Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 04:45
Static task
static1
Behavioral task
behavioral1
Sample
3c0686e273655662170b7db8442d6f2c_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3c0686e273655662170b7db8442d6f2c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3c0686e273655662170b7db8442d6f2c_JaffaCakes118.html
-
Size
1KB
-
MD5
3c0686e273655662170b7db8442d6f2c
-
SHA1
ebf0389da1454e55933399165b9257f009fc4dd2
-
SHA256
85540a1e94f3c2bd6d6593dee9ef60d783821f4fb71811a3f57d8ff2c0c121fa
-
SHA512
08bc639b87773195f5cb33aa2aee511d5c973cf2cd12d0b6e4557016421b09c35b083bce499251b1c37d2b02102ad8cd28f9aa77b355a69654c95b9b94a558a9
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000b40cf00843ca040e392ec95493a827c156fac8fa97a235b6a30affae4b9fd614000000000e800000000200002000000048959ff2ec08066709b291b1e9620d47c4a4d02998165db11d91ea76527e851f2000000076768984d239959ac877a916fb6209be1ba2d0e5e075726759adc45e84be929a40000000be1b74347cf77d035add0ada6a7f2b4790e7cd1b76ae2185fab11af695453c91c416087db04d9787b1f9c81e32f8134738bbb7acf463d49f002ecbbe3ee2e652 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426921419" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9E20DD61-4009-11EF-BB94-CE397B957442} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b039ea7316d4da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3040 iexplore.exe 3040 iexplore.exe 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2776 3040 iexplore.exe 30 PID 3040 wrote to memory of 2776 3040 iexplore.exe 30 PID 3040 wrote to memory of 2776 3040 iexplore.exe 30 PID 3040 wrote to memory of 2776 3040 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3c0686e273655662170b7db8442d6f2c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3040 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549e13c25046416aca93bf76612ac1e6a
SHA14e923ec244b5c9381f3ba611d6c2f3d65c5a0873
SHA2563d714c4bbe4a365210658e3283c148f9e15afc19c6bf67263a3e9e615c15375a
SHA5121544f4a7815dfd4f4722f0031ba11279f08471aae458e71ddc15196b66ca5531d1a427d68a3fa0254bd8bdf8238c069e0f235d01597ac6e0242f3da7bc1e83cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b9c51f8c6592d65ec4686432b0b8a48
SHA1b56f6ca5cca5f24d65acdf0964c42b939c6756eb
SHA256f0a8d5423b14a17703a983bd8a9c86bdd9d47293cf3c3d34f39f3f0d80995573
SHA512f8363cbb8ae63b2e6d9ab6505d2a8248d5145d4bbc872e7b05f81fb0cd7b06ae46842770b521a128410d846ad412d07ca88a330b5b80c57b3a0a1292f397e206
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5535184e58ceb135e667a7a5df4e88dfe
SHA1b29c7c85c76f5c3d773e323e0584d247fff97ce5
SHA25658a5cb93e6813cb226a606193060f9320f4f67b74cff05aadaa550057a4dd4e4
SHA512180e0c49e86ca4de619c3e99f5c9f9a63613f7925c8796f93e4ebbb034a35caba5a063c03f96b242f466f180a21e1ccfca3f84119644aa3ccc27a25b49bddf04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5229b22c97969e364d7a28e31ebed495b
SHA181960b3de2f511c8ea4435ec27bbca510296067f
SHA256f8ea94014af02dcee77dee4469f835743af338ea081f7e948fd1e1a74b0d9c8f
SHA512cbbb19269640f982e9c25ecb88a2ba6d50a1c49452b089028309f0afdf3b46ddbd039f6343a750951a4dbbc5487cdcc774929d46731551133ad39b19fed1b952
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541cc9525edcb6dcd6cc11317f28240e0
SHA1cddc52f027eb8eb9a23eb06b92b9b748207b3800
SHA25670fd74c456df0303c64900a691c3f40acd1a6717b4b435393cae705af1216360
SHA512671722b7e357a37942c09163447c30a68bded6a18a5f9ff3162ec0f067a3b80236b6d51d956e9b5515b6f3e162a1e39ec43191fbb27746120891ede426a336d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b44ef6bfef8679c73577126ed4fff851
SHA1c05f5fdcbf3eebb0ac3a122f19f9cf872956e865
SHA2567fa26acfbcaecfbcbfc17ad4d8adaee6117df033923e757a5a9f5f9521150646
SHA5128fd6571579ae6d75906cf6f172c924a60010df3564405b440df266542ebcb1f6ea1b7b362a31219070c344ba74ed077ea70118cc0927146af3085b50851eb77f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8b56051daa758c8cf9fe46491bf6be4
SHA11a3b0fd248d09f61266273254df95dec8a93c652
SHA256f5e1c724f6c9c5188084ff7cc4ef600a39d7e6e3fb954c9cee5c70f40f5ec809
SHA512c785bba551bbd6a6cfe580d5bb601f5e1be4ce21f1e8fd52710150bbd998818d0388b23f38ebf981664d0c897be380a0aadc1e759e1a4b0328f44f62e8e03310
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5320ffdb5ebebbde8eda73ae2e5ba7a74
SHA1f176bb7709af02563e9f6d509fce7d24aa2ddf1c
SHA25685b3d8ee1d5269639c82680edffb4a3c1b654b886104ecef76ee0afbf1d87503
SHA512bef887fc106249cb6ffd171f077b37554f96af5d1610a7cc9640b2da0d94c84054033437d9d2f34985ef3a96b3bf9538abf536a1d05a7c7f12a447547c7e5b03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1449d447ce11589a25c96ba8dde8cc5
SHA1e286f26f0f143ef8a2ee945bdc7e15131e0564f9
SHA2560b6e156a192e52fc7e4d8cb01ed5dbbc7d5ed06a4a9a046fd30e18c6f3c6fc62
SHA512fffc68304a51b5497af0a31993207bc190580bcc6acd4b01223f6c072999f94eb19340a6adca9f3be05d57ef095e6b251173eb5e63594165125489cbc5c9649b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58caed42e90c8bfb78120ed373a12d80d
SHA1455ace904150c49e076a02e7ebdf286630f9309a
SHA256ba2194027977c67a83a931c3add72ea8e2045d79ca8f03a5f9f70e6b682a4197
SHA512064242acb4d2c83c58999ee94fd834f83516bc6302a754bd4f843392fc3356774a792bf106667da14198f02a30b1b9fe7bfca8a5a01f6be54fe806d3f857603d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51847d8cedf3dfeb8c9bfb12b904d84a2
SHA1fa8eb9fe9789d518037db79d6747153d56fc1485
SHA2562d8f7dc5d2769de3a97ac76aef86701fc1d6ec2b765a5b9e3525440f15768d5a
SHA512587aef216f8ecd20287f3cb04d2549ce05320ba1e587d25cf5312ed0708f2d35371a202356bcaf96d9d562a72221ff74bbf2b4af8ad06d4a0b05e33b0939fd9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5034f170a38176c50dcde7ab8ed40f28e
SHA1b36578576fc21bd3932314a78e1fde0355564aa2
SHA256e5fc0efbce794faa4fc8b7ff04d1c25bd5cb4f1e3f60d4a8bd6e8b5b53f0ed0a
SHA5120c553b3d9bb19558a26355346b337565daeb26773554740975ec0de7dbd62fcdff6f2626bfe4a48ac19a3c1db6480220e27d1d604222b49bd42fc7bbd1d686b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587f4f9ef05c91e1d4cc120c3f7438ca8
SHA13d538efc8de0c60389f70e59fa1593e77b6dfcf4
SHA2565851ea495d850251e0af93d8d3b506518aacd758af6f444bf2579da44161f9ae
SHA5126f2216903fd4c45c74c15a9e726137108e370177c99f2307cdbf842fc716d7bc09c5601de546d868c57107a92556a00129814a43e3e09a2efb2ea12bd1d2af00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57bc87d5b51265a47ddaf1dc37576bc70
SHA1f1ddfdb9fc4d92139b1be1b52a3e183adcc5f659
SHA25675fac7a75b64e31a4e4b47bcd9ef9de6ff0d9b4a9228b7935e08b25a7f22e7df
SHA51280d0bbbb3355d1742f247a1ae8cf30821c86089e413727145ba917ab3b5e056ef5ecac796996560cbafc1f314bc66d3ac2cb223d117a19e2bf0756174b188ebd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2b05b340ed1a699cecbe36c5d60029a
SHA1c515b64a9bcda814baa55a5588fdc0fb23b57d7b
SHA256906c2d0f286ede636e502afea3a716ff3f30b09123ffd3370820ea8ebbcbbfd9
SHA5125aea31dbc065179566b8e924db0b766331909774025e71070646249063098bdc7688495672de263359012d3adabd089aa83c6cada3b7daa2537cb3786d00a5e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55858f9af079f6dac081dcd34152a099b
SHA11f1e51145392919ec3da8865a8bffdaa25902f5b
SHA256ab1eea251cb46e54683f58f3b578eed69a1ffed50be24d27706ff71f92941e39
SHA51226dea824465a38d88a8f11a8efa96b1e336b88d377b7fc204b477550af357d8d5c8ceeb965e90a94e074b37a63e827c460f02eb7b9b863252e689cc357b7a5f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511b316b81ea717ceadc450db913e7d3c
SHA1458ff52dbf830fba94b59c70dc529ec2be07ab2d
SHA2565e7b8bbc10a07b8d39c88493a8fd4b4cf343dcbe2b09f372c128ebf5b9d34abe
SHA512270ad5f1e8cbaa732227eca2c6cb0f0c7eb93ce629f401d7fc401f7d8ea0452ceeffa275c755b69120a1c724541bdf5be77e4ea441b62ab66a6d4e1ba73fe53a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5405d6dc54894d1d56d27a6e251f1a710
SHA1b2edd63f45554c0060b885cdc5dcd47b75e2f02e
SHA2564593d3461584f3c284360d991d4f07ee4f059df4fa567b5e783952efe8009cf5
SHA5123ed107475894157830893c28230250648932b3fe8a715417b5413646bcd4fa28e58309d06f836683c6bed60a972c33f641da18b4c891489a94f6158dd2e7ad01
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b