Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 07:11
Static task
static1
Behavioral task
behavioral1
Sample
3c6cad76cd64060e9d719c69d5f822bf_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3c6cad76cd64060e9d719c69d5f822bf_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3c6cad76cd64060e9d719c69d5f822bf_JaffaCakes118.html
-
Size
7KB
-
MD5
3c6cad76cd64060e9d719c69d5f822bf
-
SHA1
8465811def4efe0af29b790f48320b0036ad1511
-
SHA256
17b8e898e919efa40dfccd5e4374537b00449053759f70b3fcbaa82e0c4690f5
-
SHA512
2bb22f604f86431bcc147107d59d3b77aebf94d6f45195eb2393d466b6fd5d3520c93739ef240b7fed777c7df1587fbd7ae121fa573a88cc0674403f3df8bdf7
-
SSDEEP
96:uzVs+ux7ivLLY1k9o84d12ef7CSTUezMcEZ7ru7f:csz7ivAYS/sb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E92DD921-401D-11EF-AF97-4E18907FF899} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000006fbf80dd516c8083e0af65e40f3610c4045d64e6e64f61b0a94058bf03da54ce000000000e8000000002000020000000f68a9864bb84d9c4219f61e0b32e4ab8bc6a5189086ec2d9e3eae3a30de1083e200000007558256acee7b563818efbad1def46d2cddaeae19b0bc7eb337b2d42d1a35c254000000043a99f4190a61ae8ca4dd3060de773f8a1c463959e59e5f0a4713c9ad42c32a9bf311ceca62fa077e776993672e598fccf5caf8cde1479f68ae2b5c883c9f4e5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70ef4fc02ad4da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426930138" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2272 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2272 iexplore.exe 2272 iexplore.exe 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE 3020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2272 wrote to memory of 3020 2272 iexplore.exe 30 PID 2272 wrote to memory of 3020 2272 iexplore.exe 30 PID 2272 wrote to memory of 3020 2272 iexplore.exe 30 PID 2272 wrote to memory of 3020 2272 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3c6cad76cd64060e9d719c69d5f822bf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c836308f4713b072d2998b739caed786
SHA1543269c4edb39c5665577889bfb36a5e8e4f094b
SHA2563afaf9625ea7347b8b6f54b4e55f9a0e9d4865edcc28ed6a689ad7d9480b9380
SHA5122ceeb8f1d465d94a14f87c9bd6e85ccd3b7305b66ac6187044fc4adce79a1deb62f68163a3c5b8910460af9c0cbead09942e20bfd2e87881d6a764597fe5b7fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d34df94c3870ba3b21369b1249bc331d
SHA1f34ac55a8fe83d10513910648d02bf8235ed6055
SHA256b25a3a792805db82920443b36c734ae24d4a41584016aba04ca4e1aa495eb684
SHA512d4abb7e0a936cbc7d2ac03d8fffc960818cb760d4e4e9ae3a861b92cc4cac4413fdc471b36563ccaf77dbe1793065fecd2be713ea42ee4e0619d9735622a5b4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fa37cbdcf9062723ebb8012b1ae514c
SHA194695d1c3b078e3d722c5ccaaf903c359b46d672
SHA25662e77fd295cddef87b6504f947a69bab556bf32db6636804055b4c3be5782e8a
SHA5128c982d2cad0b74c6770a95df0b88d0ba21178f8bd6b2e0b81bd266b34b687ff6dbb287d680df5783588a89f43abb9b6c8f43a52b7f83059d81a8b756f7e2b8e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572089e46ef8b20e871d8ad9214f53f61
SHA1e7ba94dc2807e6338873a9ae217d0f435d500aa4
SHA25634a3819e21864f19457e61da3ac25cc9379f3e6e4df770c14841246184389205
SHA51295463d2c17ed42f31e548182d71b31f17eefed39e20317d001ba08e84a3af1127e416ff7ba022e31d014fc49a80c707eb85f6c83aad3932c376c4aa26fe4a3eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5783dfc9210e29459050fb98deb9b45bb
SHA1a3ad6f28f38b2786493e15b4eea3c5889fd28fb5
SHA2562c434a4075443e56d47725408200d8f128e903a8c90bb7ae0180ec0448f4cbcb
SHA512e2ff6e45cc24cf3b258ea72ab885314c9e5bb067a854276783cdc56b383fcb156317cc21cd020a420d58d4ee16f4b6e16f0b9b5c195a5a076db950d9483cec01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e4d15c0600ebf7e4d5b2b5faf785e7f
SHA1a4c07f00e0f9b041df199721c4f07e00c55f50d7
SHA25660599142ff893f32f71dfcc773162804ccb17bd9fc75f08ac715b23a8f74067f
SHA512fb0ed753ec9ca11b99afb2544087c4f359ba28ce859af9f143d7ffd394904a81cfc655a2d00b546dafd5a86fa8e4eb955d114f595e17e9d77bfbfa088a4cdd66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a362c0c94190deb20aa255fa0840b3ac
SHA1b99e08192f05fa7cbcba3b2f5bd2d204e136922b
SHA256430067040f99ce92ce928a89ed8ab5bb7b495234174773ec6f4092e7360e6861
SHA512dc3b8e609e73dc9afb30c3553eeece1cb982c3d682cfe03b85070830650d2e87235af935766081a05613014aadf1ad2a67e32a6b530242f5317bca237e75f422
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598d78b92c117422d0aae913bab2815ac
SHA1873daaed323ad57628290b4866c1400d18a89322
SHA25613d53a4950ce81e0d7e703af670a58b9bf05dcf27be33c0588d189b5532b7d2b
SHA512436eac728bded8eaa44bc5a7c8d90aee8f5789dabed8c4ec314fd399f38ca63a8103e4d6cabbfe9e88129bf34bd908d27e49f2d6793d434b575c1de4def53738
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e23e0548848a6b9ac626abc1cb52fad9
SHA14cf16f8b13f2361f2bf0424189cb575e5fd02e96
SHA2561b4946fae6ea3b5d5ac7e27f9bcdfce3c3082c40f5c3d55e50572882e460c34c
SHA512d77637c6fc23f1e4064eb032b1da840a6290f23690c7c3b6ce3415edeb324dac6a3ae55e7f703382c8be6d5d207b4e8a4d029f92a6818aff0998dd257a97c618
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ccd13b3a729e1d50fc86365a4822fd45
SHA169acf43e35821e712f3b0418e12c758fbc600c09
SHA25669fe23f10ccd712a5764adef0e0adb706aaa573cbaed95771eb389d93b6f6e55
SHA51247326da26697c95a8b9561c9809f359e24195dcc3a10af58ed92dc3e15a058fcd5d2ac70f8a9e1497354d0fca27f3c06b2efd046b920dbccf7b495b46795d2bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4e3decc9a90148373c1d9f9606b14b5
SHA11b57fb8d757b03d52c32e0689850c73e752e0c87
SHA25640560917515bd617bbcf80491bc0b7a4e2bf29d9e310e9acea10cefd940d3700
SHA51252b0383729de065c8e49aeb495eb3aecbe690879aa4cc24918156712a19f698e216cf753b03b7ce2b2bfcbd512b198e830fc1c8098ee8ecad7b9d15a5744134f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cecf6b3f88ed235052e46f0aafd16c2
SHA156d040d595cbb75086e826a8b46175cfebf58678
SHA256c906b6ce05ce61b961c177543d2ec356982edfe8ae286bf6ae5b4b399502b80a
SHA51262947da92ab7ce09eee2cd4c36e37b76a8be8dd0d77b74e4285aca034e28dc861ccc7ef1fb3acd01385ec8207db2c5f8dcaa19747f9fbbe1033ffecfe7c026f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9af67104bbc06d88b91f1cdbc1d44db
SHA15ab6e9da5af5f4ffbca0d06c59207de7b4ad34fd
SHA25603b03f7c4cc161225948800c96b6032f16c5a8c26f59fb453192c0b7eae692af
SHA512a438de2a360395b82dc881bdbb6e3844792412545d153e7813f264820002c7c028a6cb661d9b30964065215951c90b836afcd60f9cb8fe0e392ecdd1c643a22f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562e9e9f92ae42eedca774d3f505383f1
SHA12127bebcb0f4c9acfa069d34f341f81a84979356
SHA2560393741d901ccbac3d14108a2cc627ffde5e4b551c1333b8547d949c5fd54458
SHA512321334e931ee48ea3bcc46ceb740aed8658f70d936ca0cfa7b2b6afbbf132dd10d38af5290924fdd23e86987a39f3c74b0dad0cebc88b19a713321f1be731893
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cacfadeb4e21fc1a82bee0d5e31d04e
SHA1bad9ab3134004efd3afd4e55884987376a73b13b
SHA2563c5fe4ff83e1402e748807e5c7f609fb5e368fbaa6be2178bcb15efceb341e20
SHA51256ed6cec8959f09cd36e8cd498a01b5eaea158c067b1567f00c407368d073d57fa470f23a758d05d65a7708ed6b3c86fc18c897f89936b4577d771b0df2af788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff4e17cc8558e59057ab031c63a30641
SHA1e59df23aa1c7437ea616523ca2c8751ab69dedc5
SHA256efb5314d4d0ccdabf9744db8dd45ed07bf6f3370ec789f01731ee847b4c51595
SHA512900d5b89a4919e55eb38651eba37a57fd5e61d50bdcf0c244287c2d531e6ffb7b32b284f28f458ac9dba962efa9055241344b87eae685c47a8aed9a1d4788016
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5a4ed796a2b5395db4606c54997d04d
SHA125e70d819bc0a2af284fa3dcae3266767666ee5a
SHA2569a7d49e5f294b2930535df8689d5f183715c5a9da3b22c19db05703f5aa440b0
SHA512fdfc3e35344b285b80409db792cf84a553f9e7cdb01aa29521de0c28f42a7e4fdf4a281347ad1b189e4cfbb77ac56f1376c7a91a58b16e8fc6bd14cdd47e2f8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ca943aa50d3756790c3ab2fc44ae8ff
SHA110d5cba81f0a682d986d30b354dfd31ce3055926
SHA256f7d848006aa26f35c4d20cbb28940087c92fce6872381cb743cdb5aa113a30c6
SHA512f779867ac073ebda6fa1cc5e05e178365622ca1688642ed976daa06d9cfec24ddcd863a1059cbb0acdf8f195ec1fcc5a39030f2d176ceb19139d1dce89a49aed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503d079bf2e7c8f620e000f8f681c14b1
SHA15a6021c057f55c36af204951596a2e65a5af8ba0
SHA25671befc1f1f3c5f908ab1d358339dba4260b194e6b2088f13787a7f3dcb386762
SHA5123ee3a6d7ef3beaf2b3b42a1dd88d7fce3244357dd0629480ab91ceb53df71073d5114e513af3d4cf34f48122354108b9a827ee135cd0dc33404c59895cd98b78
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b