Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 10:29
Static task
static1
Behavioral task
behavioral1
Sample
38be8c15d11cb22914d259b6d1ba1d6a_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
38be8c15d11cb22914d259b6d1ba1d6a_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
38be8c15d11cb22914d259b6d1ba1d6a_JaffaCakes118.html
-
Size
56KB
-
MD5
38be8c15d11cb22914d259b6d1ba1d6a
-
SHA1
edf969021a825af3a2dd5a7c3d3de55db3380515
-
SHA256
39f4e84130eca11a831b40b9bef4ae31bb3d1a09fba5c268770f995269df7f21
-
SHA512
d6a7f080ce462118f3b423f21b0f267e66ed7c270c214ac07fe75aa78d270df50a194d322dba98f414d3e20674bc68c9337be6624323a7afd910710a10e5d26c
-
SSDEEP
1536:Sg7paN6KWvDdh+yPZgKSHC41NrCYwnNgztBMEuvHzV:Sg7uMrp
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000cb96988c0989e6489c4f02020624e639d8dd98df0c3422dc3c7e3c8d52ecdde8000000000e8000000002000020000000e97f506357a6f0d668f719c729e0c988b3a26525ab2b26e7583d4db2492759e220000000532e5dc841fb64ff0cdfe493eb0296fe5706eabd9788bb59135e5e6b067ee5e040000000383e66a1db40d6de33199474881e3a490455f1cbc17b6dd9dbe46f832c2d1e79bcf1a5f3330d8f0fbba5bef33ae82e24fb8e167e3306a66bec71989071593f47 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{68CF8421-3F70-11EF-9629-7667FF076EE4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426855620" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 807f853e7dd3da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2256 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2256 iexplore.exe 2256 iexplore.exe 1692 IEXPLORE.EXE 1692 IEXPLORE.EXE 1692 IEXPLORE.EXE 1692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2256 wrote to memory of 1692 2256 iexplore.exe 30 PID 2256 wrote to memory of 1692 2256 iexplore.exe 30 PID 2256 wrote to memory of 1692 2256 iexplore.exe 30 PID 2256 wrote to memory of 1692 2256 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\38be8c15d11cb22914d259b6d1ba1d6a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2256 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d267b524156c15d4a415a875f738d243
SHA1a71133aa5742f812d285147300833d76f8892563
SHA256bbea782f135bcbdc7f2e926e66c4605ead57c82e67a7257cf111f2b30e981a6d
SHA512607f181cd02fdf922b8339ac5a522755c7cdbc4b719aea8d2af1634a5311dad0bb25ff924abe9aeb88e07204e9c659f6b7614340252e5bb54ec5b8e3eb0d47d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5528f47bdead426e0326fb41fe1bb56a2
SHA1715d8155ca76f47b063b48675f47e3c5a95a47c8
SHA2561fe1e877f118310bda28fc04a495601666942f1b2eed02ec8361a7eb2d5fa821
SHA512fd126f1b89ce3d3e058e8ec7699e88847819ac5eba632d227d2d29486dd9f62d12490d7d811606928a260a1010411e5dfa8e2ee0b2791fc6e3796692dacc916f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5e3498b9625405dea250a4f5c067cc1
SHA1dd6dc856408dce03b35988f2b406a988cab53a59
SHA25634a2160d62556f6b4d697d54dd7ad99ff1f76fcefc833f3562c29a81e2b13411
SHA5128d52f8acff75feccf828f216826487d2ab16a2c9563544d7726f16f57a24c9f044669269bdf034342ad909238ba79317e6ef3e8da41f5d3b114bc85c8c4ed037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c6796345a144914cc44238c0b1d6c5f
SHA1d1b5dbee8156287ed38cdca0126e463ebfdc1761
SHA256a6e50869c815e0ddd0d6b46ff16c09889d4199f7d001d9069f90a60bcb23a5e6
SHA5126556fc05981c2eb00e7e60960b7f7e475c925604762908f9194b4dfd03fc3be2353093ef272fff219e28d38566a57f949eb0ca68673fe95d5db4787498b05559
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5782c5bceceab6098ff40e810e2819914
SHA141c84a46cf750fe72b5f8b8a00510f40cd37045e
SHA2560874a717ccdaccf829e2e4bc6265bd056364f56a1a0706576f2615e4dafaac60
SHA512a6650a01c9a3e1e913e0c95eba408a4be752f29e26ac0f8fe5e42fe2ec3fd05f784714ddde2df6fdd9fbada336e3d5dcabede8550de841a696072bb94c48b41a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573a28e9656ddb0337bc8b44a5cb7c893
SHA1121b01be40244b99a991c8d23b80bc09acf67604
SHA25618c0a89c97e5b06a087b661f1876ee765b1264843e207718cb30534b15ca412f
SHA512e55b294737cbb65011e0d6c3852a8de97ab63ea371a046932affb802c88e70f00372bc6dc586a596eb5db49c39b804ed221b660677ba78a4d9bfb477e6a04bcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4b40b8a04a705a60d0854a510a11ba5
SHA10c2f8f657ce8c97eba572afdb75fcbc869b3e527
SHA2569ae8c5bdb365627a81c51b992411c99e1bd7cbe93808cbb32931b76b01f03320
SHA5129719001ce0de0fc570ecf507fcf4a1e452233b429e9fc8f44e00cbf68438731b6c52a92d61abdaa33b875bd4fbcb1c5a70d8ab26154d5b3340380b399d68ab9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5451b3a4cf28ea54dd096678e66d6bb45
SHA14eeb61c58081700010330a2c60eeb7595e75f557
SHA256a8f2b7f157bd3320f2eb4fcbeacd2db43d9cf9b45a88ea3ad1eff16a06e216b2
SHA5123de2e109599695772b53259f3645029dcb4124dc618783c9304fbd75fc2c932fa215da9c3bd9c35dd0dd076c9870cc9232786c34e407e99d4925d6d206dc1a56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58830c5b10b8946a706748f22fbdc0347
SHA11ef0dbca32351d8a1d00fcd869b3ac0ad2219ca1
SHA2568b78341008c058af6830e41b8ca3bcd8ac270ff26a029667437ff99fb0d80c93
SHA51273d9875f8f9c72b857be2227482ae1deea6398022c4182222e9a520e48c6a7ed46a35d8f4d8597b99ee3efc56fe455fde39f5001be6d467a83ba84b5c27e044c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7f4c06562062b27bcf12961117ce334
SHA194cf74c2cda9faa9c9bb1ee3ae426fc70578b602
SHA2567ec91816465e2cf6f7586091c298db58126f528e5f581c3f758bea0d5ffd37e9
SHA51240fdecdb654e712af65e5f861d19de7d8203d346b66e1bef2ebd7678dac0d4b775610bc524d5ff6efa6acf32fad2e35d88e7929a782110c64dc56df93b5f14f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b13777f297d72ec0dfbf6d90d3198007
SHA1c14fb04bac9a927f7fb7201c3925070e41e2045f
SHA256bf7399a5575ee5b309308820fa4a31b1df2cf5f1a14dba52ead7998ee46fe447
SHA5128510f647b92238a1266768c6cc7ff9d9870f99953c07cb73aa616e894b0d38da0bd8cbc731bb0e4f60d10a92309c6551a1d92da95c922debb785bf02dd9cfee5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c04914f63a2bb30e46ffc79e9747b9a
SHA17635be7fac6eaf382ce37b722d029996a17a6967
SHA2564150a91639493dd7359e8310099358eb37d2b8ab220467b806aa3c5014530b0d
SHA512ec89312edaeb0e0903708b3fcb396c8ea14541766661ee19113b8de1f780dd1a137756280258b3370cbe0bd2058b7434087de3d34f74476c57bef37bc7d49f2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5bab084061ef55257953cc7a338b063
SHA19f32ae397ceefd5becf278198f89e2e2fc09114b
SHA256fa014da9fcf964d134edb63e6f538f77aedd02033830f6d152c8a10ed8227b5a
SHA51203a17630c548258311f23ebcd61d2f16cd5e5db5e283c3999eda0e85b9dfd8ac672fc359d73a2700f42ce29dd3a5fe1a607dbd9efb157998540fe46e447f8dff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bcfaa77f3a6d65e4aa0d0640c377598
SHA1ddd863e8fafa6c180986ad0c677b849dcbc1ecae
SHA256ec7bc7b47907a5917775712f9b5fd3cbcf3e9cd49187490e0ce12cba1950cd24
SHA5125b82a1358e8745ecac08e16976038091c3b5c373057d16fabdcfccfb7e93c4cffe2af1fde47d09c6d86522c05252ea24829110f8f9a4895e5485579ab4a24a51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c54375c65618f348dcb6813775180920
SHA14b9d3f0757b6a5de3f62dadc3ceedcd3d35aa05c
SHA256d9022fb4331634f0583fbda4d419cd784f58d945370f0923e0b28f8842fcce38
SHA512c60d3b6a00ee7663d4c135d7138037fedad5edb357f538f7e8e0cf8b7ea205d48beb10c9853026434cf3f89dd5b87f919f1bfb34f44284b98b342deb39a7f9ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d33f06b6ecbea971f7d5b3dfdac43781
SHA1e7fb2ef81b55bf38f3ffff5bcdb4de3559467383
SHA2564e62aa4ac01a57bcf76c2fd1336d7fd975c6f15f9555c76b0059c06f53455a20
SHA5123e67d8e3cbabcf7b819058ffddf575199131bdc59f3d07d4097ec328b18e131bd1761b2fbcc0e671c37f9afe8ddc6b675cef29d7372c8db2f4dce92ba867c440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d21e2b3325f2118efaa98e87c66d345f
SHA1e190197c51a7fe69afeea9a1ca20fd140c30f969
SHA25686a45e195e58889bd101c334174669bf77c15f25d0f03b6aa2d8fb3b37502616
SHA512c965bfc390b385780b54f1d5a5748ffb8d88306aa51e956fd8f1ac3d17f6c5368c0b45169c0247e4fe7eeb355ea929b95d0a1d97252209173d861f8aa77a89ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5772ea473283314f39b18f59fa8585672
SHA17e0c2e5f1209ebccddf0bbf6e3b2dffae6eecde9
SHA256fbc323002526e14b6820d71d55e9d974823f1e567649ee3e5ae8f4e5671715b6
SHA51299c5d21e966efe82797c5f8e8824fddae18c686f8d4b944d3c5b5748603989cf2dfaa0131522dc9d1950d43591d233354a7a7ca748e0c6278b002cb884ad3ea0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b