Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 21:28
Static task
static1
Behavioral task
behavioral1
Sample
3ef335f78331dba2e5feee7354cb1afc_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3ef335f78331dba2e5feee7354cb1afc_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3ef335f78331dba2e5feee7354cb1afc_JaffaCakes118.html
-
Size
6KB
-
MD5
3ef335f78331dba2e5feee7354cb1afc
-
SHA1
e284149a9db5f171256fcd346ccaf8f7d7c04147
-
SHA256
438a5c436bede9d96b7a551baeed0d4aac411702a000bef2558a39d5723c6587
-
SHA512
83fff6967c8b2109bc882f70ffb32962c56ccb0dc8dad40c74a59ab0a6ea2ff2e7a015e9cb258e80deb07199d4b3a59e29ed841d029e2f4dd0880ed35ab3313d
-
SSDEEP
96:uzVs+ux7ZULLY1k9o84d12ef7CSTUkZcEZ7ru7f:csz7ZUAYS/Xb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000ba431e563e256132158ad7d713e541fe7e28ae0d8c76143fbf1f8ecead064fd1000000000e8000000002000020000000292277713b63e23fd5f4f9c57743604fb7de61925a6182955687b0cd887c678020000000cff4b05c4b196fa8cfcc175253ec0d06e8d76d625562f15bf6dca3ebb2645db2400000000cee4095f4dbf52758493f4e13add9b99e7246a8fd8b465877cb6eb8fc5893c8c871d9e094a3099bb335f096ddd968fc7a72c3540e8293b093b07bbe92268592 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426981598" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40eb2592a2d4da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BB943DB1-4095-11EF-8419-5E235017FF15} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2412 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2412 iexplore.exe 2412 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2092 2412 iexplore.exe 30 PID 2412 wrote to memory of 2092 2412 iexplore.exe 30 PID 2412 wrote to memory of 2092 2412 iexplore.exe 30 PID 2412 wrote to memory of 2092 2412 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3ef335f78331dba2e5feee7354cb1afc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2412 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dae2b81de63145a0b216b0b222c72dae
SHA1b4b1b50f9f31a045d1dc65aff462cac812502b6c
SHA256acacd5db81ca7522866777a684d1b79223de66bc555c1c20f21eca6c118c70f0
SHA5124b6c88842159cf8f8e0dcb3d6ed26ac7236c766a3c1bf0f378d72e4be8eb9a5ddec414f90c0ecf2a64a3dce5394a170f5f42d03c7d0b645363a4ade22baf49eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8364348a900b19cc3a6f781f7f1d844
SHA11910e30223b6137c32e27145cf6d08ff61d86393
SHA25624fb0eff4a76d19da1e64f63c540f2f50268de5a95bfaff9d28b48defb66a57d
SHA512903c9c8a0ed6bff84ca08e9090550f48ed638544ff7e6da9f212ca00fca0b857478a3146487c5bdc404d8dded830ea9c251900f22818e48b9c318e86f5aa35cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5183287131caa94d50b0eb61f1b8249a2
SHA101b3419ceaf5555366cb8f6c113c9dcc43e02883
SHA2561987938a2a4853106f919a9bce2966f65f42b9c0fc533e7f1708ad626fc35fb7
SHA512dffca09853f8d9155d80e5fb58fdbbca0ab897a3134e16524e86947d08ab2f90fc753bba818b4b8b7e894d1e933fc53489f87e6db5f3fba99d09776975e9e662
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52316c044837548d895af19889bc31e51
SHA1a2de362d67c6b4470c2264e34e13d2c4a8d52ced
SHA2560509a189510660540e4d3b36c59d6e4aadb6d2785df8dcf1409f7ee55f502b4f
SHA512eaf281d65986aad95246e836656684675e22d817860aa740c94cf636e22620cb0e0ab33d998b8543fbedf0e853de298b8a0908dc860be9d12894159a9b64f2f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c41bdce5d9ef642b899ba50f46cd0982
SHA1496d5e10e1d1e4a8d4c660d486a9bc34d174b2e4
SHA2567948c40231765487f2239a7ccad5a42413b44ab41ed57da33cf2366c55c7d72d
SHA512904fbd697ef7b66ea2a199816e402f97151a0f25bc1fa08d1cbb8787bff87090bf1ec081254dcfdb197ceb6f9cc52556ac0ed3f49e1389ed7799184e10772549
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5560da8bb9cdb1fefe454a145013f3d85
SHA1414d5b19e14cb8e9b7a9cb70d3bceb1420146cf8
SHA25637bfb64bed62ec8ebd7dd0755c59075976471f47cd2a9af8c0d652c381ff7599
SHA51247a1ac4ca0baa01d1119db70fa5843f40caa6a671dccb0677a93f78e3db83181a718bb9c18f9c6b2ede382fa870ab7a200a10e2288156e6a5c078d05af5ad69d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb454999996e87f48a96e49511aed354
SHA1963f4c2e5a8f4b8222a6796667bfedb4be146cfc
SHA256572e6834c49a856c3e34310565bc388741477323e61fe75ea4e5d22f4027784d
SHA512bec457487f770b3d8299019f986b80e5b9404f3308512e421b231e169384d403e83d98d42d4dd3c55442d881022a5b3b7c5ff6837608075767d298953a5fc18e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55560da47ffada96496c65d89d50ef062
SHA13311ae0a04d1eba6e8d588483bc208057647e6c0
SHA25620110c06b576e93b40caa70fb8ec04e556007e1959f0ac145f78e553b027b0fc
SHA512dbf03f8c8111a8f6fe782b297e617ae4dc7b611cc526bd15856c7f23f14814860218e8bb45a2fb6470a8551661e1a91bb5da08dc1ca9de3564f0eed2caa71036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54eb7e0546c019ae5d2521d86ac11c1b5
SHA1e7ff43cd7850ab2c321fed7ea8fdf37307678834
SHA256b4959cba2dc1145933805a4a6a649559ddc4f449378ea1b8c0da048f858886e9
SHA5127258d1092c07a7d37c697567c5009d290237c1796e8d3128545a822c2c631ae9ce3b321de712d33d743c819a9795ed7754fd93f71b5c2a63a958ab334ae25b14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b00e395368d1ba9c28d1ffacde96620
SHA1a836a0d7476c6e8615075e9d742007dadccbf39c
SHA2569625cefde8dc4feb25d038e8c6d169fa3c2ff3dcddb03eb4fcc3921918010d38
SHA512195d025af382d6fc2121658cc16afadca5636cc289b7f728c5d4131e560b86f8b541db7fa1c5bd34cdcd17103e32f48d12ec3f17b75dbd1f7fb5f628b5bbf79c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c116688e57a88b91ec08317440f0522
SHA1ccaf35c52e5b1752553e10f391328aae02366048
SHA256b133fcd57dac109ba0e29e1d02d8613618625e8db0ccb612172eca8a5b15d7bc
SHA51200d15b9e8c57bcdbbeae97563957929a26b15d96d58fe8e6af348c6579d416eccb88eed653e941fbc703352c01f77f610043a56c0e5fba20c27161bbdaa5b985
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e1eb785d54b90ebf898f54d9dc8f29a
SHA1a0b208db9413e83bfe6df0cbd5c4d9eda6f026b1
SHA2561920910e98e4e3c399a4a426191ea2a5a4fcdc80db53f556fc52bf8fa144518f
SHA51298cbe675df94393c8534c01548e231d9bd4c4307ba80b2f6030675cd49e92c8b08aff946c0b47206da6193e89f02b15e5cfbdc48b8fc77787535fce36f9a7fd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c64be3e52999ea30d9e6edb2c0b3a823
SHA1a32808d6517227c05e8ac88a662516a213c8e1c8
SHA2568e356c37ead9fe36ebdfe45dd092d7f69d74743cfba2618d5139039693889c5b
SHA51252db8c3b8283839388561f9353b5c9e952e753018ca79618e1e3e77f0e157daefad241f60f531e673db0843408d3be7beabdeb0f24a52818a036feaf700f799c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfd597eb0e6fe0df9e0e2c0ee7f558f7
SHA12e692a135da0808c025de7bbc7d32a5e357310b8
SHA256baeb9901519ccf2afed8a2d804b42bd0d102f1196af90c746a59bd2a68f50e1e
SHA5120b133afa732033aeb0099480185fd461ac43ac558e8f28af711eda7157e56ce771c12b081d7d723b1ccb6ba4ca0332141b2794cec00495c021a8171d3ea68ebf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be073e37be261009a9a795be4cf836f8
SHA18755f0ef3f07b023d78fa79da6370259e65ad7d7
SHA2562190414005b2d8b0ba7b55a39b2c1dac52a1baa3276b8c8bfea1f9099489ea18
SHA512b4235f629affd0bef93cb99e92c7020bdfdd1686566b26097223c02bde10e57ac2ad8f1abccebe8dfc501672bf5c6afcbcd6711db940083e28d3afaf66286dc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522ade0771fd53d677972c5c46776b227
SHA198e629f71f6dc415c6e05079bfe79580039be278
SHA256ac01be74938f09592951a554d71b2a175ed9723eda8abaa247125f05330201bc
SHA512ce9c9e810ace4d0586203faef3d5a7b505ba168862d71764d81e4f0d459de0e0e98da78d285583e74632f76dad02321ad347f8b05bd6ad082c40354724dd340d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b7751de8bb7e438ff028bec3768674c
SHA1d7c6ad76d5064043c472f0e802b47565ad3d38bf
SHA256b0629688a8f9db2e066e1b8c6e8e925758b49a1026bcd041cf6fa9ad52a2255b
SHA5125da0ba99bbd4f7863ac456d99787fb571b04493839a6c5248ca9d53715119c5761d07f0d3dc863f2e34366785a5b27b6d451be93cf5bf2d98c49e330b2c74a7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a625f8126f8ba71fbd8e63d3250eeca3
SHA16469710c3d0279961e2a87751a8200362de0c3c5
SHA2568e524d9426348a8da95e148d3fbef91d740ebfe8d9cf8b38da908012991c4c9e
SHA512cc88679528b7b81bbae47896dd7b410c73f30403fe250f4a2975445978ce8f32327dab7634c433936d7789b012754437e1925d9bee574cfc9ee689194976af84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bcdad92d782274c256ab622a720343c
SHA1b228ad534fd41fd1b6ad5d58587ac459361bdf0a
SHA256503d988f186de4096ffc1ef91d1a4c14c0ba3f9971aa3e4b42175318f3330ebf
SHA51256ec085cca395252e7748268361b907d68bf9dba2bf60807fd6a88a4439462f8634783c0e269d478c0b7b535e16d8efdc0b01e0c1f1006c96709ff8130e4a4cd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b