Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    24/05/2024, 17:21

General

  • Target

    6f42d35ae060108e799ee5c196b8036a_JaffaCakes118.html

  • Size

    27KB

  • MD5

    6f42d35ae060108e799ee5c196b8036a

  • SHA1

    c579ca82de10112af4c6664674d204f68fd0a4cd

  • SHA256

    26e77f57cb56a6c9fc7c28152362f2e3978ff12f4c34526c5a50c9a117cdf123

  • SHA512

    92ac120da0173bd98aa784d0fcb6602902b18e6b92b4eaf1ea80859014954d1331b3f2d82bcf673c1ed1a64c89e5038e16c1f497abf3b328e311dc37c3622933

  • SSDEEP

    192:uw/wb5n4enQjxn5Q/vnQie+Nn2+vnQOkEntFtnQTbnRnQ9ewym6ut+kQl7MBeqni:JQ/0+vVaE+PSIDZ

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6f42d35ae060108e799ee5c196b8036a_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3000
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0e6322d5164565f89d8a2ed5fdc9146c

    SHA1

    93ae1a07f7ab338039ef6dc3892e76f839ec873b

    SHA256

    c2b2fa64ab071ce2f1284424a6651a7d74c291d26ccf18816c28092cbee5b419

    SHA512

    8b0f698e85c8463127f2f418b8d2cceb4366264ba04f3625d1da8a5dac5246580936ed7446c200043a93d33ca0c7049d49e34aa6be9de65190c89f28383a6317

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f7fa5cf830d0ae7aaf5d89aaafa7e460

    SHA1

    0a8be15c27848220b48f31f8c52651ad6cb1feef

    SHA256

    98dd39031ef1b9bc7b6c7e3b63940e7b384c4f1513baef9fd7ddb6af7da8c95b

    SHA512

    ed70434dba69ddf37790e54dfca9af9f0b4b871eefd831876b87d427b84938a1b6f7248aa35e26c848de0d46e176dd858c377892d993d1ea91f5a1315853977c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    de2d79153f36c34826b8beb1b17f5c8f

    SHA1

    56d351ddd8b8d574d862251fbb0030a33ab463d3

    SHA256

    6ac6fd5d803d0d5b86b55e2a32c0fdfd789d27b9172870ce6692101ddeabca6f

    SHA512

    e3cc7fdf38a2366a32c50159068c7b733d11363c4bee99a4749ae79fec402a27293e5d6d4242e4c1f3c0b2af11b076deb6255c42d98b97389006934303cf2171

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5bb82ee99e1f096e2994ef66b5cec272

    SHA1

    4be488f84383e616940f236445b657ce3899c5a9

    SHA256

    a2cefc6423b44ca29ec7963bb8b0ca24a37905e0edf4aa514ff0743914cbd18b

    SHA512

    f78d7262f68a6cc601de2cafae8673d899dd1f74a7a7d4ea1f7e1b623ce963dc118d982db08f46565fe023821e56a4fb5ea287f0adc359fe2633d6194949b72b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2e70f95d2f6f5a286cfea6e9beae6d03

    SHA1

    b3199dda54acfc7df425c9c172cf0887f7c00ca3

    SHA256

    bf4a6315f0069047ae4d61d0607fe3275c7ce42ce7928814f3f7d6eb215543d5

    SHA512

    080c5f2e73c5f854a805b3a217369c9c1ce2de7cb708ebbb6909b7c1a3c7328ab728734e55c1e39d293dc56b99dbe367b212a3ccf4f12608348b295b65b2057e

  • C:\Users\Admin\AppData\Local\Temp\Cab1352.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar13B5.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a