Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/05/2024, 15:34

General

  • Target

    7d7958e8810ffd7922790a8cc5f5ae0c_JaffaCakes118.html

  • Size

    18KB

  • MD5

    7d7958e8810ffd7922790a8cc5f5ae0c

  • SHA1

    6f13ac5a0988fefec42525d46dc8df28fc6d2494

  • SHA256

    5da0a84378e9ced6775846da6a8f1de33e098c1405ef50f9c72feb337159f5bf

  • SHA512

    97f1332744ffea0ef31c6f01c92450c72475d7be1582ec5bb433534e90fd3a5dde76e92ba09715d431ebb18c39313c272bbf2cc4c68b625d9590413619c90b9b

  • SSDEEP

    192:SIM3t0I5fo9cKivXQWxZxdkVSoAI74FzUnjBhfh82qDB8:SIMd0I5nvHdsvfqxDB8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7d7958e8810ffd7922790a8cc5f5ae0c_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1716
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1716 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    191ad8d555c8cfc57c03dc540300106d

    SHA1

    db37dc9aa33eb51000235b2ab30596b96af6c8d8

    SHA256

    ad236d6c12a7aca30eb5d50e71fe71ed885b6765c2bd5ace36c482da352ab350

    SHA512

    af2db47cc9867ead5588b4b5e5d2b474bf76244979395816e68940ddc733bfc572c6af29525e4092367e3cb8462759712eb97de9457cb801481e0baca9f7680e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    31a1cbfb39b94a21237fe68b40ce79f8

    SHA1

    e8ea2f7d872c4709e8c1b94ca4178d0297f27533

    SHA256

    8c960e8b888ea1081299a166e52eee977290b57d96ea0ff26b5503c4fc05eb72

    SHA512

    c30a38e94b716e9bd9ce7abd61340514d5198307765962c804296bc3cf5e01bf3964f2ef67a2b22ed901c35b149955a55e9e5f9a72aa38f306ceac90fb6cef0c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    85f9a5f8d7dbd4b49c659823345f0adf

    SHA1

    6e9d3e903c031a121566b759a3b79a9c1feb4bce

    SHA256

    6d9422d1ef7cb289c30ff75d4f3ac9da638134f241d44c9cf3184bf1bad1a745

    SHA512

    aa680ebc44aaac51f91bcac3793ef615cd2ee34dd32674756e4c25111cc2e2b68c0ba065717c1bfd9ddc46738610516343146afbc5a765f45d03978bf090110a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    177c977ab8a6425ec72fdcabe627386f

    SHA1

    3ebb1c035dc75cd73ed9439a843911f2111c7a64

    SHA256

    aa167bb344b63fa8b4be9ef198a3fa5588d343bf1bf039db0815987f1596394e

    SHA512

    30e03aef6f4b8d4b1cfd24ae075dc31d3b46b8b9d1bc566147d586eacce3bd48d19eaef0da77dbefe00efa9bb6a0ea9f53f7e7b821cc74ada8a699b0e3786f26

  • C:\Users\Admin\AppData\Local\Temp\Tar177E.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a