Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 10:56
Static task
static1
Behavioral task
behavioral1
Sample
3d162f802bb57db2f693ab3fc3248873_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3d162f802bb57db2f693ab3fc3248873_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3d162f802bb57db2f693ab3fc3248873_JaffaCakes118.html
-
Size
11KB
-
MD5
3d162f802bb57db2f693ab3fc3248873
-
SHA1
3c6a88429fdf883f7e8eea40af3ed5dff95a72ed
-
SHA256
2444cbc27b974cae0a0f650e3d3b58a20d54e1bf2c3f90953e097a4c56d83385
-
SHA512
4e9c6e245d8d96d17ade9f1e96db3abe03f031ca6e8768c4af87a0c40a96b400a01b1459edfe4a0fb50ab32dff6f36b12a7e0794224b21817e3f981eed3fbe13
-
SSDEEP
192:FvWCCSMIZD3qXV8mKoLh1K0HasS/gSBlPaa7d3agvJtpwGQqeA/v8z0byk:FH9XNaXQGvK0HasOggPLx3JtTeA/Yk
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6161D171-403D-11EF-B33F-CE9644F3BBBD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40c7723a4ad4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000007f0c5f5ad3e14b4c0ada51d73ae3780dd78a992c8e797e12e4cdb4b1b1d0c9cb000000000e8000000002000020000000c302f18bb269f6426b1ef8a325adb82895de318f168ab23d803afe9adcc70a4d2000000082ca2c0a6d51e3f8ba49e46e8ef6bc238c9d24dcb2687ad89627fa53f842828440000000e0c4a3b96da0ad4c1a1078fb9cabc919801b435279a988a563ca1c85774f9704beb70aeeedd307d9c1f63856ebb3a6895de9f7d1a325bd7db66757b2e0bb7f8f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426943651" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2404 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2404 iexplore.exe 2404 iexplore.exe 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE 2296 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2296 2404 iexplore.exe 31 PID 2404 wrote to memory of 2296 2404 iexplore.exe 31 PID 2404 wrote to memory of 2296 2404 iexplore.exe 31 PID 2404 wrote to memory of 2296 2404 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3d162f802bb57db2f693ab3fc3248873_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2404 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bef27f15d6a41d2caf9caf348fd89d96
SHA1eff4028256149dcd6ff6e29cd5f25d1ae9f90211
SHA2561b79f2a6ff07e18d0fd07f9c3d4afac1c0024f0d878d00f97ea1da82bf96527e
SHA512c0a74231c3b2080a25a194bc749ea94de65a774b3fa0a68c44d051bffab1dcde9da080dad8d5822dc358a861780f729bacd294c80cde2e7f8c33e7ebe0ee8b4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a269a72deeb6e118752162e4adf60d4
SHA1c23ad9ca85126c936a17b9b862ea0e5282180a38
SHA2564ef1b1eee3e6a3ad4182038121167f98be37e5a78570cb53f57e43b3deec8d11
SHA51249f6fe29a7538c6a33bfa609e840ce6e7c4be5e1cc9656e33b539cc4f945ab47b414c103ee301bb0c07bbd8068c77b41d80d2014fcce9953b22c9ac062476ffb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562affe32f66b640b47a7a03d4a0e497f
SHA1187640faa935bb89794ff426742cfdb1d58a71b5
SHA2561a4b761e9166c157e93a472fe0f04d06fe4304fbb39f818766a3d4aa419d9c3e
SHA5127a8872074c813cbec974adddb66872948d12cf1ec196746a73bf781c189bae5728654ab76452d93f20d123914f557413767723faade2fcccdf47075c593da4ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6e94738c98f4dbc2340a69fdaea7b9f
SHA1c457657f9602547b765f41618f1c9212fe1eac93
SHA25620350a5274353f58cdc92495009b3647b57e18f6b0ebd941300fdf86866dd2b6
SHA51291e42b0d54359ffd5684f0c116bcbd968be313277046fdb727142eb11d30fda0e1cb2ff11d40e10e7a1141c388d388b15f567c48f8064d0cb299e09a4098472a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f83bc958c5d3088df2394425175fde89
SHA1f1e6262eb98209cc06476ae21694d6e1dfb8f63c
SHA2565b3ea66665de10116494488d868335574070d50183a81d38c8f68f811a07149c
SHA5128fc277729af58b42b9bf54d223ac6720399eb97b5c9ad3484b4c0d5000d14a810c3810de743c9f67b93b9e4264844f1c462c5ecfe8a283dd0c45b78a1349b6ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e29458825b339153573fd2d365737138
SHA18f17f18d360547e45e6f095d843f1c36f120532c
SHA256eedb6c4805204eea2ca2cd7c5b860e3630863952bb3b5fe088821641ba00ba83
SHA512c41d076a6db9fcbc0fed70ff9ae94616df66bb7e89c293268ffc821476e1926d24177c840277f0220f81d4dbc40f289691abc6d6d23602f3a176f749f4a2c572
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508dd9023e9d3d057459c728599ee26db
SHA14aecc17a290ad45be63d2f11cb7bc47e68118f1f
SHA256d298a370e8078ad722fe55114ff842b59ba1566a7190933eb78d05a68e8598ad
SHA51254adf354e7e69a8d07c242f3d4c56eb283f31bb9ece534aa760bd111be6a8f2f9e9c938d03bc9ee012b8812022df4dfdaaad86493cfde6cb8df5da448479bc95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525ad926b4eaf7be0e63dc78b3856450d
SHA1fdd1f09677095c1bf80e5b80b55b1842167072d3
SHA2560eaac4333411bf944b6d5c46ddf760a633946df198debf4d4cf7226bb196c5e9
SHA512448da29376734b98e951b77e53b04c774aacb587f860ee37bee689300c5f014de996a0ee1d006c763b6f791053a29ea96358e8382be1af8313f899e34db2fb45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bd1d48af44460265fa51bb08e7694e4
SHA1b405d01a17e180d69c71d8d5cbf36b0b0ece812f
SHA2569e7213c8319c017986a9c0d74febfb829745dea71ad4b9e016784e86fdef87c6
SHA5128f3fe6c685fa41c989663c5f048576be4aac4b721ccb688e9c759b6dd47e2940257a43c677d52c37162ee022df882fbfe428d92611e34390af95a35d46c42308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fd48d32e04445088fcb6818d75f2988
SHA141705f5d3aae2a12738759a704a577c26af388a9
SHA2569d3bd2bcc1aea907783546b0db0fb9c6e6dd88f2b4271f5b6e1bd394c5a39294
SHA512ba63676274fb9c7f4e7f236993b0c428a686ed29f9c1932033cf26032b499c2e0c86636e0f1e55a053dfb554f5022187068c8bb3816720c0a7e5844ce8b294f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583cdc6d21b1300e930c8dd0528a450d0
SHA132e5b26c9e245a7bab92b10c04968a2a65eb15ad
SHA2568d0ff968b3915ca0061344dec1674719d6ea1abeb49bad5f0ffd2c84f3cc08f9
SHA5127524fc9ff10147f11149885c23dc723fa1141f643df1729221cbbc5451eddaa2bd03c945713574aa43940ec51c3be9c71b465e580c90fbb9e0ff5e913d091d6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e43359012da6c0408fdab57391672c92
SHA153cebafbdc4556e3db349652e03190ca000b1e46
SHA256b9415c1694e67bf40ca137ec3a8b7fa64a417d0f0d05eedbdd1a995a2d5fb54f
SHA51265969cf94e93e34686540973af03d447d9457df48c783a07d991dcb5f46457de9c864ebd2af6131cf996c388122e79187d5aa6cffdfe6a96ffb7ca47fb8f1f37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba477fd6f16e53517a8e9f5460045822
SHA1c9f715f649bf9d6276379caed7d4feae66c0ac45
SHA25657965cacc820ac6b348251835987fd9a50aaa5b3cdb917f9eb7d14f224228c16
SHA512956ee25965355a39c6faa0523b058bc56d877f10f8978710ef976205cf9310db82b58ad640cd61844e42053d89131d7f800bca980df1084b37c96611bbf9e49c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502143a8e095e54185cf424511cb9e6b4
SHA1f15fb7fb8636c5b5828abcc96944739ca4789396
SHA25615addd0fe8ed4304f36f357d8db614b00ec27f482327891c3bad558e560f9448
SHA51239e52d3372c342088590a5c93dd5844d7282eb4c367d3848601258cef32555ee0c5c7d2bd6e638cf4577345dba80d789de749050ac76f7265d7926b6f7cac7a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a4699d94f794b94580588aeb9140a6f
SHA1126e6e4cd2e5704d29c9c1bbc0051354e5bb030d
SHA2562fb2794cf03fe0a1e2fe2698a8e0c15d46e966afd841d0f53966acc337d79b33
SHA5129aa5e4dcbde3a1d39017a9cc7ba1eb678f1e7abf8f775cc8f66a623da9ad5b632712c72c7fc6795863c677c54f06bdd75c4990b268af08632637d1541eb49ba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d2660c6c9031eaef49206678cffd8b3
SHA167e4bd2ce1a72da724b6e9c9021046f0a50b3104
SHA256d3f64ba54c31f3fe8c71ab171a34467659e3aa541f0d75dd286794da22fb449c
SHA5126c09258f1d1cce9dd1d8f3dee659f5b66a4acebb5e66dbf0cd099725c4d5ca69fd66fc7235a41f07ed9fe390e93b7cd0ae27d675c823c8fd89dfd3fae0f688d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535a7fe3b6fb0a17661fd0020946e0d4d
SHA145cf927ec07bb7911b3757d550757f24c1b3cdf2
SHA256c211c90f227bf3b20e42034c2b4ecd5a408d3ef311ac8510aaa6e341dc991c89
SHA512ea0e121733d0af190aed8a0b6895f9d25930d2c016ff718e9bac2d25eed73a8ed4bbb1696e854aa9ea15a4af223f9b0ed4d77e45a07c4807edd80da0fddc3c77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a296c41df678c823eccc00547384f1a5
SHA1ec649d1e924f339137e1d8ff66aedc88f5198708
SHA256b79e02ca288b7fa1a2bd9235c8f7f4ca717563c0b239a13a80f24c36a69f9e8b
SHA51243afc7dc457c1ea7498a5307a2206864c43a6443d06b93f21a6c5431bf59443657b7e055390901eef97cfbf3bc74dd5439c159370b992c46d96768c713c32ad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5130cca8ac986097a05c9e50ce576f848
SHA182f5a1bded349cdd74710d091f2f1f4a7459fc1a
SHA256b5042b23ac9df3b492263c2c35b17a7eaf53ce99630797aba341116a6c570339
SHA5129a1720b6ac164059393f0cac3785f7cf0eaa3af8517966fee4a2da7adb5e7ac8233d9997980082145e7d030ee288a7c4e445c76020cd6a56e2468f4f72358bed
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b