Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    01/05/2024, 18:05

General

  • Target

    0c7971d888c2fb9ff1f4e866da23958a_JaffaCakes118.html

  • Size

    19KB

  • MD5

    0c7971d888c2fb9ff1f4e866da23958a

  • SHA1

    08c93cae2c6e1c9e8c4594b479af4fa679a04142

  • SHA256

    39c0b11df2c89df38c51f7a5dac7247675e1cd9f8bdfa40c4a394528f718c40b

  • SHA512

    b6b2c484418b9c6a51034ed925a7627d7e878c3433c13b1f250c515e29b3366c217a7dbffb97142d03d3b2a8e4bed830a374196e30432252c943c3cfd9761b1e

  • SSDEEP

    384:09jiOTCiTH/jIB9gfOoLLHmDE+S/pJh2G2MswYBo2Ns7YlRS+a28+Im63HrhKqk:0JzjIPg/uf+v+Ir3HrhKqk

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0c7971d888c2fb9ff1f4e866da23958a_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2484 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    565f3e16a2b9c32cf6e8a274eeff5348

    SHA1

    5bc8b0f98a277880cdb43d92cd8d04255ba4136f

    SHA256

    1f5f3b0288bb2cee620ce024104cf0bc3b1f67930c9aef276d97491bafeef3c0

    SHA512

    b5391da49ac1a196a228ef76d2a806df9e3582f647f05d951350e5a08c11b67f2e67c0ed313a0d744e1b4482dbb593644abc128fde0a9aa85014cf4efa9eec31

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0b013d8778b96584413713695e68998f

    SHA1

    8d6b94981a1131c2caaf28bbaeff99df26000758

    SHA256

    75ca85d00a906f70b5470ea56b04b16e0792a9ef50775deb5e43698a134b464a

    SHA512

    48ebe8e21fbd2f201674f0478af34932ced45cbd3d4a388c4b1b4731d624efe8cf19d7efa9f7dcbce2f3e87954b4bd5e32bec312171f129305a9053ff308949d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a86f470d98012959eee10a7e9dc35790

    SHA1

    cb81ed428680f5ce8eca4a5d5e6524994d20bc63

    SHA256

    b102c53e0ff7ad5915bd758fd12abc885f01392c93b50696184a780fe158fa7e

    SHA512

    52fe3961a469ed4113b8d016fe6eb2e685848e1eedcdca8d8d4baa08483d9ac3cbd8d92e7c4ae108d593d60ab872e99e5b3cfba852557711220eb7b547750b5e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    19f9e50aab1fa84a5a2a273c1c5239b2

    SHA1

    e6af8ada3e967caae0ea65400d0e70f26cf0c46b

    SHA256

    df644ac9e020251e8c864f9d330e0f0ee92039c29173e3835d7521f16e45c93c

    SHA512

    384534a42337c0795da359a290a1bf072eadb77d4f377184a840f8455add10c08418def443c196f9f65f682eb0d86034540ffd6388dea1d5fe4e0e6c7ac262b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0596bdbc3f6fd734dba064e28d591b49

    SHA1

    63b9249dea25dc9fb039e10992fbe960860e89ef

    SHA256

    434f338e76985c36ff115123556541317832ca90fc1ccfc13cc8b360c17177bf

    SHA512

    6b6e8ac065ff37c1f3f8cc87e9062fbaa716be8814610e25fc82cb64ad5fd4de573b4e116c96d7e6f996e38c4e7624f5436c92a4ea4e7d6e600091573f9ff3a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cd8c6e9f650d1cb366a011fffad79899

    SHA1

    d4aeeb4aa594563c229402c506d373e4dc257999

    SHA256

    dbce957da0fef47386b55ee62fcd8e7389491c74a94b005d841191ed9a40da9b

    SHA512

    3901ce85500c2943eb174005e1d708549b8f5e774e6a4cb1913cae8921346722e6cc7127256a3a9112e916eb78cd88fc74e8292aa6ac5f13bc8078c8bb93662c

  • C:\Users\Admin\AppData\Local\Temp\Cab85A.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar85D.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a