Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 12:49
Static task
static1
Behavioral task
behavioral1
Sample
34c9d53f0ae490547eb0634f5231e1d7_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
34c9d53f0ae490547eb0634f5231e1d7_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
34c9d53f0ae490547eb0634f5231e1d7_JaffaCakes118.html
-
Size
6KB
-
MD5
34c9d53f0ae490547eb0634f5231e1d7
-
SHA1
654c440bebae49125518f52350975c5f1ce89bc9
-
SHA256
2e9e7de3de721a3fd4099d630947f5498b4117441647c44956916accb971e30b
-
SHA512
aac88096bf65bd746a1ae4d579e24b45f963293874febad75d05ffa01d6cb990be349f21f4eff3f60e79e02440bc616f17b505f2e0279bed43d6db92a698483f
-
SSDEEP
96:uzVs+ux7rWLLY1k9o84d12ef7CSTUJZcEZ7ru7f:csz7rWAYS/Ub76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000009e626f179e3cf05fdd3e9b39f0fed32a25eef639aa608e53397e21df024a994a000000000e8000000002000020000000644720b7fb112cfafdb2e7150688db4407455a9000d1c86dc44f2b6b57f95261200000007ac37fc7377d72af22e5d7d09e2c8d78cc04f7a4ed08ffb7fd915ed6b93f42914000000035bc02a89e23f1c6c973fa83977c88564b53e9013210c2d96b6a94e84575be05999fbea8298d6e722792007e6e9e55a0041180fb868e03456c9e135ff02ec0fe iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426777730" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{10361141-3EBB-11EF-9747-6AA0EDE5A32F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0a3d2e6c7d2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2132 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2132 iexplore.exe 2132 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2132 wrote to memory of 3020 2132 iexplore.exe 30 PID 2132 wrote to memory of 3020 2132 iexplore.exe 30 PID 2132 wrote to memory of 3020 2132 iexplore.exe 30 PID 2132 wrote to memory of 3020 2132 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\34c9d53f0ae490547eb0634f5231e1d7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2132 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53744cae264b261efbfa2491593edab6c
SHA1e577b3c2344879ae54dfe25087a4e751545e2e64
SHA256720d372292c708ff4e2d3f7d981f11b663a7aac5779401ecb60a9e9dc937bad0
SHA512a4d9d94a58951e0ff547d37975c8151f911db42aeecebf04bfca62ca68ca973bfcc218498272f8c3f9684149c7de015b2b5f700b4f64ed1eec567272b8fe4781
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e7a6918630d72ecadc103682ea58b62
SHA1669ae7b3637c941040e19a3794c99e0c5528772a
SHA25673109108c5a1d75c3105a1e0fcf0b256d0368b7c2fcf2a7ccff280ce6e9dc2a1
SHA512b1972ea91c6d2ecedd5d05f075f9dafc8b846579d1ed5f53813dd03971df090da62ffeee1f198b1332477b3718129dacd0f05af4956cb855fdcc6b7bcdb16695
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514066cc78aa8bf1edd902a4139f1b7bf
SHA1b62d42adebec2be1b11c377ebea4f68de47fdc09
SHA2567c9977ab5d6ef204b6ea892c45692ceec5a89fe52dfd805ddf7ace9003e9e07f
SHA51282d88cbbfd4f102e6459f89349ac719794ef7092bd5d04f546668c32560b300bfac280ac9cb7f7753d72cd4f001f99cc9bc1987d303092cf0a4d44557677e565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c37f9037c59d9a9595a72c846708d24b
SHA162d3033992d0284f4abd604797aa6dc699bbd4be
SHA25646d741483df32f3b3df05d152e9de5c90cf35aa7556596425c97c5262da236ef
SHA5123c32d1e0be1299dfb15fa7703bbb24eba4efe6a52b76918bb6115edd9598e5a3c7ba000962f3a9f462798c079ae04aced1c27209564e73f000b9adf4c99a21d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd0ed87c04b1e28aeaa7299c3776dbc2
SHA1ae10df4a2957db95950f7394c5c2cbc492d6257d
SHA256d85d7de3fd3aec83ea1f4bb9a345dd4ab791e159b7b8a0b46fba0b2b2cd9138c
SHA5127ac66f8e7a37365d045a8d6e7ff20066d58751acc5dd8e388e7487746dbfac669e3833c206a3ac99ffd9a3c21b9ab2689e09c3e964dcd8d3ce5dd9e7da66d053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c28cf5af76a5cca9ef1ae28ad4dca604
SHA172ba046f639791e062f457c8856722a71f618853
SHA256ffdf927188e4f7cd453a662b3e23e451a8b2a9d9f51a550d8f75642053646ba0
SHA5124f9ce406d62544901c4a773868bff25b8b96d3cd3b884709fcf4453ad87ada3b3994e0ab9f5421024c9d2c0cb27a14077de0b6b509c2318291c43c207a8eb07a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5804225a2fd85ee12e019037ba4f23796
SHA14a7571b31e959f61764f5db57258eda8f3f87790
SHA256f888284d04f845419b75d1031abfd58ace85d29b26c33011c203fdbed1e053ed
SHA512bb311423425c1abf314c5221a1ac10d5b78e448313b198e3cb7ed8a0d804d6db175f0c8c26706efa5a55b256c2afebca2fd07c9d89bc889fdcd989c1a91696ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568bf0937c08c7c1f3840d0a6815d0716
SHA1ed05966e4a5e25ab9765dc1c3695726b9741ce9b
SHA256fb050abf0986547609baeeb51e16ceea3dacd27bc1199e9526cf78be346c2649
SHA512367b264e40de80093ef9d9e8a77db965400d7780f110a65335134bb9ecf3d86f41d397f79e08597e2a13c6c8f605d5997ec37be82e2ea47ffff4d8cf2f4c0efd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b63ab36fc9d821f367a70f53158a9c10
SHA1156b41697a6ac4ee2a4373f19a84d71cb701ed1a
SHA25651d7f8307c4766b06bd6b86ad5f696b57e257c4fadfe9f146dd36a5466196614
SHA5125f95409659eed4454eaa4daa5d7ac4d47ece55d01f3ae8d7951a8804e7ab0b7e9fa7f45ca83ac94ca9155d3f99cc80b7c68066d2069e4567153169b7da5a3418
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c7329991dd537429d5801fcdaa4ac79
SHA186d8c6874b372a5577eb3587bb442939f6e6915a
SHA256566e0180d24f57c4901b84285621869990b2d7987dc382ba90ffd13e64d72514
SHA512d3d2d984c9644f2db2439d3ac5d001604fab6ad44c999824459ae8a6ab089b6b87b0735d5aba4c056fa09f3eda2fb99ebb65d22a29040f0f41a8be842f6e2922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587c1d8e269651719ad00800ca5866cd9
SHA1b0ac2441dba1e8f359ad9c82c36d5883f41c38c1
SHA25641d0c59d53c9fed176baad0076cf1af00df4609e91f88fe68aab89b65ec64630
SHA512ebc5706198b7d4d8ad5a9b10091eab1cdb2e138fc866de07cbbf32d04f1d1d704b15a87c2baf75669800bcf658e3ff67c757a20e75f282561fddafec792fd871
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b15d1603215a31c770c81ede995073e
SHA1934962ac0d957a1618310af126a666d7fdda7abd
SHA256f494a96f74272b0570ec535ebda881fb2692ada0a74921847ed4ca867892e40b
SHA51252e088c5826457f82cf51eec004537aca7d42617afb0d045558469bbe5408b8d6422954eae77884238ce2c58a1d0c14c23a4b26602ab0b1b7eef5f7203e3bdf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a24adb97e0a04ddd3e634a1a7f58840
SHA163ece0afc02d58d4285df9b61f6fc29fc959eb35
SHA25642aeab6264ae39041977ac7a3d8f38b83c645dd405669d407c7dd84485eb218a
SHA512ca828e14e24b72a7ebbcdff140408d4eca4081e763db449b93ccb8a8961b624089f4aa39145c13489135dc3fe19c63fd3de933127c6b6d98ad2215f31a08b925
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557090c9b9fc9e0095a9d0483f8411e11
SHA181fc4c0eb3eb210d4216cba54c422b3b7a74c4ff
SHA256d609a695370638033ab87c90734bd6eae44f742dc7214a9923f48509f99c6b9d
SHA51261dac1d9bb4544f5465db6f6f2d1d5f46dfb735b37445a9f5edeeb53d8e4713e3762230f1f37dc24715eb6d7843d03cc5038e567db52c23bc635124b567cc934
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d222719f39dc3d55ce08e9e798290534
SHA13cc84a6fac0b4fd710ea4a7bd1f97953bd286b04
SHA2561d7c9c62bb0044011ee4b94964bcb0c16bd6bb684633cf05074d93f3c2df7d66
SHA51294ce67598b7729b0b7085c845a3db1bda77b937437302008f56885191bb6a370c462554d03dcfeb0aa8e6edbd26bfc154c10a993329b3bf7712caaf0496b4afd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c95c35217d530526366cd4c585fef8ec
SHA137c1a738281bfb2365e455da3dcd0bfec8b6e723
SHA256381a745aba4c22ec6abdea170c2228cf288f4aba9c6c6d7f5ddaa5e9ef99c195
SHA5127c35f25136843ad857c4c28f543d8d9b7f58ecbd5c340f0e73eac04f314a400423df557d2d00d8d4a5397d0fc66c75d5907956aff3645c657be6f2c73d6d16bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5034f76639ea8be8679fcc1d102524ceb
SHA17a9992647f713e5e1f8b2646fe572f88793cad3e
SHA256c8e2ea8350d759ef0031d66e32ba3882c078aaa296f8f3e75125ee13d328a1cc
SHA51284504a00c610f851ed556a32e2f8a59c782248c32c0d06d1fb8fdbfb4ad593c622a69d94019681ce57000ca45473fd2c014d27b89d8fc89e8181da6a3a457d3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581967c3244d179a59dd6a6b63cd2aca9
SHA1df6f5778e087c7cc62eb54597d3b0d0194c4688f
SHA256bab3e3de0d61730f190c9d06f47e7dbd05c7e79c0538581fab5bd2fc210a5473
SHA51213f0d0ee448c8fce3a460ff728d55499642feb3dfd08ad39953a9848752deeade0dc6fcbffc005628eac870d96044c6b0a74a98665f74b5958457ed67e921e73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcdc3fa12719f99f60abe78f44896749
SHA1d721a463c12dc182470f637c9d0834df4df5ad15
SHA256be646240b51b95a7149bf1a670be56b609883fe6a00348abd99e5f0813bdaa8a
SHA512dec55362b07f78cccbdc848a8512e95e60e1051b6ba51f60445da4b8b243c0aa19104988d2f5e9fd9be12897f1c62073f4ac7ccab276c69c209600711c80edf4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b