Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 15:19
Static task
static1
Behavioral task
behavioral1
Sample
3de769b538004b807111ad9dea01b9fd_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3de769b538004b807111ad9dea01b9fd_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3de769b538004b807111ad9dea01b9fd_JaffaCakes118.html
-
Size
12KB
-
MD5
3de769b538004b807111ad9dea01b9fd
-
SHA1
e35443fd1cc6973d7b324d608214eaae86a9c70c
-
SHA256
55640f9b84ae4d3d63cedc2479b990e9ae9d5741e9d168924631d746f796d8f2
-
SHA512
0b239bba5e58b3a1230cb33d7136b4949a24aacd928848dd4fd40f59ce466e4ca21609b28e7e474a7992767b370cf753bd554857d5d2d47fb10c4e11d2a523d6
-
SSDEEP
384:bzH7Kq1ENtC1AhMHADwtLc3wMW2f4gLzg:bzHMAAF2Y4gLzg
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 002501ec6ed4da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000e5b3b631249eeb88bb24428403e0bf2429f72cc2a8627a9ee45b85e1860c2685000000000e8000000002000020000000efb0379b86d8ae3f6298b2c0fa223f1f5e8eedebd4e6c8af180072fb2b7456b420000000e699b58df93dc9d65c251f5a3aa827605619334d4118054dc63e5637dd10f749400000003a899668fd2edb1215782da93005366dbb2e8d4f0f178ef3ab342b486e5af76687c1fbc8e53d0011d4263a71fc2f0913eaba1df331c0d9d374e8f4777f7330cb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{262FD3C1-4062-11EF-8BBB-46D787DB8171} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426959444" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2272 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2272 iexplore.exe 2272 iexplore.exe 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE 2328 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2328 2272 iexplore.exe 31 PID 2272 wrote to memory of 2328 2272 iexplore.exe 31 PID 2272 wrote to memory of 2328 2272 iexplore.exe 31 PID 2272 wrote to memory of 2328 2272 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3de769b538004b807111ad9dea01b9fd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c886a2780cd7f82569769a9497f7dcb6
SHA12863218c28164ff1df394dbd0ee8a77b0b652265
SHA2565c45b3cc79dae345d3186d6774c0220e992280cf4ddfb58c20a1becda5e2069b
SHA51254f9191027ca7d399705d9dfe3964c9436e7f47173158b2fb8cb9515872f48ffe85c5310084d3e64480c96cdcbe48deacc42137b51df3bed6ed9ab1a12780072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8133954c4672a76f499343d23b00a77
SHA1955cf68ce57a738ceee97acc424d5a17328aa285
SHA2560ee8789bbf3defea10209daa1bdfac7674f1cb9016658220461670dc49ce0ae9
SHA512b22c2b0c84f5b4f0ddcf7dbf7778637f2c363a9fa6a486874141205f2763dae2453c070f01b8d73f01849443212d8b74dde5dae1afe8341556725d0c34cf9e17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d267dc1b9250b3f273d91177688d8fc2
SHA1523ee8f459c3b742c0b9ca565488b47e1dc1d7a4
SHA2561c7abb331aabeeeaaa72b6a995e0cdd000980f9c3f369827903292ec4ae920a2
SHA512da3232ce117afa7378b641f1fad1976704517b08480626e5666ffbffb4ad9ca2ae895920665ed867843c705fb5e14b2941a6e39f1e191f24389a11ad46337695
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5119ee541b5601f11195fc0b0675a183f
SHA12b393cc00f44a0f09ea3cef25d19ac71fe67f5bd
SHA2568080819f241d8ebf5a3a0a6cc8e973a79a88e1099eb7874ed4f3bfa3d83efe13
SHA5120028741a2cd88f31c85986e271ee7308d003f3cdd6f2ba80426eea4274729a947cdd6fd93e02f789e4dc185a5a596fa6a011c4afba3a367a3338fc9b995adca7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5836e7c1d4b99ad48b57da3c5e300151f
SHA15926d4ba14445207e9de44918cc453e8ece83c1b
SHA25617daa14ee9f2e34ef16e9e23805ee82a44862c853a7323af4ffcfd4cb1b7b553
SHA512c3b852f3dba4e4224671d84d4a18b3571d3a8970e5865128d429f0252db02af303be3e33fe7210ab35f4fb18151a547c4967fe799b334d899bd894054d5d772c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb20b7d6f123acdb40f8c28ea5f23e6f
SHA1ac0cde18895ee4bff7f19832fcb598f55f51a854
SHA2569674d6614e74cb3af7602c34ddf3f822dccd9c0aede540f87fd661b2659fe88f
SHA512db07d39a4b1038c00709b7835f09c7229a45953de6b91768a0ea689cad49de2e637e6c7f6b1d924feb9b37c11028c7e7c358caddb6e74cf1af685cbda1515f6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac063a4f370aa7294bebe73266143ec1
SHA10014d80950397241a5cc86a0d25f8dce0d56ac35
SHA25676ba49f0f1030f385c086ad11586a8d1ddf82134697d15356cecd7143d67ff58
SHA5126f2b1e5a88c8ff3c30dd13a0ad2a72614dfe656edd1033552ea70853597a3a8e0ff88d1ed60ee1986c9b648cfb0b205382bdedba379664ab21b7cb0c404e8482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0e6825d6e7f574ef2ab2a03df13b502
SHA139ee7a805ce1fbf8befca247f17641c1317122c6
SHA256206778c83a40525902020bd02d51b971a005696392b80d974a82788173584468
SHA512b71eac28a228bde182b550c8b7266888220c77e7b5d6250b4e51c9ccbff7f7cd48ab23e1633348990ab03a0a173704ef621684464c565a99cd0499cb31b7e32c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5958b256b7488f4bf12b1162195fc119e
SHA1091edfdc9f30b417e584f766c6b2094eddd59822
SHA2564f63487d5e629c744985bc27ffe6a734a9c830da53b7da205f34006613b3e00e
SHA512a0ecaed885a2d147096296d4fc92fac37d6592210a5be014f90ee34ac3b17a8b16be79b22237ce0767f139281ae1b9a26995efb9ee034c1fc046efdc61fb24bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562e3d6f0f53a69553e430e2999ed353c
SHA1854e3f9bc24f263645e75f45d01be7146116866e
SHA25633c5840db8e055a2bcd44ec46e4525b0dde2c9b38fa37bc2b9872ef7a99c6c57
SHA512bd5a4111f485ec8c3b6cca35f409c6e34e2d00c9336b59b7d0457e8dfb394ded949d3aaa4a6079ae51a0dbf42e0dc626837709fad2ed3342a270a167d9817211
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51acfedde5eef95d67b3c53ddb5ec8bed
SHA13f7e59165817ab748776a07c9471e06c93fb721c
SHA256bebc1a701da4dfd7d2bce826e025eb000a371e25da4136978172bb5bb341c74f
SHA512aa3fffb8d673fa6b15fd62b9186b77e4ba3bbf30d3c1b0299422f7bd49fccfc0a589b7ea83a308164e610ed37d4622f99abc0c40816e994e7efa8dc30c8f7036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bea8e6739915e6eb0b332924352f9c2f
SHA16071b936703807b922cd9b05eca66f2f6fcb6a83
SHA2560288326d77ec342d5dad7edc81fa7024df7ff8d7443fa07e7801a3a8213d79b2
SHA512655bcef551175366362f2b3b5171fd6f7ab0b5b40d04a171eaad8ef6368e932c157ea9c5044315ca802f32b6a63d9b836981a8b7b3c9bdfd360f9d76d57eef15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5783061f5705f152d8abe70761a923db9
SHA178a57b80a11895e82feb77b65f8117738b2cad6e
SHA2562d60187d1929e558394e0c29339a85744bbd5e6c0c5cfe1ef733e7fa9861f16b
SHA5120e51e5be09204fc08c5a05892c13cd6233726b80e553938227a47d356a2e2b56ebe752bf6ef5a28bca17cf084a4d03088b2fc605607bd0e0375ebba1e1d1836b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5133ed52dbba589100f21f488b68dd7b2
SHA1eb90c5eef867e68fbce8350dd515b5a0cb6bd550
SHA2563a9c17fb5ab680d0477e0f69bf9b957b4fb08b8f290fa35a176865369d5575f4
SHA512fab63501fbcba843d223c4bd86fa053f96eac9eadeab52151ad9d35112a014f391aa30734fdcd8547437d8f636da83c87e4cadbf70052e8379207f7b1a050ece
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad1cac968afe742211d970fcb211cfe5
SHA1f832836309999df0edb5566fadf22a3959e2f6d5
SHA256b85e954453b4a63804b4892ff3c00881c67b552055c756a84ffe2f55daecab6c
SHA51298732306ba66b4a966eb834957f7e4e9b4914fd87373ba2143d433613e35e80f373a8be3abd9f4125d387cd9c469cf2e0e7bd7123a8d17268f275ef26857f3db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e43e95a774cb9098b1c6641375aa306b
SHA1191039b3a55fe885de8ca73230ae9cb6fc5fb36a
SHA256ff544cbe91a033578ab8f86ac2f834f5b5cfd84d11a5e46275b8045dd0a70556
SHA512254eefdee5c568adc1021b4f6a04f1cca18c393e1b7420bca0b94fdcf4488ae846ee8232d5c9748e1ddf0f64f3dfbdc77e5b319d26dd4a05e6c0605808312f8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5069a431018a7ab94e8487d58f800be74
SHA1f5313513e74b2566810843db05cd2b719f39b157
SHA25696c9c9b0e7ff6f3f101c2dc4d49e184ea33c379a35c8947c464b5b39ccf426fc
SHA51236bd08ca9278d2dd3d8ec370397eb61fa7710e9f700e28ffc48cb14b8d3b708314ef09da4b54c3c2cb5d83b6d7a65eca11ed6617a6a7c9dfff67596ae3b4aabd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c21a2ecaf2170f83b03a3e0a4dab8d71
SHA10a937defcc7890944112994cb331d3829d320940
SHA256dc07a433c32dbbaeaca79d4f717bf1dc36bee2b2e862833d7ad7b83e2b595565
SHA5125dca39d45e2471a3f718c2f2ba12c7f758bf058920b6e9568912431fcf6cd0f87118e6453471fdb2c665c1578d52aa65a75a1512aae720fe465950e6be332c0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56eca34e6e79b74f8ea9b894e07f33432
SHA1724c0e975dcdee574fda0b7dd530b35aff9bd7a8
SHA256c4e6981fb6816922193b89aa9981cbf9cda2a545862406b22a17f1caa5fb7e2f
SHA512b10326ffdbbf01166474c38632978a7c01cdda2923322a576b6ea00ddbeb523fe0da48409c7ec540e3a3a7afe58f562604216723d1a746c96ba45c598f6dd3a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f22b16d445c29bf3d8b23208aab466b3
SHA14374adccadbab897595e9a5504a3088bb92ef643
SHA256b7168bf166b2a9f5ed5b1824071c1cbd85c0c05c3f3f12d17640bd1247cc75be
SHA512b642e98f6fa66880eadb36c52bb01744c7ef2f734198c8009cb07f148289bc4077b111758e01d89f30517f6e34224d9fd5010fc8bb914ee8bcaff350f536959a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b