Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 04:06
Static task
static1
Behavioral task
behavioral1
Sample
3bee219f2ff771937290dd0a24ad92f4_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3bee219f2ff771937290dd0a24ad92f4_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3bee219f2ff771937290dd0a24ad92f4_JaffaCakes118.html
-
Size
13KB
-
MD5
3bee219f2ff771937290dd0a24ad92f4
-
SHA1
b1002ef581476944e9dda3f7531b3296e1677612
-
SHA256
d51bbaea5bb4d8124780bcf4dfefcf2c85b0ee29e3c81c2959b01236741b201d
-
SHA512
fd0476c755e7b51b1f3b869d90bcc625ceb9e85b6c94fd597fef9db212eb2886bdbd9bd2a55ce1e09ba2a58f28a60051f41f87a65dcf216dac9a106f5c2d6f6b
-
SSDEEP
192:RNKsAgAnAc4q/FXY3OqZQEwofuWi925EQEvYBZBO5YrTgs7mP2EeQtohs3jHLj:OhgAnDY3tQ4fbiE5MYBZBO50SLj
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30f7730c11d4da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{209D9DB1-4004-11EF-9A68-F6314D1D8E10} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000dcae2717b6124c062d25450480c88d2fb063616dcd92cdc98b91261b961aa2cf000000000e8000000002000020000000993b250ff0a51355c2cd0c51bf5144d2f16afb01d77b3987de87a590f59caad120000000f393b0244d2dc540da8e44cc6455ce089e4f37d714aedc41f5398b6376f9a2314000000061f0b19a17e2f6e6aed8468fbc2ed2fa5a23ce2b90c0c0dca0fbe00453ed7e70abe5b79d80f8ab9089df0aebfed37878d7ffffe860d0e518929b9fc0c6e4f375 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426919061" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2232 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2232 iexplore.exe 2232 iexplore.exe 1788 IEXPLORE.EXE 1788 IEXPLORE.EXE 1788 IEXPLORE.EXE 1788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 1788 2232 iexplore.exe 28 PID 2232 wrote to memory of 1788 2232 iexplore.exe 28 PID 2232 wrote to memory of 1788 2232 iexplore.exe 28 PID 2232 wrote to memory of 1788 2232 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3bee219f2ff771937290dd0a24ad92f4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2232 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef724f3d8f7d16c7ff616b9825aa05bc
SHA1e1d884aaf77c60627669dc869513417ed04448e0
SHA256c6f5bff8c30c3bfaed81255ce94d550e9675870051e4fd793dce02ab1b7a88b2
SHA512eb1f9d27d501fd2e5be8d8138f321408b1027505d0e09d0be5a11671bf149127abe54b8a8a117511f8f5a70c854898767c75d01407b250020247a8ad742500ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fafb887fe914132b290d447203c7f6e
SHA1803965dce96c1a218a71151bf657db0d34c22cf9
SHA256cc593e10369b6fc7db1f6b1f090fd01d6cb1ba9f0f36f1febe824d6bcb74a251
SHA512b2d1acf13c804b8fd15ed223d1e279cdead3ad0563770cbbbad54f7557e76c6ab2c1dcafd252235925405f0731b892bde2bdc2229c3b16c1c88ce71ecc0b74df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9ec3c6fa877a10624d6ca12e657bed5
SHA1998e985075c346afc773360ca979807950e886f3
SHA2568b3acfabe8b6a40c77ef3bc3153f3797a1d42d6ffa12d54dc98306c1f105bcea
SHA51236ea51a428b2010b0f7940f46d19e0db2babe8d4da80c85d72832eb3485c2beefcdc55c0125ed6672c3aea11a792ec0d0a24b30120f6da52aa08a407fdd58427
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554f83eebb03dfcd683b09433035bb245
SHA11e32188dec0063b63613fa29f206b16f420eee79
SHA2560e2d66d0881ec952d1c07c54a7135de6e74cf38610161333da258106e9eaa135
SHA51281897bc726a02e2eeda49c043616bbf8d0177d1b50876fc1e04a584d10f8d909f7409dcbd16d51968ee65ced2bed84680472bb60250452625df71f0539427d58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595693e62af9c93a4b30a1272f5c3da8e
SHA17f5750f0080b5da25e3de98327c2aa4d6fe20b3e
SHA256da1670f0487113e03a4f96ce4fbfb1b82235acab3df766ad2b6cfe50a0da1249
SHA512de60add659451e23a7dcf683f9c65d31698c43feb03441fa5ed0ef13115e1236354ea3fb3788ac668d6ea2994a4e5a616e8e2ee2c78b5e92c97ba3970e4c28a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54aee58d60ab2ec273a56006321d14e70
SHA137ece52a1f08d149affce4797ec15ed1e7dfc856
SHA2563079720bad1abdc8835a455a643f425a2ae226b8fbe6797bef6af2617253b925
SHA5123d682e750f669a8f93fbe09ee8dee7fb415c22d428317802b2a5d4b7210cf3648f039655b15ff0c24095eda36c3b9d95dabb4925b830ee4fccd7983e9b76bcd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524a80eb0c36236b8e260c255028f3f81
SHA102d94c7d11226df59653d98208b22b773f3024fd
SHA25655dfcee22217205b1092d8b1f709a564753bbac5323fff78219175989fae3d60
SHA512f762f9ac64609eb22c7f269f02208f1310f865efc274f0368d2ad14c59d80f775c822056d38314e44e21cc4317e2b89b3e4f61f15fa944ca1d3d43182e049e21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ce4175aaec7e3ed2036f9a70185a381
SHA126522fc320efa32308fc39df74093ac40f79af09
SHA2566cb69a860f0cfbbdded6c6274302d013502727d294a320185fbb4d50c27266ef
SHA51270bc3086f1da19edf8be4c83227bac15744167cc20a779fd83dad5790640d52e89344085546e78f049036e82420e0c053e4721029dc5350beaef70d083bc6341
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1cd9440b844a5c84028287be0a21257
SHA1f68c9cc225163b7fc0e502b7bb038ed966ff39d0
SHA256bf3815c91558c68b2c40c72ab5aea633f538d839d8b02bb6caa869e03c10bf42
SHA512813454a062c826a6de0b808759b61d8be402d0cca9a90a6c67f393535125bda715995148ea3e53d6ae150d72fb6ebf48cd5a077eb1a6bec9ab52b18a2c807973
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c10e6de5832705f3ec29a709af47bb89
SHA1cae5422e13466930c54b096217093ddb7aa51a6d
SHA2567dbedbde39cc5d1de960da33ac406a510489358358f4451528df1a391e0390c4
SHA5127c62f4ea63a3a8d6d0e81021a1e7f2f78ad677ba5b2e5640aacb12c1bcc4cc57a73a93c89cde7ff0516f6b65228a7668bf2e3b0df4fb170fab385198a14bd033
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54926c6382e11454be5ce83e6d64816aa
SHA1687fb030e95ce6cb038108f88d641b5d58f10db3
SHA256318a7025abc8863cadaf7a2a1760063ca20ed0e1ff90c01723e321b59e74b71e
SHA512afbc77427a0c2893bdb19c100b5e15a29c2cc5c206ac4393b93cbe908f97e133ddb4435f9393f8e6f3245726f1a3eb71945297b99567c86bf3575410a4226a8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5497e6e70eefe0752e96c0f956fac182d
SHA1d105153daf00566a2d0076145bf6ddeea258d22c
SHA2564331e21cee92b638c88ec092590058276c6273a37a25e05955b8732a1b144e38
SHA512dde7d86acf08d8fb0a77a2e2fe6af2b75844adf1f8906a1fed57384e14016e6200c8bf3bfe5035fa245f33efe36f8aa059286d3226f9a8a388a5aa08f3ed1363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d705c84def665cb9eda6256055d69692
SHA1cb09315cfb2498e0d59633bf92099ea4451a6655
SHA256f508a40c735925a87cc122a6a9c02431716fd852b3170fe88413223d292a13a2
SHA512e1b33140481fc8fcaa5d1fd2bb30f663e5d8ae3f6559f950a770414a7556da4c798685becd308811874045d7e66af8312b8ab8edcaca64e3955cb47f46ec3260
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd44b4e2baeac498493227588a6895b8
SHA1cbcb196662dd5ed4f2e0569fb9a9caf3928bd61f
SHA256162bacbf48fd0f813f5a863050f162fbedc089965d8212cc4dd9edf5389aa378
SHA512c7f1d70db83108c2651bdef6496019e9f7774a425ae45ca5060dab0f6c209e54c39377899f943c9456aebf7f95563c91b53e68de347c83f110947664ecd54ead
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b569b6e677a4f5c8466234ccbd5831eb
SHA11ac2e30fe79d3000ec255d0202548b7aa9e375b9
SHA256335dd551d1ca9294393cb4b794ede4711103b9e4ccf56747a89fd7426896a4c9
SHA512fc36dde57b2431ed07e91410354f37385bae1d0f23ae07f6f3b67166f83b744103d8c16dd39c3ac496bf92c40d062a9b5a0fef817df5f2bccfe1bc2bac1adc3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f17b4d1b6d95c83b9759563abd859314
SHA1f68d2271e7e174c177f355c4f5ac87583eaece44
SHA2562279b5d98f42bde11d09489fe4f57a93e2736b7c57733064ddeadc9dc7d02098
SHA512c21d88cea3a88bc14688b026e615acaeb57293c96803e807a608e7a7c5468c86eba05d61f0e9caf0856791aa53084f6c0001d012e0ef04b808e0adb4b13aa787
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55708fdf504e438cbb44427b4488c2ef4
SHA11fb5e299a7516e9b1068859e834c613bf9ebcba6
SHA2560c8c28e40829db558db5fe665a5482fc609283ae76bba6faa6b54c1ce3391a78
SHA512b39ac0374607341a7a28fdadc6e728429b2c39bc66e7aa7991dc7d83626b27595470240d3fabb3315ff9a0b0091da26c8b5176746c935775272f614ff44c29d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a1d2da3b3469ca2137638cbe78051b9
SHA1c0941e580a41164f3085bb8105983af471e8b6e0
SHA2569a476331505676c4934fa43348a2441957e90786cc8fa3b9b6d0a31cdd35f8a4
SHA5128b6d18a3edcc63bd9fae241e8bd13fedcbe2d39623b8cc2933be9e190c5de67cf22c2ae955224e3f02fc637e197581daa8b7314b2b88279582ca3328c82d9ec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5339064aa9e55e83823c04c63b4fc22d2
SHA1919a432240ae1faa01caf42e1d4f69d07cbc64df
SHA256146bc7d218e21cd826f00bec5e9feb99b4446d33459442e083cd5cee105a519d
SHA512e13c8fbbd7f5988dff97f0884b601f4709e11b27ed02f8f0b8883455b4af895c6c82d39c507e989b0dc34b07d85238a10013053d4121fbb1430e29218a4ebf84
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b