Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 02:23
Static task
static1
Behavioral task
behavioral1
Sample
3758a82c2d6bb2640d30862b1372d9ed_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3758a82c2d6bb2640d30862b1372d9ed_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3758a82c2d6bb2640d30862b1372d9ed_JaffaCakes118.html
-
Size
18KB
-
MD5
3758a82c2d6bb2640d30862b1372d9ed
-
SHA1
14a08cf37b5e7fc83776769624feac2eb3c776c6
-
SHA256
150b566b6ab6073bb44eb945fa1436117d85c22c40a9c46d7d03283cc539be3c
-
SHA512
3d5257ca6ee25eb8ddfa89072c245d027e14c15813acc2816dbc3220c6a369d644b87af7463323429dd3b4740a7650925352c01ddef916e45c09b20cf18ad34a
-
SSDEEP
384:stlIcMtu4x0GTHk9pmsE5HR6/gcmB+FnjECM/Y0JaguLZ:vaIygcgTaxLZ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426826482" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000d234236fb6d73961193707f8586e3f0cc33faf5da7cd6eaf3abeaf0f60c93c79000000000e80000000020000200000007ed49f7311c98b0f96d3d06ad76c39b1092dc0d7a707fe577a5bba56b4dc211b20000000e56fb17b4a04c5b057247b57cfb5f910f1888e0418ddf1b3e785609c9850d66a400000003eceefea64c99fa2fcf08efa11533ed8e448091fd603619009523a8ff2cef831ce9b20e19208fb1ce50b412c3cef159d8185e487350b5abb01b2ea98231b4fbf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{92AEC1A1-3F2C-11EF-913A-D61F2295B977} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8091569039d3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2812 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2812 iexplore.exe 2812 iexplore.exe 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE 2948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2812 wrote to memory of 2948 2812 iexplore.exe 30 PID 2812 wrote to memory of 2948 2812 iexplore.exe 30 PID 2812 wrote to memory of 2948 2812 iexplore.exe 30 PID 2812 wrote to memory of 2948 2812 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3758a82c2d6bb2640d30862b1372d9ed_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2812 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5320a06f1074716cb0cfd053d656c8e06
SHA184ca13347371c1ba86c65f7df6fea5cc53ea6cdc
SHA256d15a023d8036e52cf27aa9baab3cfda27255a4f520d017446667c26578a88ee8
SHA5124d9adc472a39c9b917f7f56396d3b91cc12b1e8cb7b896d284e556ae70a9843d5558f28b45c7fb1fa580a628e1d80701857b9fd89005e111d1cafbf7c7dcc065
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d65888485ef77582e800cefa7ae3b7e
SHA1f06a71c79f144c5d0d3c16af9aa5d9125297a359
SHA256b97afbf5733356d5cb95c940b3e22ce5b81f3bfc3aa3bdc000ba66bea10a38d5
SHA5129101e157ae48b878da31ae3b1fe15c11816eb2dd4f9f5a7ff548be0b607780ad81ca3396419b20a68eecc513260714cc6c1625c7c4b446f8683ebe35ec98ff8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a95f4cb7160a23cdb59818bce76c09b4
SHA11fbf116fe7f42072d3796694d9ea9cf5b0550d8a
SHA256d846d8dd4a260ee91aae0398143ebbf594ab7f3968412f115b2d4f662ec2e6be
SHA5128550dbf741ff0ff97791adfc7b9c3fc1a45de832d8795f79c29b559d9fa6bd14c8c8d269870fd2695c68e035d354cc468e7f19b51893e0104023f3b61e5af142
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532f6dcaf7529a7c7674e10e30b4dc2c9
SHA1544d1975f51c46401a60000111bbe5d8ddb19b1c
SHA25675452cb1570f48c0778ffee5a9e39387c4f74a0c0d4b25ec7385d26442fc2f80
SHA512ae1b32945ce155033ea80d13882d1e0f9176439a8394b6c486815dfc2450be1ada458953b97ffe931bbc53f40a2b0a182b446c2a07dff5644aa9f49860d7edb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53270b7da0664f89a167beddd4f62d317
SHA137b258a7b7badc626b6bd977a9075311e6e56aef
SHA256fd7ed89f79381dcedd021a7065c4af969132e05dcf059269bebcb16a7b247515
SHA5122a2c3eb8cd67bae375000480a5fee6144d0795d95bdfef61fa9ff1c64af35cbf9511fe7e0f8883c932a14584ccecaeac2d90f5f9c45c80f4df44b5a99935dbc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5010489d07c9879365d90748e62b2d901
SHA1a0d03e46b22a93bff7ca0a3c61e2d8d283ddb646
SHA256b9e6b6cec85e335838ad83d99a56261704fd38a5f0a643e24e4397c47fa22be7
SHA5126596768185a7dea13ca12716f9853828a1af2dd22ade4e4991b473f9d7219a0875923a9d5800d50a637bd3d9efaa65aee5d777c498b6e96facf00eac76895dcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e36e5b9aca08bff339b54a10d26ca698
SHA1465aca73f5d24dae23b3f5fa66cf4600e5165bc8
SHA256cf64b33ff2e39ea54214e555beb7425dbbb772313ff9d9fcdba7773d1c35ba6e
SHA512f1fe53365ec632ac938003079fcebd0f2c10635124eb9222891064f0f64f4c9978aeea2e7b9a40bb6241b0aa5f1fbd329cf5b6b03079e1d28f09930b5cc70fad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f192fa930d58858299914dcb0409b14
SHA188a34f9525deef251ad09ae8e3775dd06b87da11
SHA256b66513818626c0e212cd71d92d96d8f54c806283cd7369e5ffde65cccbe5ba2b
SHA51227be93628ea43706773c6cf84bc7d8bb31fb7abbc2b500d3f02e9091c29f094e81559d84a0b32298870da74a6c167d33a658fd4fad0c0eb5bf20c8508412e7f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5438f0a61d849d234de4f83b4cdf4cb9d
SHA191e1d7c58c09de432b26a5e24efcd171d3ef2b8e
SHA2563b73e12ebe52346d83dbba88b1143158e0eca3a0cb636678f856492cd2c2ff0b
SHA51254ab7cac7c7dcd4a4bf7e8a685947605df266ce1887fc39392117e316362fa7f03adcaa923b836a57433ea2e7f082a6eea9aeb699a24cc41f1d3c4aa466ad4cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cd02ecd06b9dbb0187bf1a96ed0e0ff
SHA159353c711dd40dca08ccec6d9bd57cc62bd41a58
SHA2563b7074b86fed4de440b6ead1e4c08316a957118ab2026ff395895a3b21c08857
SHA512cf96b685c857d661945c003a0c5d381dd0387766dd2bdcc3b0aa75e5ec4aeb26f7d7b6d9f786647fa7bfa3dea6cdb827998762f2961b54d638723882ca785f46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506733eecea2ba4360af64f09b62d96dd
SHA1a26a27bbe9e33698b185d131e800709c1f7f0efc
SHA256a87324a0e65543eb5fd0a12da7b91ebae6d8f90519e1e3faf0dee9d56b76f391
SHA5126183531d9cbbc24504502098567bb8de7604d143d86f5fd38f979bf7b32094bcf9c9f36a7872c9326249f4e46a4bc64586f5bdf5ad10443415a8c398591b64a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2987cf0f45225358d60e2bd333275f9
SHA16aa91869b8c3e152363a7e66607d88df8e3a653a
SHA256e6724d5c56b0b7ac54e8ede2ad83a73cd533c35fee47b9e46962344b5dcf15ff
SHA5120e8c914e79afd77422d6f8bdb8fd1df32fb960207730054e6c8da249c943710982b9ab8264eafc70819b9f7f66056abd5ae4510c610db6afd9294802eeade53c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5261f33c4342b703ca1bf9025796c812e
SHA1fdabab61c7e8b1c5d002293d867b56ac370d8945
SHA25647921a9700be765a3a81f191d433171ef49f4d29d9d2f95014a71c2bbbff7cbf
SHA512e30b706b212da33e511a89d25b7df3ab8895e61a105f1aa3e19967ab7008fb68ae8a7ae729a2d0ae1b0c8e825ec3f68eaec4419d7629de924d239b03be1eceef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57105e825c271ee5cd585024d30f4b808
SHA12f2617dc1be24539a8e738283e584c3c95df6de9
SHA256092b82ece896f6ae39e1fbcc0667863d30e6d377c22ed0d2b2e3ed787ea6e964
SHA5127584bd9584de46fd7d683e2fc18a7469c18dd5bb8485daf8d7c7c9d86cde2b8557c346383156a15833a7d9ca038c7086eec570300392cfcd87ef41ded84f0dca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b0035069336ba8e320b772060060232
SHA1c439924571c4763b4d5c61cf27ff02252c1d8001
SHA256233076d18d20aba9e0761574a8b5f84c83f4bd192274c99b2ae8575fd3642b37
SHA5128ddb2a1629936820bbd2dd6159a8d6d34eff1f94dd9761b336275a6a1cbcf854660282a87735ccfd030de30f5ea858c72807b20e66686a4debb8e5fd8a751c52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597ffe98eb21c68e12f54d325da32c58e
SHA1139520fb5e07390624f357316c7e2c4d94188128
SHA256ca7bdda9b2413d1ce8448b0db1804c4e623b7b8d74b6f752d7c8877181a6c4ea
SHA512997048315f6358593001d283b2e4f8663d20862c1eb020e3a5acc61f21fa9766fedaf6fd923cfdca5c1a552b23092e0c3b7f273bc112364867d004f104355951
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5143da342c7cbe4e5a7021b9723b63c24
SHA1ae1ecce576d7430d5b4b79bbc0c7026ecc1c692a
SHA25640d7b73fea2fe30f4c6cc5ba61727734b6c0a41a554a2f607d2751146e5cbe2a
SHA5122afd34d746e7816d30d39a9d4329f326d16b9465f5e6a2e2bdcac1ba5770a4838b0301f4b4f0018321f08155fbc33d7105d0d7904d1fbefc03a1ea9bce1cda04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afa8a56890fe90753ab792d8a6de1fdf
SHA1400ddc4ba0b4ebdb58f38d3c2eeeecb4ccfe2ab9
SHA256b8ecb1d460b1d4640f2463de8553704aa6ef190891eae7bf4842a73dde01e579
SHA5127a83a95f2232eefbe4a0630b8dfe4a419261fcd18d2366e949516d2ac229bf8dd1429f013cc62b588eaa6364bc56e3d21559b45b2d3a77ff5d1c9d3a9b85b96e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c5b661dfaae00d7a9ee937c4c3eddf8
SHA18fa1719e152152638b4b8d1087300acaac579c00
SHA256b7c5769a1e2019d7eb6dfc4d0bef0879248af0da6974d86d48d6a827db78730d
SHA51238c23e39a31f4a77a32c66fc98e072b93f92a84d01434e9b21b5f3347dcabc7968e91aba9e05a334a66fe7196e9612bc1ae93b6a54da9a821ce911394e88b876
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b