Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    21/04/2024, 05:55

General

  • Target

    fe97e662197cf427d0c015cbd48cae3f_JaffaCakes118.html

  • Size

    12KB

  • MD5

    fe97e662197cf427d0c015cbd48cae3f

  • SHA1

    ca4b4cbdccc58bf6aa0c5a6c85bc73ab0ae969fe

  • SHA256

    e2de271c9a7e56dfe3d28cb0742f50df2d606eeccdb9dc803986781388326afd

  • SHA512

    079d046b51047c4e38448a8a128957c90fb64f93579a0c32423d206b8ef8489c8163e76c1d76ef62355442a33e607f7c66a2e479e28c622c0013be49d78b43c2

  • SSDEEP

    192:2ValIsr0r57MJxmT8z/w1wvqLkt1u0vLuBuLbdU8d:salIcIQJxD/gqu0zguLZ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fe97e662197cf427d0c015cbd48cae3f_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2824
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2824 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1336

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    06a8f53ceb6067d3a8aeeea7ca83c217

    SHA1

    670a7eb1dc075ae667fb5461254ad8a8fa738cc8

    SHA256

    8c97b1bfd6b4e05f50234e72fea15a41b90b1abc6cf7f0703e75c89212000614

    SHA512

    b074553b6dff74867db28e628e88df70a0e404c522c096605a9cf07cbd8191cc221b512dab3ea5143c3ebb37598142f286b35844d8c1951d0d79140f5aa7ab13

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8546590d986badf9fdd664da796384b5

    SHA1

    3bcd1866bf9e312a83ffc1202a13c9a080603a2b

    SHA256

    1d579f96a18fed602db7e294ebb7c48a5564f273a0ea545ad35ec2cd3ef5c812

    SHA512

    b30c1ed910635b4040c04bd44414d338a0ffb34c48a0b3c8fc5d5879d6e6cb08cf43a5b54459cba79573dfb5d927a473ef753a120bb4a5140206bc18f4d0955f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    038e985d0d431240383a7e03dd76e893

    SHA1

    b5b859e914de59510bc325a24779e8eacbea3c28

    SHA256

    d7c976bc24bc20c5da80266674a19f2f6071c56b3259a56a24887475637cf325

    SHA512

    886013b36bde9525a3f87cca30dc1261b5cb6e96bb1992cefbd8339d13fa24c2c48588126349a32fca87b6178dd234417744138ded42627c744943aad0038f45

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0f8c880b48ab6c88a17b9494b586321e

    SHA1

    c0add8b935d68e9c49ad094503852e7cab56ab4f

    SHA256

    df5eb7f0d2a2c610e08e2d2964eb5c678528ae3b078fb8d3e2c9fa879a2dee1a

    SHA512

    e1b3e474bae4a746e542d0df085c2eaa3e4a0f2214ecfd9e16cc1e30de1851a6b7f2a51a2d0d4a9a49966a208037e107de3f5a7c874f8e8e0acef141e69c2251

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3c6c7d8cc048819cc741f74ca431cf60

    SHA1

    82fa7d3bd88538a65764af005d2faa71897f618e

    SHA256

    fc1bef6197ebbaa062cceb5e5f66c1173ac39ae5b6f6d4089fa10e9ba393c7cb

    SHA512

    0b47442dce97640eb5b07fa4c5107d07baf7dce0e25b464574622428f3ad05dde318001c2990e7482e149f28e18c9f7b68729669bbafdebcfcbc8360642b4129

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    619f386592fc077f2157bc708a6f718e

    SHA1

    b13db95899e256b8d8c8764b18f778dad48788bb

    SHA256

    2ec2365fedb996e1fffca8c856b6a01cb2def0361759de0de68d61d7d978f957

    SHA512

    b21884c59246bb5e0d692bbed015a94422322eeeb2832585e11ee3515a3e719ca091ef6285a8af4e663bece3f431cd4df8356fb0ccd880fc0e8eff712d88159b

  • C:\Users\Admin\AppData\Local\Temp\Cab15E3.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar1703.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a