Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 06:23
Static task
static1
Behavioral task
behavioral1
Sample
380829bc4db165ecaa81870e710eafa6_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
380829bc4db165ecaa81870e710eafa6_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
380829bc4db165ecaa81870e710eafa6_JaffaCakes118.html
-
Size
53KB
-
MD5
380829bc4db165ecaa81870e710eafa6
-
SHA1
84ff7cf0f29958a4b4c035edc48b6dc0cd19e3c9
-
SHA256
1d943bf9457751040054c61d038b35845ee744614799ff0212aacf78190b89f7
-
SHA512
da20269dbc25b177ecb5142fbfe14239ba3f757d703ccdab66740823db47eb39381ba08a60f99222a89dd20dd83548c5dfe7e38f74294286df57f88d796d20e8
-
SSDEEP
1536:CkgUiIakTqGivi+PyUgrunlY763Nj+q5VyvR0w2AzTICbbPoo/t9M/dNwIUTDmDL:CkgUiIakTqGivi+PyUgrunlY763Nj+ql
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1094bbea5ad3da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426840873" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000006bc8e0029a3360e30c73ac006a4606ff2b21f1751c0abe1f6bf7be691ea1a5be000000000e8000000002000020000000bcfe97ee847428ba7d288e73f6721fb9d30fd818ddc8387ca81e42d373970e662000000024562f87258f93e89135572973e159a7459253232f757d533dd22ab23c4d8a9d400000005c1cdcba5c4ba9530273774b9a9d1099d08d7a0e373ea3edbcbf21b4b7ae3ca6cd137d38cf158bbe14854c4f50d2bafefc2b18cfb8b4c938414cd40279f9b393 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{12F40E31-3F4E-11EF-B707-6AA0EDE5A32F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2340 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2340 iexplore.exe 2340 iexplore.exe 1724 IEXPLORE.EXE 1724 IEXPLORE.EXE 1724 IEXPLORE.EXE 1724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2340 wrote to memory of 1724 2340 iexplore.exe 31 PID 2340 wrote to memory of 1724 2340 iexplore.exe 31 PID 2340 wrote to memory of 1724 2340 iexplore.exe 31 PID 2340 wrote to memory of 1724 2340 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\380829bc4db165ecaa81870e710eafa6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2340 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa03980f4ad62f5b4cf7f34fdc946e72
SHA14f6ba5d696f816057c574480314b554dcbd953e8
SHA25698b42f0e8b134a5c305cf1d2e7a1f500fdd902c47e2cbfa26358d1e96f098f04
SHA512c47be1c89df9a124e6fe9a31defc0415a992b83ed272972ae0ab7f61960f8eefbf82f72deb85e550b6c9968f3058aa78e6280168c5c88bacb7d60d1960dd717e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d26f5735211f053e376a7ce5decdcafc
SHA1b83211de14685bd43f712380411731d2d02fd600
SHA25644efcffeb9cfff437d61fe112d9828c122d88f8d3791d3fe4d7b5c8e9e43a2b2
SHA5125568d89fc88362beb550570119e6c6392872195a8f7ea1b365ae054d376d1046d412dda4df804ccb84c208803140005eb63cc2de1657741bc677e9c691cd4c07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55020c25251ffe85d6683b74fd536e98a
SHA1d2060b1642c0220b91fdf3981cf8fd0a5164d314
SHA2567b4ddf12c9a89f7a01ba8b9fda8732eed3601e532fca9562820e5b0ebfcd47ec
SHA5121402ece32383bca26585816db52775006152fa197a13b67e750dec4def25850412e2fbb79cb91edf28e3cdde372029e06108cda3544614b76889af174ea21ab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a492aa251d2c18ac3eca40a4c00768b3
SHA1d483087526aa0c4f0f191f2bb70e48c0b0f50a48
SHA2562964f900390fec82cc9b9461468e33024f719eb96e75cf383ec7e629ba16192c
SHA512a7572a2a7118e7b49c7f4b2f70a32c82026b71fa8d47b048da12cf22d08506352fd595f4d2d62c72901fe8fe4bc4c50fe180712c7dff9b1ce33bbfd5cda92903
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c76dbe47e17ec6e4e30fb9661fe6a93
SHA14dc95c96420de65d516bc0a50517f8ee50ccbbc8
SHA256c36def41c71ab9b420b99d2aefc006c39f65aad58c648dee9f321ddd7f2dbda1
SHA512692387f12132d23023b0dcccbee0d497f0232f46b5878b3c919df49c76d11e37228991d7664b25fa54db3e236ea1004d3b5475f9e16ffc85adff22e00b6ab4cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c00ba27f546301db38465e0c7c52f65e
SHA1c35b34e4fd0457ee935f78debd14bed69b1c1ae4
SHA256c41f325cc80505472f368e2e39874191407a86f49d86f6508238f69ff3a40759
SHA512cd9476a319e11e3328c24671c38fc62ae2cb2d8ef62592dd8459676c4b0a321859d4adec1e93f9842a3babef344ecd55169e5555240c6d3cf3a24b800f6e055d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509f9989bc329b9bd21f987179c8d810b
SHA189c1e3affed657003aa1928a98c3151f1d1f5be2
SHA2564d25267794b564baddcceab91c8d543ebd153d2b52822b732e74ebd8f8f28c64
SHA51249f26decd429ac082fbf807e23dcafc61f6d028be1a0d83a5cbc6f4f3151578375ecd61316b7f64aa494aa7f4c882d144db7826bdf0b7916525a1761e49a130d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50323b87fd09f081b6bb469c9ed957797
SHA188619a4d0f1b64bd8211bc9ef4ec906f79ec3c4f
SHA25678c14762ec7bdd06d11a77944208b73b5c62f724b12f87ad0f41c1799223046e
SHA512f6d7a945618deae962119c8dc3314023b53f6ac78ffe63fa1b63d31dc9c97487d6f1d3c00d25609301e36372773952c8261606bff52e05393e009e503c309dc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53898572f3f8bab03eb264322e0ed84ac
SHA18cde6fcc4f8bcf7677fe1075fdd5b5bce14deb75
SHA2562366540c903f990cd05a9dbbf1f39dec0364cffd7ccf1942a3c041ef431a77cf
SHA512e344ee8a07fda229cbe05bf49e54cc1d89a9ef411fab5dc67578d421a9fba032a05f1b5f465fcc4d1f3bcfe0b7f5f93b00f4137fe1ce7dc1a44505b6c38961e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fda4204e8f5df388d774bb409fa6e61c
SHA1b02f9b2f5ad0a9e5048a1a3834939f4b3d7d81d3
SHA25682147f7df32b66f4ba39bce4bc3362093609b3ec53ebc366600c269351c15f15
SHA51253b494ea3cb132ab98a6871628cb89369c27e9704fb606b8eea82cb6a03f5317b71536768ce46072b928956a8b355fb86c66486dd551e79ec29028aac354aa61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c6c9756deac55aa568d7ca83fe5b3fb
SHA1916a026fb85c599a9dc8294e8d9f9700c80320f8
SHA2565062f9c11b45e87d8f912721d4ddc829d1377fb3981fe7adf85a6882c156560e
SHA5125c22f8fbf9dd5fdd42395fe8a08de992121cacfa3e800a88a6deb76d2d7bbab32dba7afbab23cb62ba344b6a3ef789ddfd9e064767d461eb4378854ed4cf620c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516d30dda47ca356753aad57afe8758b3
SHA1803d78bb9424ddb2607d3bea47df00d7a4f30254
SHA256b0a7722639c2f6eab79da65ba271d3314ab721cf1ec6dddf335afa0c7f45ef39
SHA512c01c487abb5809c7cf5cbecaa40ce471c7b87dd5de3d34968c73a2ae9688fb538d5ba32d9f74144c6fd3bc26158eadeebb5529defc46435fa83ae185f5785589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533c76d1cab07b4f1f7a84e86fda9cfeb
SHA1430a37541c5fadc8a9cd82a3d31e46c39061623d
SHA256e358971550c93ad95410aa2ded6b97b276f96a4f118a7c18021aed549f3b76c6
SHA51219cfa1856db71e1c91faca17637714819c6aa97600968060cacea24b15b4e4decb3e338c3a5c4ad4ce60853ffcfdca7f9e429b608cc24c2303771890e227074c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ddd6c65d1b636212c34a8f88597a13a
SHA19d779e03e59a7bbd43c0d0696696b01380fbaa4d
SHA2565575911660e09ef02f8411f575a66a39a820180ce63dc0b4ff0351c9cafdad87
SHA5128afb4720f842e8f7699530d3869be33fb1d89c760998c57b8bf793fabab8afbdc666101c00464a06e578adaa56e856588df6683843d51e7c1803dcc8ea98faab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f105d4f5dcaabb2b5e40a5c29522803
SHA18f4d562579dd92df9f123142ecd9b3492578a125
SHA256d57d80596f4e1d7237ad8a3683df15d56cf5a811e921554a00740b51d6734f91
SHA5121b5a7bfe5c6aeced921c0e8f4cce04fbfc519b6bb749a208a4a0a0b4de3565a5b640da80d91d7faf63f5dce33acfdbb3688b84778c609b0d04230add44ae727a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cd444ab3ec5f123eaf123de79ef9271
SHA1e79c8f301f6572c09e76a234b243128532920bc9
SHA2561ab55efd6e91388a089df199a77f3a25d5b3021ddfcd25335ceab82c1866d0e8
SHA512d8c22d38abca435d5ff08a995e64fa0bc1cde95efec1b0e7ba55c4e4b5d508ec9515b18b4767a498a3870015951e4a5696d1ab8118cd777e2a7c20a574bcc887
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7b195d0b94452854c0b4b8581eb1901
SHA14ccb7ba502aa6aabcdfd04486d557e2a67eae7b3
SHA256380bdc384d2691445321dff6694273520f85d8517907f9c47637d9017e54998a
SHA5124c6c8a20cf5f4881c7b5a91c46b5068aaf40eae83f4121f9dd01c58d2ce2b4389ea8ac1a5c20a00a7814b7055cd7923fd3fc7f0c92873224e21507b4fa396867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e3f3c897c890e8a1898ed8cb8d0e276
SHA1ac7ed09ae70d656adf0b886dd25934191533e3d1
SHA256509657540eff290436e9356a0832963e992527fb714836b1b13eec94406c7dd1
SHA51222e3e6a74779d06dea4b95523254a215727d24e603c271b8efa9c5c4a1b4a5a3ef08f761a93a0dd5d7569761f478018e9535b3f251dd73870677211b4dc0019b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e029ae852d81e7310f0c94f2fcaef42
SHA1a0b672e5c31ed227afcdf4e958099bca30662746
SHA256dec42fcc8db9b074b415967b19fc0ce2430f1c67ecd35cb4df3ae23069868592
SHA51296eed58b698e2edfce76afd2531f427595b642c0166834c11fd56b5cd11940b6e56bc5763a9d40d92eded571ff9d5934bb6793ff316a148d3fe2f12109408f99
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\X761FPIN\filter[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b