Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 23:39
Static task
static1
Behavioral task
behavioral1
Sample
43b867821eecd9f437dc7eed6df950f4_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
43b867821eecd9f437dc7eed6df950f4_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
43b867821eecd9f437dc7eed6df950f4_JaffaCakes118.html
-
Size
6KB
-
MD5
43b867821eecd9f437dc7eed6df950f4
-
SHA1
914ec23c73b65c7cd6a91f07aa8810d09a781cfb
-
SHA256
242100e17e486f6a2a28fdfacff6282a4c50c9a96351d20b6650dcc414f7a5d9
-
SHA512
17175cd385592055c9eb2cdf29736bf144dd08b9431952fc5c003c2aa8bf7620c95975314c913ba8d652f97985300e8589398e40259d08dbceab809a979a6c7d
-
SSDEEP
96:uzVs+ux72WLLY1k9o84d12ef7CSTUON/6/NcEZ7ru7f:csz72WAYS/h4Nb76f
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000000b90974da1117d4b0d0a3da513902850e6ccedd2c6f33547d5a0625d0e2657f6000000000e8000000002000020000000bd8bad6131b72f2ad3624d069aa3a76099fee6d8724e45870e2e6ebe075646b72000000011a6c43df3f16fec8190e03a6bfb10f2bb6da22bb2a8f5f5cc8b7b55f1c01a7e4000000027c1641c90e10b1029cc7d6800768f64dad73c979f877d13468d15db3d582a275c13f7cf4b8af6eb6443d7d7614962f6b44b4b8f229306a44f989744b47dedec iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f010ed137ed5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{26665021-4171-11EF-BD1D-D238DC34531D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427075837" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2876 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2876 iexplore.exe 2876 iexplore.exe 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2900 2876 iexplore.exe 30 PID 2876 wrote to memory of 2900 2876 iexplore.exe 30 PID 2876 wrote to memory of 2900 2876 iexplore.exe 30 PID 2876 wrote to memory of 2900 2876 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\43b867821eecd9f437dc7eed6df950f4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2876 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585f8f64bd1b68083edc7f2ff29a36c47
SHA1142fe7ed41c67ea90ab179ed6daf56033136ef33
SHA25688e7b8499d804c13db1c28f6b3de4c1969d189f9e3c1c2ff3f2df204aa11794c
SHA5125f47ecb780a8f9fc068fd1e1eb59aacc67cf54b3a11711caeec88e136e58bdb78f1d3f94bf3aa2920b8aa45bef4763a369e385873992222857d4bc6425683bd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0d8225b79ab7044c1bc19947eba51f5
SHA148da9e441dafe8e41895a722400a8bf0979e27fe
SHA25648338b35ee3412796ceeb93a8ed57fff6f277c417ae7f6c7a6751b7c826ebc0c
SHA512d141da87a11fdd7ab2695a34f811ada4368ca8e8b6545132dd6420457bb1e6104acb6162c3a74ef4177dfb107030e7add9e2f26e7452525e6185c5e106e44448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565a1b7f453ae3e32cade761eb2e0ed05
SHA14861befa5b620cb5e556bb67976ffa0ba200f720
SHA256638c0e3f648ac708234d40f4a12a6ea6620c7159849e958b4ec2a1fc11e83d98
SHA512874aa4e42916b2879d4b0a25200f9b288e8c385f622d61aaa78d1a0bf00ba63505e03b434772112009042d28365ecdd73efae72a1f7e89ec5df7ea6efdd95504
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54647fc19e4d796fb8cbd50114a0d97c2
SHA162770df4136f87e6138a9d334b41591c60b8b418
SHA25697d44912bae5c4bcd847b8381c22ba0fc021b2f9ddee6c889eb502555952b58b
SHA51283181051d06da06f3dcb309372051766063469aa2a34c4b1ddec7c141f25bd6a2ae07e5bfd31aec7197b54e6a484be98efd4c3bd03d8d3f843eefb459f398727
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5068e8f599d044f6b710d61d6ca12f23a
SHA12538f41dc233b74ab7ed6cd6183e342ea26d482a
SHA256e61adceda7c2aafa9e7d87c093b121ce908cbcd68643002f88db48e682f6550e
SHA512266a8f7dfa446ae9190bf0e21c2abf977942e3bbb694d6cd754ba664fe3af18c062deed69cb98e10852347c226d84df682cc234e762c8286e5703092c81de1d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5253bc14b170d3b3805642c31c1ffcd56
SHA1f0d98666b52539130014a7358dcae0c333774a7b
SHA256c927c185abe870d09883599737da0ce2f4db0b71a3f21ec918e134d2c909c28f
SHA512c28a7408f94f7f96e2cd0001462fc5404c09967be27e616a291c1e7e1a10b6d29a5657c50eee1a48ea8efd7e61ee533a954d53ee88bfa18d0b1731faeeb9bffd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c77cdd3482db5393927d2597b5176fe1
SHA1b177bee4276b74c9a12770129e8417c50ebb2ac0
SHA2566524b2798135b7407597072d240a881aaff07c8a0cc01cd6378f60771dace936
SHA512b61d8c74ca971740c5e75ad6cbf3bdae4302d4ed828cad21089eacea3a679f3219cb43c2885ec7ea47c3655377c4f56ee54601941a71d8acbde2899ae84f6c90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57145f6ce98777e836468384df297abe6
SHA1e8984dad5d3cb604a83e1fc211f5eb908937e491
SHA256fc40269d419e05428563f5e8b2b7b4998c02300e993c0f38b0af51b4b2b46a17
SHA5124aa585feae3e8eb45c2a515be3b48a73db2d56118d9e3799bbc63bf248e991d52ab9bcf1a0c91319cc1f20e681562c411ecba068af3ef9fa9180a92ab49e7677
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c91a9a2078855f868a7363f2cb7c25df
SHA1e9f910a54f3c08b70c04d560718113ef58cd86e8
SHA256abd03a95c06fdf32b3c9b49bf271ef74e1def70551a33fcf95c68fdecb141f73
SHA512ca4cd2565e1c4d75dee4e9b76babe3f597fddfe2b7cba01e43b171cae0742e054561cff57f4972a42bc74f4a102277bd9e370234929b6b3d3249136707e2901e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1a87b159946d451d31f5af8c140915f
SHA1af2992059d1e553d7da29b76ae9dff234bb9e8c2
SHA256602b1f997f7c868ab0408b51ca1cfd7ce765a0f36cdb0262342c9d911a111889
SHA512e501ce08b83611b829b44d562e2111ae0569832df1924cb5ba116e36fe6a98df4e65f54316605bbf87edcf52d80df7e9d80f08b9d09907129a7a78049a1cbff9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edcdb12b4a7a196f75aeb722701fa5dc
SHA1ad37111ebe7a32f8172c3510f7bbd38f32ceac2a
SHA256898d4c4df31108911c98736d21640fb75c6e8a8d4d609fc39c529f9df24a731e
SHA512d4909681837ee77f0b1421a610eede22c3cf75679781228770c7981ef39f5d15d0fdf05eba08ad70d0687bfc7f8910642a3d07b989d0dd4dbccea80c475d6732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ff5e98af24545b07643a26b8d2238b8
SHA12ccf0df03c1940196bcf50c6263be654363c53b7
SHA2565c35d6c79bb7ef54a094b246b5476a5116cdc9495125e811a6c11b40f4ec4ecf
SHA512d405df758d41fc390637f8a2372b2350fe03589b3d7362d6759a57446a6c46335f23b4de4ecfce87fa42a1e3208d88e10b28791ed0555f23a5911577933b5630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5360e21f6f2bed49400002a67ed5c1605
SHA15cfa8053b8c64902d3fac0751b5d5393e4acfc2f
SHA256b7ec0f6cef022b8b1f87a5bea6bf638eb1e33e01ea01b3420c4d832645d30773
SHA512f7724dffecab121994911dfffcfa610f5a4ea1114872da4423d6a3a79f6de0c1ddc5702d621690de2cc13d9009b80502f8a78f3c6df3a0cfa3910931d9591ced
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cbde5acb1fdef1a060977742d241992
SHA1d15751281d72cd7bfe4223fa1dad88a01f773582
SHA256f3d35e7fd07f7bc1f7bcd15d51c84a7196760c078026ee1ada1bb4abcbb6e752
SHA512135df9103290e05f5c1e50bb28f703686fab177a9aeb2de786eef0dd6ba88362dd3111ed5656385f60bf5c76c09e6d7287aaea0f7fc9faf8d39a8d7347d6b470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a93272ac0c0066815d8e3db8dd3537d
SHA18df7f85035cc53cb76c9c9941c1537f79128827a
SHA25623b6b966c312449213ec0f8f7b3f17347bc0a064c95988613d1bbc5956298579
SHA5125f2c6d4f5c1a378b6b58b4d29cf37d52d6f66071f2b55b203d917917241cde897949eec9c2467a9be8bd492111ee11ca3ee9ce5c7b9578e15f2043419e0c58e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d343cdbed9eaa810867d8c2c2e3d327d
SHA1cdb4df749282e2d683bc8ee6f24c2cd78942a7c8
SHA256a982ed218d03f4f84fe6c79f0c8de064cdd6feb33ead7543a80d4e21bb0a8361
SHA5126f7fd65e5be7c1f4a8150f98249feabe701bcc7046160b7dbdc53fb1f8fe006ce0e86c90a1f9fbb4adda46764a2c9a250de5bed0f31bb877e2c0ce3d6249366c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56545b21563eb410d3923e60ca07c42a6
SHA12c671c9daf94117048491edfe65378028518f3f9
SHA25635965c84423e2de2396e86f0cabdf63794b928ff5b7a2a39b00d772efecb0982
SHA512d1d906dd9b4cbc43c5c19d29f3b7e0b10a1586bae01bde4c94cca0e3ce70d7ce6e444725508893a7ea1aac85dc943ffa517abf2f8dd8cbb9c7042ae6b91e5318
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509e040ddc935bb09246db671d866db6e
SHA195e4c98184b1df610b4d5264b8fd756de8012711
SHA2569827b41aba391b96f20fe74630896df7b8b3a2e6bce5633ddea52db3e0b1ce49
SHA512c50b9ebb87bfaf215db10978e0f88486335c2d7479b783ce2d23a14555f3205eca69252c4b9605ba6c28e28e6f36c02083be8bdc526c64aeff1140ef275d9704
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa93f9bff9ff0543faec72bd6c79b5b4
SHA1b99b0e072fce1a5736352f7bcb6a1174c8f68f35
SHA256998fe1bc37448afc884617b4b102b1a9a4c9c975fe42554bf3d0d49d7b55df06
SHA5123af55fbe64577cd4d6546d38211f963c0ba7a74c1909e0deb09ac81ded3108daeb22b5d8a084df62379d3f563e30fa50d678dde1bdba5cfb36374866cffc8e52
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b