Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 13:09
Static task
static1
Behavioral task
behavioral1
Sample
34d9464b146aa5f60bc2dc7f96ea6a60_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
34d9464b146aa5f60bc2dc7f96ea6a60_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
34d9464b146aa5f60bc2dc7f96ea6a60_JaffaCakes118.html
-
Size
11KB
-
MD5
34d9464b146aa5f60bc2dc7f96ea6a60
-
SHA1
41fc2b8361bd2b19cfa968eddbea93af7acf7de2
-
SHA256
d66f2d4e683a51e3e8ca202ceff47e23f08a22a34c2d26543881481cf23d457a
-
SHA512
d1cdf2d8f451f14ec55260bca497ab1f02d4936f3f15e54df40326124dd7d3491e3cf4c472fb9e6b9fb3305d52b45487d779b98af8fcf3be5b7bf524adcd7880
-
SSDEEP
192:2VRlIsr03c98k/w1wvqLkZBBHCn275BlJ01Psw8uBuLbdU8d:sRlIcuc//guBBHCn275BlJ0Psw8guLZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd00000000020000000000106600000001000020000000f773329dd08e3fd8fd8570d75f8b2bdbef7cfbcc63d14ab3f2f5850b61cfab42000000000e8000000002000020000000b549782f343cb36e1a656d48543ed0a0bb6f30b4d21553fcbe90c058173e4a2320000000dfe02f5547a0348fe031ed119c56bdca7b448ee148fdf673221e499270b55f0640000000936c7a7a5c4a518783e46ef2b9821b970f958f651e3ce557657e21af087ee3fb911ccafe8d17d66a496cf7a45c06605369b70cd4b51a9d5fabecd31aed454ec7 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426779198" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7BCA13E1-3EBE-11EF-9EB8-6A2ECC9B5790} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c002e861cbd2da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2212 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2212 iexplore.exe 2212 iexplore.exe 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE 2816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2816 2212 iexplore.exe 30 PID 2212 wrote to memory of 2816 2212 iexplore.exe 30 PID 2212 wrote to memory of 2816 2212 iexplore.exe 30 PID 2212 wrote to memory of 2816 2212 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\34d9464b146aa5f60bc2dc7f96ea6a60_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5940218e165e85373a8622327c63d6cc2
SHA1ed5994333ea9d98032f68dd64d4d60025cac9187
SHA256b461012885cf0156dd890c259ec0b52bda29198277130362d0c5eae21aa52a32
SHA512b8842cc79b9696f24b124e749fc5704ca86a27e35b618c05959eb98295e531acc7a51c9c43a4742f53843a0e022ead683ce15176f4ab64ddc27d525d50ded62d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53df757b6948f018dfbfeea1b7ee3ffa4
SHA1e439e5ca87707242ad8c96de87f193dc23f31df9
SHA25693bf50bcf06f8567869a2141d94315d29f4abb6c86e955f3d8e45d1a2e663df5
SHA512ee869adc230de0862e45a436b1a04547ff4587f016b0bb975e8734faffa58ec9fedd17323b6bf295dc2404ad5ba19620f0c9fa0fab06a2dd86924930e9f6def3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ce9af63ac187d125a3ce958406275f9
SHA1570666a6106c99a40467f052bd3c38f601e5805f
SHA25622948db874f5436e9d1ef5733c7d0d1a000840c4a3f41b2de44ad3c4e6b1b7f2
SHA512adb3298bdb680b4546c83aa7127cfc78643fa0020d6f15c1898aa0cb762387e1ec4eeb8abecdf750595bc703ca71fa2b4ae4b2c60afb0375f1eabf9da95fe900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5069374cdfd9614ec94db78b557194372
SHA1598eb3d4329daa1856d243b16ca4f8e656c0fb9f
SHA256b0b0d6ab5cb3260cc05d4f57aabd02dbbd551478bd3907604b4677d6d8b468be
SHA51269ab8cf758d3241e2d07e415724b4e526050415c5c02908fe78f1f2aa6a923caa1f233e7aa6d8b58f4b24f5700454fca9855332988244989497653504dc777d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdbbe477da86e26aeef3a3f4d6ff8d00
SHA1c7549ccbcffcdf9fa3ad7f9df82046d7b160722c
SHA2568451f185837cbff7e17f9474f928e66dfb169db0c0b0fad1aa651e14b5568599
SHA5126b3efec500dd4e5ccd2b567c3edba112920891fddfb8450855572cd3daec9a88d667ca54f852e4420e77352298f7d6a680ccee59d0459f1e3559105800110345
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d315043e969e9d95faf83109a0acdcb
SHA17bd2ff2f711137556b3dcf01104cb9e9f8ab4cbb
SHA2560b712a26b32d1e7f1bd96514aef13dcc371b9e4cea0488b9601215327b1e8811
SHA512aaedbb2a676f2edc21807c7e7d58812b799ef3c93776a0f3b3f702b4df8ea7838ce587d2094f7f5d0425f85b441473f201cc2ad701aac6b408c7cc88b981e258
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f60899807897d055033bd2a7891e387
SHA1a126d44819e848f33029a0e75cf2f447f863ad01
SHA256b5dc622919bb46a8da2d55565e5436c3916e5e918a13a4abf6871e521f394aa2
SHA5123e9219a23accb4de287e7d3b73b4d05ecf44e4c40b59ad9594d7c26d5084b527b52fbcad2290a77507a73bc7409fe01d278e553f23a6d3da12308dc309119d80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5604456a2d64212418bd4e3522d84ec68
SHA15cb815d0ff943b1c423540e37c61d9ed49901b09
SHA2561080ce9fd6487ec7520d479879859a5eab72c09579165f60cb391e6498383138
SHA5122ee7500d9ff019376b641484d74d02411426977b7d8c7264b93a1533d0324855add588363aca7cabe737440ffe9ca36b4eb8c2995848f88da9249d8f3458bb8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5958b52505e9db767384fffa04901e66c
SHA1cae05cee9647d8019ec914bc5d867d1124b7bab9
SHA25615db6c6ac4c35964604fe34ad7c1e7c0a1dd45c6c4122c32e177acf13a9604e4
SHA51292660cd7ac846dea3d80e6652611247291b83a83d6f5cb4e9b2e927fc8cb2bd74003348ed66e58d6017cb670136b060d9dbabe0ca722d9c8e1553d3a9ffd6af7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542639a1e5397b4b802b67398c1c045ce
SHA1a97953b387883413be0a66b23c61d2f6d68cb4cf
SHA2568ae3901fa88b1416f5be01b21bcada83959c479188cc05a599c9993fa47f07ff
SHA5122a0df850772d767c2c28aa65fc07f2c2a9ca04f2832d3974cc6348596f3bd0788232cac0831be74d962b2e82ccefa8d9bcdf5dee70ac99229bee626d6e79081e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcfc9f8e1a13604b423b9b228864d9ca
SHA184b122e699679e1f93f6899659403cc3cc39a2dd
SHA25610baedb9fc42fee62407f9f183dfb4a293d060f521953acc1f5ab98abb4ac881
SHA5128f862db0358ec1cad16361aef6e66d8265c91e1f074d7783f1e85a996c19c7119cd3e27e7f289c6116bf537924f522599d0401c3d72d88535b5dd0e40403e557
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b925dd3a8591aa9699a3e44fd163d37
SHA1e1bf0631dce08999bfb323a8283d10cd6c278993
SHA256a45112c8c095845e7eb7747cc14a1f7df6efbab474412f2445b539d9b1ee2710
SHA51223b4c118778bf2a19b81881a1e6bca77471dd71168d5678d043b8b0a67343df39209c63779255bd883b1a6b8e50b73326d0a2e4dfb6727e0cb6a78077be98e7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566d3c9dec39592216de04db9b93d8dc7
SHA199c13c95a6e4b0a27c769d7a9e2b0bd68c614268
SHA256084b6784e7df699ac3e55af17927f8ee13271eb11cd091f8e3a1a3e6d2ab6f8a
SHA512fe2ec8a142b127e4ecf5e28755e1bece3dc2eab4155c6329d60059ab4323b136dc35299f32716c28c1b32e3c7e15795b31cb380c1dfdb3c38ae221b4b38ab5f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b2da6ca1405c4c42a89867335988416
SHA18d04c8e06f028c58be905c5d034c58e3ca4b0123
SHA25659e368c28dbeccfcf0f466b2a6b60d05b0c47589e6920670b692c28cb8fc1d30
SHA512cddba8c92a69761fab473d31458e2a2391a3125d6a8b9b5dddb5c630f5f5e49f65ec412352b50e0eb56c44415fe42e518f535d928d3fc7bf8b487e80d0200a2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cca0689648a73d07334a35917fd48284
SHA1e331a0d3e4d4d06c159df5b191ecd55270a78f18
SHA256c7a9d833c6a6283b3ed3e2092ad3e3e8d06720159b71fe6692eb3d3ce5a0e99c
SHA512e7d5a430b9d91484f46c0588efdc6e9f0e2fa1bbf854229b697b4c4f554905dafc317e948d03d54aef64f62a0cd7e9346c6092c99550f90df20ecf085f64d08d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b50ddf8c753cb390234c132d024a3f9
SHA166b8cd787b61d6724a658b3372c6a1d92fd5c2bc
SHA2566d5f6c48756dfc77889ba5fd60268d889aaa7d88b4a80fbe9448c1386b3466a3
SHA5126f75134629ba8fa193bb7ae4345d1cc4601bc52eeb612bbcb3eb93b76b6046396577e43c77c96c1b0c343f653a8c7e99b66d87f57da9b951529de5ab348b3470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546a115dc1625ad194af138ba85226874
SHA12f4b13ff30c261f0b533eb54cae6e0af21fd4f50
SHA2562ac9a4c570060290cf697e21e0c3d68a7b8b6ff9caf1ecd05063d31628c773c2
SHA512ab5f6a86389b746a850a826e7937d26533f9d2aa2c997aa2841707bfe228c2a4f4818caf2f5514c8fdedfda5df10ecdf55b2a65cf19401d1d4e11e037cc66576
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ef17beb5c492dc41bcfccd1d3560bc4
SHA1c48b73807ecb1984b85975738983ae5629fa7263
SHA2566cf1679d9d5e4b9658e1f5cb16abf7836dfe7529c8d7f8261009da47ee4e7e74
SHA512edc8a005103a241b6111890fcf58719458feedab42490291dc5eebe2df1783aca34bfb94500829a6d927660f554b314775735e76fbf0a78dd9b6bff553322a03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8d989452d064e1c97dbcb4696919ede
SHA141b035bf58821bc191d390daaba26d9591f8b3ae
SHA256247af934d52e5fea09e4ba8eed56e93fa25630c381d2bda7eef7f72bb1e9a7d2
SHA512ced7775630c7e8b3da32754c220454ce26939769b3b702ed209cfab65c00aa6ca998b59bf87ba9f0b354db20261838733afac43adcf5de07e03e91eefeea9113
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b