Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    132s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    12/05/2024, 11:44

General

  • Target

    39eddac0bf914918e368e8de5aa2c3ff_JaffaCakes118.html

  • Size

    142KB

  • MD5

    39eddac0bf914918e368e8de5aa2c3ff

  • SHA1

    0095e8a93f4b0d84ab549c1f1b88f976a8243ae8

  • SHA256

    a136a2cd0cadfd4a6773f39ec5eb8e7381a1fb4072f618f60721f27fc9b7a863

  • SHA512

    905459b10a70b6ba76bd50d57b5317ed881c9a5b257e7d3737de95c6238890da8ffe58b35192df260cc36fb78d40a9eca476f43d2b8b0be075875e56b863e8f3

  • SSDEEP

    1536:Si8zROlBJJx76vuyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:SilVx7dyfkMY+BES09JXAnyrZalI+YQ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\39eddac0bf914918e368e8de5aa2c3ff_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1116
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1116 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a31a7ebad5e8d1a4524e1890cf424a27

    SHA1

    d627cf9627a13f99f9545f092ac1b8234eafc46f

    SHA256

    e762de7ed95047a6ba584f21f4c54a72afdd4c03b90a18c0be1581b7681323c0

    SHA512

    e1f8da6627a36acdf8e8317bcadabee943fda56570a9fbd1706160f206af0d783207e30017f2a33d33e020faedcf159b2f36d6edd26efaf9c75288a691e3f7b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    96c6b6f9e8615b8b70b51662177b0a02

    SHA1

    c01e8847c7b73ef566b355f37b801c8903adc475

    SHA256

    ef8fc234d436123defc978b9ed04f3ca9d3295a1da3b2df7a174f6885ee0ed39

    SHA512

    fa052f813cbf683834f058e4c3ccf17e1043d4b3c4e878063ede50c3c0b3df2b6f1a98832cff9335f240c867d17e1962f8df3cd3f065951c807c973bd80c20d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c76f5b15c6be55cf48acbbbd4ea7be7a

    SHA1

    8baf431d0fd37c387be3a2122916eae8703458b6

    SHA256

    f30ac29c511e3147ae54b0d37f7c4e565e6b48bcc996ba2cab4ac51041c4e060

    SHA512

    f1ff48d9a46a60b302fc81ba16a7e2b78d4c07839d3bc98273cdbab2ff4fd4c94a60f3a99ddf6e2a649c16b80bb6bf6c96b708adc928d87c8aa95e35cf18844c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    64677bc799d5e885cd62cb17fee34fbc

    SHA1

    5c157aa8ddbdb1255adb40403414fdad30f0a4ec

    SHA256

    f82bae66d4c49a35225524169806a0fd9929c579a7de09c1270af1b9fad60163

    SHA512

    3784ce4263cfd5ae5e9c771fe44d973ddf897229e7d8015bfb9c5f94a05209eb3109c5529c9a59284f3f657c1156383705b3d373cc6c9ed222510e0b220a0d42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    be4f085e6127d0200b4b6d2a47e2ed1a

    SHA1

    5985ba05ee44899cf1c131f292bdbf252851dc46

    SHA256

    85ea3b09342171dbac78c5091c2a40ee54f7bee7487c2882a0f40dfc36901b3e

    SHA512

    0f954b0e3f9cc8a5ce0a22a8b683e0a003b02059484338bab20e28cb3d80f19db1b41ebd3c7f6ff538caf52bf31d407920d14be67fd75fe78518742f7aa3f690

  • C:\Users\Admin\AppData\Local\Temp\Cab2CCD.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar2D0E.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a