Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    137s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    14/05/2024, 15:46

General

  • Target

    420ab33b0df8b60ee07b24c85eee766e_JaffaCakes118.html

  • Size

    140KB

  • MD5

    420ab33b0df8b60ee07b24c85eee766e

  • SHA1

    5f57a1f65e6ec4b149af98050ee955ce41207ad7

  • SHA256

    ed7c1d1b4411ec1d310308631fef29f3bfe07bb7b54e2e4195da9544e69e1f57

  • SHA512

    f76f84e24b98bbf97d6f8165ca869ab008f9040dcbed3c0465dfaa1907b94902ece1c886f72b0799c5e3904809980256df2fbdedc85ace9d16c012638f7ddb06

  • SSDEEP

    1536:SGDt0XtpYbjx+lMyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:SGDhx/yfkMY+BES09JXAnyrZalI+YQ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\420ab33b0df8b60ee07b24c85eee766e_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2428
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2428 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2f9b812cc381353ffe03f93d7d5c25b8

    SHA1

    e9e182befd7da21a4177f4319ee04566dc83cd18

    SHA256

    20d5720a7c24087aa94d1bbd3e21423e5021a83a81e60495afb2e6231ed0f304

    SHA512

    4703f3da011c6e6667ea7b8d5da7ca3bad27ce5257be38378c4f335e9dfb36f31573a19c514fab6a110ed16de7e62f9d91714adb48411162e6540c6bd499379c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0615ee93c0add1e66b9eac88a04a5066

    SHA1

    fa5622e27c74b21f1c4c584ddd30ab3b96dca6ba

    SHA256

    f3eb6a56274b5ef0602e0bca31c5efb2fccfeb12a9fdb8247d6a0a3fccc30644

    SHA512

    ff7a3a40598cc63a683c58681d5ef3211b0b539426bbbbbd52c2fba9038bf3f3a6c868d5c5f07fcad09232ab4e47df06df0e905c1f322f04e1b8fa7cc0d183b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    550fb3a37448eac9a29ae63e5e79596e

    SHA1

    08098f6e5a3d89bf7ffa9891fe7e9e8e00ca9233

    SHA256

    e08e7285a92c3d7dac58c2decb2525b0e98965275d756bc34905a8d23d5aaad2

    SHA512

    12ff64b01873985190a3014c11a488f106c8f1bbee6226e42a236a8fde96eedfd5f5cfd5e08d2dc4951dfb4b604fc669201386a23ff9175c603afa2bd0819a98

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8c9fcc5d69afb977f09b593379d16147

    SHA1

    fe6865dafda4156d76cea10b6577343d7ed9b360

    SHA256

    8be5deadf41b1832f775fa3c661176b701a9c1d48823e479950480b3cd0859ef

    SHA512

    b71f285c0d1c57239630883bfa2f7931682a37e23c59725fcf006ff2723a1fc414bd97439055e31f1f57f57baaef7dc25ed9d2bdad8f626d21e3fdcfdb712425

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    958740251a6c66f790ba3ebf0bf2bf26

    SHA1

    c8c73102352a640b82c9cf1ac860ab5099a8046b

    SHA256

    9a0f8105be2875726ff1cd96eb32b26e5d232e24e72d75fbf3c9a7dce4bc6bc9

    SHA512

    27dd9dbcb9f1120eab22745c6744004e580a648da889781ae9f79bc9eb27c6a56292641ccb710449fd806a12c6b9c733946d0025eb06a51dfecb0a2a592170c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8ff45d5f808550c7f4243daca2d9603b

    SHA1

    07cb69c65868b2bf986b4445af783291332bbc9d

    SHA256

    e48040216d075263b72c488dc4c1460bec40fc93ef154f688878329abd77890a

    SHA512

    a92f781548f63dceeb732038cd66ceb4313435bc8ea800859cb12a34ebb8f09269cfcb5b4b6318d606116cfe836dd14d44be03a5b1c2f049849046e06b951125

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H09CVCL3\ads[1].htm

    Filesize

    114B

    MD5

    e89f75f918dbdcee28604d4e09dd71d7

    SHA1

    f9d9055e9878723a12063b47d4a1a5f58c3eb1e9

    SHA256

    6dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023

    SHA512

    8df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0

  • C:\Users\Admin\AppData\Local\Temp\Cab3C66.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar3C79.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a