Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 08:57
Static task
static1
Behavioral task
behavioral1
Sample
387a2ed0a1dcd870d04ff06508383a7f_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
387a2ed0a1dcd870d04ff06508383a7f_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
387a2ed0a1dcd870d04ff06508383a7f_JaffaCakes118.html
-
Size
9KB
-
MD5
387a2ed0a1dcd870d04ff06508383a7f
-
SHA1
2d4c8c5ec6bdc3bf29ada72d1bbb811c9b0e7fe4
-
SHA256
c3e6bda5ac2856bc01a10ee4a82a33e3265164c49eae9e4eb541bc4716cef89d
-
SHA512
d2ab5d06b9589039608e6a1393f271f78978be13f53befcd3f29f6bedbb81df312a1a58ec010096b7b3bc7f044f97dbd4f8036e3906d5cf7f554bcbe512e0015
-
SSDEEP
96:uzVs+ux7MvLLY1k9o84d12ef7CSTUqGT/kt+YEpf7xkwdKnwsimHlVHcEZ7ru7f:csz7MvAYS/PtV6FMPHb76f
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426850127" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A0CCC7F1-3F63-11EF-B9F0-E28DDE128E91} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 306b547770d3da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd000000000200000000001066000000010000200000007dc608ab2817f66c1697ce745acc3fb7ee5e6fc080180cdbb729cc24acdf5ba9000000000e80000000020000200000009123afb0512b4e30e191d3670a3f979c8f3c135447bcc8f2260d4fc022b9e15b200000000390174f9472e2949dd4866aca9158bba031b8b7926230eafa6c214a1428c064400000003413d6465f4cbc1ccc90a16c1c24804cde4cb421fe3570709dc4ef2de2a043649199cfd7e8331b81d683b432583aaafa0fb5b72921dc2fc47c87115d407b9115 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2160 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2160 iexplore.exe 2160 iexplore.exe 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2892 2160 iexplore.exe 28 PID 2160 wrote to memory of 2892 2160 iexplore.exe 28 PID 2160 wrote to memory of 2892 2160 iexplore.exe 28 PID 2160 wrote to memory of 2892 2160 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\387a2ed0a1dcd870d04ff06508383a7f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2160 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5527a1a02b17ee86624aabf3c8c55f941
SHA16efcc7e0667af2e6971d01a8acfd120fe9ed843d
SHA256a9e7ae8ecee8f44f25dc82151303184830aeea517d588b425da55ebce4d99911
SHA512c1ab6a3170a060f70581dfc207fd7fb7012893a7c09ee7e44e39ee4f7f3c324e545f098d789f8d958278877b13d320220571d62c39c6bd978f82c222972e423b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6ac1eecae6d19b48e08f9eddae956a2
SHA1ca1dcb43d031cafadec76d9f72c5c46d60ef03cd
SHA2565557148473d8e01eb5fd1fdde868fb1ec2cdbf974de12a5ee00e0fe446f232a3
SHA5127878bd516ddca8539336566eb789615830cd7580187d26c4cd1ffb1d80cd8b2192f0f1e728c28b9598684324d54e5bf640e1d9cefcdc72e31b3404370b8fd037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cece5109305ac9a2bd44f8897fb34c8
SHA116360d189d403fdd4c03a6cd7ac9484d412394be
SHA25660cd9d3402df342b716e0872f2e938003285f1d59d0105a8627443ab04753094
SHA512ae872c69f292138a8b89cbe4368deef941c04d93582d2c7917d356a7be65c69fe1c556b35e824b58136ffedfc6399f0cb2d826ffce09036153edd4eb1a19231a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2da0ced8740beade069d6289d00ef12
SHA1facf3e699058d0f4ac38956cd1ea5e863b21a027
SHA256456e6bc97125ef8d8d339fbac6f921f4bc6fcdc16b89b2b5ff7b7dcbb82941d5
SHA51291c2ec81f8a411f3244a220662e2a05df7c033a4affd018b889244bd1a7b9cc98c2179db266ab2150616b8b8ea7e612c3101a96ae40a631024eae551661bdb27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d059552b0a1a8fd4096454cd1e62fbe
SHA1afff8d18576c6e753fbbf982af5d90d187a7cfd0
SHA256e822e809a56f9bfef9a8ce74c12b4e0f5ce31b5a095f65e90394e763da8b4c7d
SHA512d8c887819730d077e5dba7647b8ed8bcfe198e0d11ca4b9abe8c75dec2bc09d5e5807e728383ba07645712f65a6eb6eec6af538657649e863118f5a6288ce5ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b247f4bd6e284f43bf8b9298da55198
SHA19910e7c4bdf242ed4bce9fa108e432483870ca2f
SHA25610537bb12bd7424d28ef79803d6fd0c5946d11763fc8d286e56b2628eb059648
SHA512afcfaaa8d92936f7d76599bfbd1132e1fbffd66bc216c9a0dcbb335c5a9c830962b3f73cf28704878e9754eff49ce86f211a362e29784b87dd59af6ecddd1416
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5770d38438eb8d0604606f4bce2bc0d95
SHA11aee31dc17db5c89a82a285da5b41d3daa250bdc
SHA2566be0b827c0a184a864e1194cc8531d6c6d34e0a6ee7fa32b5be43dfe188462e3
SHA512a933ed1c78662dafaa438673825b56b37bdf1474f311aeeaf8aeb611cf6c1f934d621bff76bcfe485346c6a5c4c851f3577369abbb46185ddc7b1dd54d3c7860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4bf104b42f10c6ea6b7810be304292e
SHA189db74b32a5fb6e88d987932af36bc70188ce80d
SHA25674a11ae3965b114feae9fe976cd7ec58a84693b494ce5e3eeff9d8ea864ea4cc
SHA5120850e45103e231b56b597e0f4aac67b5776eeb1cd6b1e0108bc84251ca48f945858547acd359c2475ce11e298e8c2bc8e20439063168f3425fcaff5079660ef3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a290b34f4ba0d7ee56895aeccdd259aa
SHA155120d16086cee9a177303ccadb2413d8437cc0b
SHA256cd286c80e2801299b0f076a3b1e2448564826701c1c306cf6480db4612884c6e
SHA5120c54bfa91b73a2167a0efd350f06886f02372d8dd23276bab9cdf021e8cc12cf20cb1c3dd5fdd4410fc68476bf5dbfabea4572879102b18585988434e105d834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594567c10f5a450a7ac95a6fa5e391352
SHA10218b40704c5929685fce7eebbf0e544e093280a
SHA256d772ef9feebbb1edfa7f800bb819d0bfa72ab457b32a612970f203e5c1f4b6fe
SHA5121b96fd59605930160b21bb3ba88006405c79ea858fd57cbfd976ca24ca854ac214da6114bfdfa21ad072a403d30ca617a07479f79bfb872f8506446d22e127e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4d6f8df67f8642052f682fdacc4ca6f
SHA1839191c636e22d04edae0df8ec2114f00354ca67
SHA25651c462b45ed6967a4b786007cad29b8a4de620ed4e39a7811b9bd06a74f72367
SHA5125c55a9738379fe85bab090c9f306e5592f8c094ac89f9f76f6d22aea20228bf01e5003a438296731d0d69252093d5bdd4a5774a33396257cd6d578dd50ae519e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b72899110aff2dcb41e73ee1dd167c1
SHA138808779c79b837dacbec570f6feb250be70571b
SHA2568dd26a01e4076548a82bc2468a11bda973605c51f8946e19d52a3542ef763913
SHA512d8472acbce7ef668974100b322471de88b32463f0639729ba96ebe12226ec63e7eccb6d742b5152e27ae55a322b4e35cf3c8e360b9595b64bb7e4d3b727ae4d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b47832da32ab4a4bb7df2f2b7d775ed0
SHA1d7505c8736355618c1484dfd9136fd5e5698791e
SHA256a1f2cbca67f4ba4926ca00a482cc0e6cbb9ea734839c4300b4c63dec0cd48993
SHA512ccdb7e080f6ed379d12dcbc7cc88c597dc3b10c81ee6cf8e06f498d86531135bb4a88e4e21b8fe870f4d7ba557361c893ce52f7084d3136dcaefb373db529c42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f636811ca31ffc9b7296ab676afd3eea
SHA191a73c8229527598080b1a9cbc5bafb5631c65d1
SHA25694f220ca1043b78630e462c9f8a14d40a6f92a98c634a593bbc29dfd3f6fc5ac
SHA512dd05d6759781b8806066d0214f87c6f2728b5da44f3214906ccede09e4fbd78107b78449d44317f2a65bf3ae59d211298334a6a376a2bfc2c1a245461dbc71ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d43e2a13f50c48940bb34be7abc5499
SHA1b35c7400398b16e8fc847fc18232b1610595707f
SHA2568d3da4ee9f6e1e84e9877ac3bea76a2a7d2f60dc0097ccc037e3794b54f86742
SHA51259fef19f12a3d92fbf02536d4b4f5ab9ef0b1bd7f0e8ac5f2c2a11cf48ac2c0036bcd663853117d6ff031a9c1a92fda7acca006ad87dd4260f0b17e23517f328
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d65a34ac49fce661a592c4ee657371a2
SHA1bbe1caa3cd6159c0120dd417e985c1998669108d
SHA2564b91de49efc68769da86ff73493a0036fc01d4c0b5e7d6390df67ec405fb845e
SHA5126d6ccad00b03c003b0db26916b8f9100d1278a7b0b37d5268f0e2438a8daa25441a33254a98355fc3eb7b3852e277ad2abb868d3407a2760c413f9b581a35471
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f693e11682f6625f094e37a5e5b53d6a
SHA16d07d313094021726d996d2f71c685dae426c4f4
SHA25618b7b544e1a9103751a2e379557221a55c959fa8511de8c884f3ac7e6fb66cb9
SHA512ed76baf3b75fd29ef16de883ac823269383ceca11c7bfdc4a21821a660df214004ba779efc07742794aa8dc5e39add30855133ef66608f8527120efb95276fa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cc6ac3522560823e5c16a2592eea27e
SHA120668e7fc74ac69125f0a84119a9f38e8dff693f
SHA256434db6302fd5993da60f372d0afe47c46f8abf1365b65963f3de9ca526f605d9
SHA5123b1bbf02775b91a6e081b2a14245c7b2cb18e5b2a64b3343bd025c848e4951f7383562ae104ff0cfff2547898f21ce9bb8fdc60221fdce8c8ce8d6c1fc2d9a0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54722c4f87fc6edea2f17888d3a7e8035
SHA188b4ef52bda408afbb7b8f208159fa64330c6e68
SHA25630e2d951c31bbdfba7cf3e5c21bef780cf6e757c082290d6e86e78fd1080cc2a
SHA512820ae4b3bee1785e5c307c6919f9436caf38fbac4840496b65ea78a186026e8d2deb088cb11192b96c4d58ee0eeff036e543fed8147a6fe1fe2e7c7fbcf2f2fc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b