Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    01/06/2024, 09:40

General

  • Target

    8a131c99c4a9295e8f672d0d803cc368_JaffaCakes118.html

  • Size

    26KB

  • MD5

    8a131c99c4a9295e8f672d0d803cc368

  • SHA1

    cbae2d3940cfa1751674bc6cd7f8c744412fde77

  • SHA256

    77d58ab93980f3e348e91b8b1802ea3d2a24fc5639077d696033e8a5daa7343b

  • SHA512

    667d27eb2f94bb402fd3ab3ad2d8e5c340cdd5d2a7d752cdd365c3780dd58099d84fdc23c8d1df52c220b9fa1a3d3a04d5aea5c7c47b8b792a7bd201251456bc

  • SSDEEP

    384:CGuohvuIxTN+Pv04zdaVfq6D6w6rw6z86W6Tv6cq6z6Q6r5Rg1o:CGuMuIxTN+Pv04zdYrtJnWvu47P1o

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8a131c99c4a9295e8f672d0d803cc368_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    82916f3ed8073f061da681eb008f10ff

    SHA1

    9f1268f0995fff6b5933be838c6d0b858a581607

    SHA256

    b27fcf4d2a622ad231f9e57b4f8d939ad484259be4cd89924cb19b52d61b9e9a

    SHA512

    8fc81885b8f0ee9ef3688b2d7a31ae6c6bc56ec327552e925d6164a272085456fc8bd345a722afcc7af2a305b4a5fcaa72721ac4c0186a7562ca2deb89709b81

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f85ba72b2f8b67800413bfc2f9f765d6

    SHA1

    c4ef6afc0b9b45393b0499b43adae551e0c9febe

    SHA256

    fdcffd6dd6430050e48e5bc61fc932262cc05a599d1aa75aceb388f51ba2dfab

    SHA512

    d23199ba9f942c649fc0a06b59d9578b2e97e031ddcd418fbe1d1c26caa41e14a1304aeba58896ee01cca1ca7b54dcfc4bc7399a12716eb32ef0c1fe0981d017

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e9df3697d209951c38897c6ee7bea528

    SHA1

    544f427a7331a6e04566617ecb0092083d12c4d9

    SHA256

    9dc8a4bedf77a68efce4852b6cbeeba697b9066283fdfae7962a34d718152262

    SHA512

    328f8300eabe7cb50ad2fa2592513b341d7048d2fe4a8c239d79c06b727e455864811f958fbd2673c46a2d0be75c2c8112ffe33d7fbf15e6bf9d9ef175404316

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ed94e2a15c98ed04459245178bebcbcf

    SHA1

    ddb89efe7f3d40f88918fd193f82aafa47f35ce6

    SHA256

    500c1ce6fbe9ed079f4e5703edd766af0cd245b761f5bfa97ca7a6f4b2d89750

    SHA512

    f7af5e3daab2236e70d9941ba074708d5f944105cb2415110e6ac8ff9e7e6109b0fb10102537582ecdd004627d2465f149085a87e7b4123a36ab8591f829d44b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    16ee40badc162e42cfc618c0b6ce4541

    SHA1

    ce9db8d765cf250b45b11d836edb54ad4328713e

    SHA256

    82f6c3a4bf419b7b7fe7fccbc6c343d41617d12ebdb0dcbdc690c2d4ec189826

    SHA512

    b481317538ecc0faf287cb350a65a013298d30bfcd3f663712900b93b459747b1e813c68fb98ce86f0c0d2a0b83ccf5d34b1927ab5207c184af2f06f7930560f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2a9fd2cdd31c2a609a139799808728b7

    SHA1

    2a15a667615dc07a7ba6914aa3f17ef0a3e9b81c

    SHA256

    b80ec63f9bcf4c1b3e59c4d8862e0360a2c599633c539dab3e08437ca3d28161

    SHA512

    dbc3fc29fb66b1dd986670c6f56ade7f9b6123368e325b412e1cba3b5212ff8e200af29d705a4d7230dfb574d78a2a18eb7efc9688544a2f74268ab354825808

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a919119e2b36dbb3da91dd1c0625e109

    SHA1

    e75fe23ef9eba992eb6155387e29e060ed58121b

    SHA256

    8c97194a751f356fd77bb3b32207170a18bdf3ffe88df21fe02dc49743ef488b

    SHA512

    af08910a6f377056ad368fcb2b517bf0dca56eedc0c70d8b62126b8d0b9b42bf90c7b62a9e5dbaea9fad60024059e355dc30afa85220557521d6da867d6b602b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e9487e60820be413ace2b04e7a7216b8

    SHA1

    63317fedd46f7e81c31118e18fda0596c93c830d

    SHA256

    a85065849f9ce22d7940c1e2a22905b0f1455e7e4cbf53d3a256d115c10490f3

    SHA512

    4cbe6f8c238a8bf19a7301326739849c38a0e7c5de4eb29cf7591a401bbde11935b3f829603d5f4342666c7397ff3d46243693934cc03e77723a0cca5959df40

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    949363e933b944eff6d0c5941174c4a8

    SHA1

    1f706cc0de8b9e3b31edcfe715404b7dcc5143d3

    SHA256

    9a5964f2633c36c1a0c212b46fdce91b407687cb1a90a4829f56e3cc6a5cf8d5

    SHA512

    b1ed5541c796e64eed1fb198ca5cfbb703b721cd392dc69e2dd405d0bfd6a024c8308d6d09b4d768f8bb55d24c34c6000dfbaef713be21c185f95d9e19607e76

  • C:\Users\Admin\AppData\Local\Temp\Cab6598.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar6726.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b