Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 14:50
Static task
static1
Behavioral task
behavioral1
Sample
352e14ac89ce56818d1f2a86f26b01a6_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
352e14ac89ce56818d1f2a86f26b01a6_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
352e14ac89ce56818d1f2a86f26b01a6_JaffaCakes118.html
-
Size
53KB
-
MD5
352e14ac89ce56818d1f2a86f26b01a6
-
SHA1
cee632e7f80d3bb1489859f699a8946d29a21a5f
-
SHA256
cba33bc9c56b35f9bed6c1d6de82042fa3a9793e36c0b4dd3631442f6330c065
-
SHA512
e5a08d16038e9eb06616409f5ccfd16a38da064d0e84c2b8f7d5384e59e48eee058e4498b309420c5efb2e3b0cbea08e2d45e4065605f4b2c827ef5240255c6f
-
SSDEEP
1536:CkgUiIakTqGivi+PyU7runlYR63Nj+q5VyvR0w2AzTICbb9ou/t9M/dNwIUTDmD0:CkgUiIakTqGivi+PyU7runlYR63Nj+qm
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000000afb493a39d874295d12814d34b5b428d91f905ec5e2504ed1f7c5ae1a813e15000000000e8000000002000020000000cdc7172897517d21d259dd3e3bf4ab2e658ffcb5ccb2fe795f38b8c13009d9b4200000006dde0140addefaa1ecc46063ca4b2729dd5388b69c2b423745d4ec72868ff7814000000079d572d04c1660782b8304359391dc8b191e802196ed313b80aa90d2c62bf9d08a6d1b39e6d3cfb695dd027c8bc99295e5c1079f2e4cef470545bd80dd57b444 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BB4C4DF1-3ECB-11EF-9452-E2BC28E7E786} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c040a892d8d2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426784889" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2484 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2484 iexplore.exe 2484 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2052 2484 iexplore.exe 30 PID 2484 wrote to memory of 2052 2484 iexplore.exe 30 PID 2484 wrote to memory of 2052 2484 iexplore.exe 30 PID 2484 wrote to memory of 2052 2484 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\352e14ac89ce56818d1f2a86f26b01a6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2484 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5158b799952bb7a8df45254c3e4a95401
SHA19967b1bec33c5b03786fd615ff98cc1c5e12227e
SHA256df7ee447cc10ed042c97c1a26cf75f6a5133361ca0f2482878976aaed706204a
SHA5129d7b239c7315ac962428773d6937e40f761e8b6820b4203e93b6175f26509add7520c58db65d78c796d47c54f36cf233a16b42756a64fd6a37f8708269340e3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5b3c6e9c3ffed209033997eb5a41fcf
SHA126c4c2517162b4cfd9301ab92dcb1c6dd6387054
SHA2567db907d4ab5cc9800071a49b58d15774775999cdc0c7e9c5696b30bc1b1a6258
SHA5128adb056430fc924f4f2910d2faead94a1ab2744c41f79d6cd3e40fb34341caf3d5663bc025e92e6678baf532eaa6ed7ac3b4ddac9c433967faf6f705cb9b326e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5351e905aea567da8ebc9bc8844fc4a59
SHA185bd3dd9049725fb63c664ddfd49f76dbe0fc66d
SHA256f9eab532f00120d2195692a54c95e4178e37c1d435c7c1b904af229c73f07775
SHA512266dbb9e355cc11013254ea9842b947d2354e6f87fabe22afe4c4f52426ba22768c7b692f2a8f4a1ef6696045b810f582fa43fcfd80ab3655479ad22831225f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590798fbc9be596eb8ee4789aec53f7c3
SHA18fc42bae4064ce58bc2907d8b0beffc0628c5e40
SHA256712bcc40babded39b904384386286c02d2760842e0b4f6fe0a7d0e697f18ba76
SHA5128b1cc0cd678df814f66128b002c38b46669fe210ee940cbad9f5283659bdf1aae273669ef9359e3f2881408d4ea043269097c932f3a06195901c709adb8da6a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edf8c075b2c328c46e3d241fb8ea0883
SHA12f90b235bf869a3d0342e584aeb508ca028fd839
SHA2563a2a5d0e0382dcb13b4e759f9f04987fe9ca14a8a32f048e894696263a3cc2fd
SHA512af9af007f11a5084ed54f49e8e148d330c5dcdffbef21ca014624200f62bcbbfc2af62d93a72d68bf4a593d27ffd857d1afcfc89cacf317968c7e18a0ecf910f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581c6d2a1bd3d4ae00781abc52c99efa2
SHA1f525a704edc0e279d4927b478ad11b8d7c3a749d
SHA25658017e0251a2e8298931bce3fd8e7a1cc1482ad53f1aba7f72277c15e40c4ecf
SHA5129d74a250430ee9e89d3b997bf744c713f2a23cc1196094cd3af2c3aa28aa0456449c858df996dc0440323fc130c3c6a659b0ed01358e5829c4eef046dea73320
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d98c89359708f2fe9a572fedf9273407
SHA1ef95849c02f972ba04bc19420f5799de73cd8b23
SHA256901e315490ff972d950c9b8ac1ead6fc0406e6f83c4eba3b76c66cb40fa481ca
SHA512d5c54e3803d8e8207adde00f88abcc82696ee12fdc98524004033a037e58ec788e86eb51e62edfc7369ece9fc354b03bdb34d0c4b34dacc81f754671a756c61b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550b47859b1b07f941e24d7d83c202f90
SHA1ab7ce50cf14149fd74851c615108e9fdff61660d
SHA256e3b2c41ffe34d13d194ef73c779a9464a6842913836a2481be477bc75409767b
SHA5125940f3b7aec4af37127423f4bb7622ea6eafbff2b692a50d25a044487945952badc9c8494417db2174a24eee611b69040a2ff4b9f2f181341a60607085595649
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2aeb7409a7595f3d863988ffde9cc07
SHA122c0572b87a1892fc7d5a771702b53317f66376a
SHA256d01a5c81a1aef0f4b01e8097c4ab24c9d429ce2863da59013d57bd6677bd45a7
SHA5129b18b777538e6ee6c4b7e9e8f44a31bc12e1b0ca4d5b1ddf7b9dd9e6f99eb3c0c44c7fd1fe5ea17b8dd4e2c82a05a5f2f98df0dbac62ad3654c6dd5f44f5a94d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543c8176dfa0b3abae9c8f632006d4653
SHA179bea46c2ad7cb2038038bf4280a3dae411a38cb
SHA256871a0a920a2dcb23b2054c238f482ae61dcdd35f81c8c1285d7d0a198aa7e11d
SHA51239ed04b9cf14daada8557e5ed1ae7d4436a3eb922d38b6f7815d2fa4ab1b68fbab6b3b846dddb9bd10cafcc55afb3c0f7377b4bdc1d8c5adf79c23ae5635c534
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5c6908806105317f04a227565322700
SHA1fca5c833733f06cf539af520beff440b0ff1c567
SHA256234d96114fc5906c1d13262d52fa209a98883747c72e5e04080f226550a50ca4
SHA51267cd7f13ab54741ba8ecac76a055d80d6bff88862d795f88fcb9d61285a0cdadc327156dfb77f0f0e58ec773f51717b58b0d7a23e2776733e90fded0a57e6ba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539d8099051e2cf00101974d94ae246bd
SHA11329fc8545d170317a18c0c481b97c78f21183c9
SHA25659c7fc047883e1ad1e26ba9a92527047cd73ceb42255e7d223417ea4802f7ae4
SHA51285e453191cf97af05a20c42cbb5ae9fba861035667e1c502360654880240f850823330d386ad86006cdfe19ac46aa91acbed3c0e083413e8be7775bfcd78f7d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548f9e7b3b8cfe9bea59e15386fbc1720
SHA1b328b3a6cec0d248ccfd34dc93de471bea3bf9ff
SHA256440f2b1b531f8d87b909e2744ebae102eb05278eb9a4361a3029102961f79f62
SHA51287dd4fae68b48f27e443f417ed898a11cc0c036152d7cad1701aeb51ed2add3853f7b019062df8995795a75c46372aa3490cb1c396135eca107abfb3060828dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5983b91be113b0f1cbef37e247247986a
SHA16bd713f16a59f15fe28c346c1b2369d4aa8be5dd
SHA2561b8f19e4f593fffac825d288de4edabc356d88b7e8dd23ef493a2096f303d843
SHA5123c12f1cd390346187e93a3232242a13a02a1bcb0c6ad59b9ac091bc306df3a3b24802a964a727a122fc429ed02aa06a20cbda28b5b039517887cc0a2212187b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530f03802e598f6a50d7de17e36678ac7
SHA12c238111966f1c1d85ec779e0bb4da3759a53a01
SHA2562fd63773fff7222faa1a144031e03d3820e9b178ca4906b591611c84fee564bf
SHA512fe89ac6dcba165ff6072c42f1ac19227695b5b0570997d190075634d8addb4a987de85093f9ab63cf6b3ecd71a3a09e8387c36e9458e88190b58f96425e9f519
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53996776f67d7d2784dc43232db50ad4e
SHA12e94fe8819c62478f0a36f318882b6ef99e28e04
SHA256f85def28466cdbcdf4b61dd8878b646555c037358b6f5a5b29d74b45fec0fe6b
SHA512258f2bb60fff2391e78db1570a00a0a9b91eed29f7dd0fa9f6d69566e7b5d040f7d9ed28589e97d3e6f4f67b7a26027719e5281c42cebad7eec5f210f0851536
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e19d978c9ea527bb7c680c9fd3d5f6ba
SHA1a87e1e6010624d21f1f4d26c8ce97dfc48a4c650
SHA256f0d00225ebb09f37207a5c4606980183060c7bf4f65a32869678021a13a508a7
SHA51273316c06f066318c01641e88b92b044c40e06d86fcd156d0fc0556b2cb63f4f054f2e5fbaa7e3d4e2f132bd0c2a01dad7757c926f168caa43c1b8a84ef4594e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2a22809c644023fa9c9da5b0ca2949b
SHA18a5536d1e088ccda5c347a8049c4c4c032bded2d
SHA2569bb51a1e162b4e13c7874fc08327e19d55f1659ecec41fad61429ddd893c6bb0
SHA5127d3bc76059896a4ad2e640956800c0f0517e5d0ae9fa96803f9cccccedc97f2dcd17c5b9e12265061f1e7a48e40c554fc02706a40b3c0409b1dae02756a990f8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UQFHO95Z\sha1[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b