fb2dfb3b95d496d5ee1327c32fb586
SHA512bdf1f8cca8b7eabbd89ba061533aef5e56acb6849d3fbb556c3ec9919bec73c1a339d91e578592230e8075f07e3880c7124fd4fbfc987d90ab83b759bc38d55c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9957970113494d16cc0ca7096fa6bbf
SHA1a01e750e32beb1984d90b84e4173b1167906be3e
SHA2569a8f313e35e864234151703cc6b76bd629bb184c900b65b11e8df133d140696c
SHA512b6f2d6fbf4712248763179215e2cca2b441afea8bdcb7446e1e0ba6c59dd48ec020f44266b429003a84c2b386311b23cef32d772b09c3a09c91bc8a6eb8ecdce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52be0d8aeb7967b2a4d85488cf0d8a855
SHA16831996d3e43e7fd6ba7a474661ba6c8415326a8
SHA2569b9f70ecda26cdfa46254e3165547611ad11f888cf2cd0bd459fc134e555aa93
SHA5123e053e6bcb441f260a2e83423c0126d2b2f375d53d75104b4ab5ca99a48ba90cc424f98040de6421851f7869d411188fbb0663ce0e70b24f5aebb5acc283ef2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5292a2f89efef92ef976d9544febc2478
SHA15877ae56c6dd73c4dbe53ba37ec80604c266bd96
SHA2566ca71f83001937626d00b33dc3ba3bba5f3f095fd02783e1f04c58bfa2a45de5
SHA512d02804c593cd84e14e35fd8b79a2b08f24bcef6afe55938988d0858878a42f5c754e9bfeb60feeb0ec3a413b8f1ec9c9da37d805f44ae19397a4bfffc850e2c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568aa191a2cac4f938d9372164f5518da
SHA1be608eddd6a6c78305d698642e92b9584d8a2969
SHA256402be9816ee47052d153da28cbd78e93fe8c879ee0ec5acce3c34e6c764931ae
SHA512af37c4002c2952b0e4eb63c8cba85248542fd7cb29d65da3a9203fd60857684944a4806b9bf33ca2367c172d1268671ae5eefe8741bd94c943d0e0ffcc162d2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f25e74da03faaaabc32d32c4615f887a
SHA128ef601085c63f902189b0035534b450f9453ed4
SHA256c5e9bb0f9d15a5e3a9cb0455b5824a1e4d4278a9a552a9da899f113c7c974eac
SHA512b479a7e17df16d4c57828f427218a14862930fbfb57c657baa2b45b6a56c6e130bf596568dd9fc7aeb5adbace8082be415bf2a874ebd8738036d3461adc4c24c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b1dc33cd4d6de2aaca22ca68ccff917
SHA16aff47f5939543f1a5f8f73de40e79ced6ca3ffa
SHA256ef02a80da4f57bd44e6b907704badbf239959c1ca84a12a799927e24d7d27081
SHA5123227d2ded4a8e159583d7ebe861ff69d405626046ca1fe7d20cbad407e4bdf099fb23c35b6ab2216eb38c7bbbdcaf83a9a8e0a693b5bf9c652c2e1fcbe8bcf33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583a8f4e413827dea4684f0e8978dce85
SHA17bc2928dc87bb9f851f2a320b807f08d5b03b077
SHA256a981903bb0909b1a7ece6d1287497aa054df7e6edfe9f5105f00accc5eefd367
SHA512d0b47dbd3280b41966891f85ed7dc501c9802b60cf3d8d70096129a86b5b76207d0e05e6e8cda8a372c725e71100f29c8eb6853590d57edbd791cdd55b208e48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f714746987c8075dcd03cf9d137abcb6
SHA1cefe0e547eba726066b87fcb231abca62b7c298a
SHA256f9c2c16168368df232286823513f5a02cc85dd77f252f78abac8d8d9f9cc65f0
SHA51219e4dc5b3e378c369a118b2ffbbb112300df0d8827940a246e425a86687a614412a608e90d580d8d457c5a5e0d015b9e6b6839ca422fa84218ce6729c943c6f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fd42cede2d703909d3ce6014a6ab11a
SHA192a38ae8184ebb4a046d805e13701fc79a1ae739
SHA2562ac2b587a9c2ae0718a8671b87a785e0b295fd056fd61420914f501e789a2252
SHA5129de03246544bf7806ac9e17317287cc92d81a2177da0bc30cbd8dfb69c896c868ff16874cdcde32a568fbcbc75dff1079611533961627cced4a6b3619c0279ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562335cf3e882fb96fe53fdad66bc52cf
SHA19ad450e7ebf24d0c974235df33316ca931a79138
SHA256867313a2411162901f16d73a436bf8c5c38dc234671c3ec067de6f1e18e1c6bb
SHA5120c4e1811b0ced9c702ef1edcf3bf5f6a3a5b5290a55cfb4b46a02f8944f3cc0c2204dff28eabb6afb6dc293cbba95f2c238ede9c83526e88f0ab3e3312ad8b21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bf9e182e8324fee055389a66bfa8672
SHA1937dd7a26efd2f6c41419d8412c95be40715b603
SHA2566938141af70a44aa7e66ea42de7cc6cdaa370b394c0422fb78148b5282e14569
SHA5124cc349d9a2e73e762421b70bc02eaeffc2571133e48b89b46ed3cb760755e4bbfd0fbfe27dba93ea68ab5fc6a2f0e87fcddd27f1eaea7eeb52a05ef6173f9442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df97b6b88dc193b11b710e52b1a405cb
SHA12608519ef77ca8a8945dcde76f1ae82cefcc3b9d
SHA2565e74b88ebf926e74314207df930bb0a2072c5a8938376ef58b453679287f8c13
SHA512fd76f5a6837226d49b4a0b826a8719fa1ef3b8fab1dac070cd5ce7f00fe0b9c4bcdbc767528dde58838cc738a5c3dde800e45bad116ff9b7b38d55a6f23551bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559dbe5121a980f6ecd55891c12ce75f6
SHA128d1d023db09ff60a6c489f27439dca4c5157d51
SHA256be78927e8142e2a337418eaae81cb7ef2364bda1e965c77ae35232f841ece645
SHA51296ca79633b55d8848640f0fb761567a369574ac9c3b17b4c24e3450866f46e5c248cab5a4ae0c97f31140651f3e89370a3b6be98ff334dca3a3539a60aef9ba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e40b764b1153acd8610fbf39454cb3e8
SHA1e0849b90d5823087103322f75eac502eca4b9804
SHA25663709f9426ffaf8e6791e6f9a3cfdcc882b90a3c938b48083034491b61793353
SHA51238da0654fef0c949bc65b9545ef428b6fa92be30f1f68bc4a0b89aeaf2e6756ac3eef84d613b77760263b1e5f29d45080cb7b6956d5e556c823eadff8c31e023
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc68000e9e662dece173a387334d4b13
SHA1b831309f98314d4f60ef45b5bef2fc8dd7bc96b3
SHA256a9fcec3043c024e0dd852481ee77038096f3c24910be17e98d82624444fb7783
SHA512691ba2d1692cc569e76c7368ac1975e7100a24a36db10166ccfd242df8dab935c699c6d5367486f4e5bec285a45636d9b9a82658cad568be2b44e590e3ff69cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7d47f05a73b8d06b196b15232ddaf99
SHA1a13404b9158dc3c4518ce04742a309cdeb4fe263
SHA256744fbbfdb9300e2ced2364b954efc95de1aaff0f42fe9f60e4f2acc237cc162b
SHA512ecb42f34f265e679edac85629501313e535e38d9699f74febc770b198df09fee8920b24052978081492d99dac739b21a26f70c2161d3a7fbde4c3a5c29713103
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f5d499df975f590dd855ed37b62ed6a
SHA1859a3a834c6a81fabb1a821ad579864d57868d41
SHA2562a5efebaaf3c068064d7daba18ce0e53ae7d38f33bb4e1105873b74b95d46127
SHA5126686fd30da4e9bcb3bbfbbbc33b46fcbf1ddb8e4e71f70697b4399c2ad64a44ab325060ffa63e481ff2021cb82049683144a859b326c9c58bcf2e88c53fe4e44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e33ba76201bb3a22ffa96e0119c7302
SHA14df4bb8e4d6eabd0cb3fbbdcdccb11dd2ef23918
SHA25607b83ff245876120373ce2e845e03380c5287284d5635809c062bf2b2b636cd5
SHA512fc5658960afc26251035a404c98620dfb7effe6cc535ac383e83e544a353cabe11f0e4b9e9248646db91efa3723e230448c8f1cb99708a4656dd1e2e2480472a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b