Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07/05/2024, 17:14

General

  • Target

    2127ca3e2cbefb854156f32e0252c8cf_JaffaCakes118.html

  • Size

    19KB

  • MD5

    2127ca3e2cbefb854156f32e0252c8cf

  • SHA1

    80c744b40f842741e8b346ead11462bfe29d293b

  • SHA256

    58f2c1754e8295622b1850c11f1fc4cc06c10e44da37895d850a3d221c79fc57

  • SHA512

    a4742b7785cc0e71d4053f5fd4eb05d526c5ea67c767f327270c50c7959fd8308efad77dc14250fe6fbd86666cc10038fa5a77e01109e93c0002758f1dd28da3

  • SSDEEP

    192:SIM3t0I5fo9cKivXQWxZxdkVSoAI74BzUnjBhb982qDB8:SIMd0I5nvHdsvbmxDB8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2127ca3e2cbefb854156f32e0252c8cf_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1940 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    098fc7c6bc3c83edfe8c0edaf2678c6a

    SHA1

    25c2a309d733044d372995172c9d0103aee8e12e

    SHA256

    2d3ec3ab3924610afabb583d203eb99b842d237442fd3436c4995c55a4ba644a

    SHA512

    f78774aceb390671722a37af376f026076183d17e9e879dc99f43bb5c3280f6755668e74d8547e95d873692f15f98886106bebe5073c78735059eceedede2284

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a4330490db2f3195c9001904f980c01f

    SHA1

    a30ca6bb8343dfca6087dce405774b8fa0274a92

    SHA256

    5b59617e7208865361b7c0f0bb1f90d42e0572298e8dc31303a2f63e9a689871

    SHA512

    5d879dd6bbfd27702e1f3a872e15f8d54bacce4e8266f14edeebbb37032d64b7e2a29fa25713942435ad6604c3e4cbd8f970ce1466115df7b99f219657826ea1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a5f586e17e43b9b4108cf028a8504ef4

    SHA1

    cc34ec14e8442bb21c89cb40f432ce8d482da25c

    SHA256

    4c08cb024fbd6ed74a6d4f34040b4a856c5a906b5d4913ca60373e909416b89b

    SHA512

    18f94edc9a554465b46a49acc8cd360b44b834797839e3ceca39fe778bf39878bcae03cc50ae901dbf0a44809affb29e638283d793d1372f8eb368f079b24ed6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ac39ee805748373ffad3da35a0234b1d

    SHA1

    de8f5f878ce3a72014e901bbd22e13fbe961a6b8

    SHA256

    a5b4afec30cb68ea1b14185c3431e680847b6299260ec9f70412f8ba64b9dde7

    SHA512

    2566f30927efa2c6831a79d77c42a9a16ac6706d2bcd95d58569cd68c3326ef553ec5f0240aa2fd6de48e9f959c3bb02cc845a3950c7cae6085a0c3b8e213d26

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6a433b8e15c90527a74a0fbd773daaf2

    SHA1

    a77b6ec49261e01b789f813a6391ba27cfaa02b4

    SHA256

    7aed4f613dd53a18659d0dff346018ce41eb8e6c3f9ad187cf4776d526543cdf

    SHA512

    688ba09939bc40d16c01ebbb749133e0759ee4f96d73aa849e9444f8feb2ed6aee24afeebf1fc1239e9081cd24770b205d98dfc9b4ab442db15cd3dbd748d949

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ad30292c483583de34b0ab577a4af6c0

    SHA1

    d3a1dcb99b1c2d8231ff4e0635e2969ee84522da

    SHA256

    2d67c101999517fdd455391b1daf9bf32d07c6d7b9eb5465cb0a1645db306aa8

    SHA512

    df760e5fe57b4a711750be7132f01303d40630cf6d76de92c8bd68969e01e0d4244dda5319cf27c163e2985f83fe525da7147116b81ac36d1a93d5ebd70a9b43

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a995fd30818e275a9edf97858aab651e

    SHA1

    e3dce567cdc03fb824fcb6812097154dd5ae83b0

    SHA256

    daa6bdbf6c5e218db3d9bd057e3be963d29e753614e16e48828b4f695456eb62

    SHA512

    1ed2fd84ede388f4628861129c380511ffa69e331e9a969081cda44ff09dc5e9e73c30ea82248a30a25866da3aa80c7d89c2004b6d57e09fc6ccca32d0347285

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c9b211a19a4362dc65156e5071d7dace

    SHA1

    6920ed5e20664ecebf0a1af334252424ee694154

    SHA256

    e53b6a3ebf849051250cc7351192e937f563718e4e75ef2886cb08a765f95819

    SHA512

    05fbcf5fee588448a0361fbcf51d976cc3686913abe80a954409029d81974fe633d6e30c0c42bfc7e554833e71a3efa7a966887c1b73c5bcbbec9e4899ffdd64

  • C:\Users\Admin\AppData\Local\Temp\Cab11AD.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar12AF.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a