Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    11/06/2024, 17:09

General

  • Target

    9eed70344427533bdcc512bfe7055e69_JaffaCakes118.html

  • Size

    18KB

  • MD5

    9eed70344427533bdcc512bfe7055e69

  • SHA1

    d0fa813f2583a661073708c2efc6638202f1be14

  • SHA256

    311540e4ff6b1e2c8ada2a7f9f1c4e624a9f21c1d63b4afc30856dd9fcedacec

  • SHA512

    97c729d0a4c7d133079b30c7916fc5c85d3b71bcb525c46ddd0277acbcac8374405e8687fe7a35c394a60966ffa95e2d1a83f2888a54f2855ecc54e1e07ec80e

  • SSDEEP

    192:SIM3t0I5fo9cOQivXQWxZxdkVSoAIf4zzUnjBhR782qDB8:SIMd0I5nO9HJsvRgxDB8

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9eed70344427533bdcc512bfe7055e69_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1288
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1288 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    627decff8730a02d1fd173eef8d67c76

    SHA1

    c62b37a307e490a5fdae44014c34c4b380d773ce

    SHA256

    dbbf35c22c7c0427f0ca704fd54850d4360299953f329a085a225fed960db914

    SHA512

    f27f57aabe304d0bb0a77cb2edc7979b7c7f0c83471720870c19e9ea97d2618e02af578aa6288fa2970da6e17d7c38051765cc49c11c87775ad347231c25b005

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f26baf31b2177df0f7bcfac4b1617b0f

    SHA1

    8b621a9e762ce27f09214ae672c1bc8f67b7905e

    SHA256

    494f8dd887f0f529493f06b2e400f29108d9ea1d06d4ff243d87af36a5700ba8

    SHA512

    c966b5bc7975accc2e862afdd485acf791be938c5b8d76886b340bcc09b009f39ccbb279d49bc249f165a7bbca4a67a97dfb0151045d712fcb7007f1063cf70f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0fae683a6e0d7232e6a8571028b21137

    SHA1

    1b118510a95427397196122ba21e517cf778e319

    SHA256

    e65e836f18cf189f5e51162871ca430ccef2cba52cc92b85c12a4d5bfd68323d

    SHA512

    fb98bd98a11d46ee4dacc2fd8597689e369da2a8eb315a31d74af4268e5b4d95d6f3d89f4260e469f417fb94dd891e98b57c047124c8e085207d3d7a1cd7c4f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4eaa87b12c87829ce885b4c51e58275b

    SHA1

    c05617489763867ba3f9e0bb6df308ab2f02032c

    SHA256

    ead35f4c795e6ff46f5d8702ee0709ac1897ca86833599cfcd14a13a1bbd39a9

    SHA512

    49a9af07fbe05925ad32960389dda12677c3f2af579eaa8586d27ed930bf17448659ebe0d239749ad686e483d58f5eed6868bcf3a6adb08bd29fd2888b297798

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    df32080859260b0b6f322ca2417d307a

    SHA1

    e55de21bd558a57f748971162659ae5d9c7b2be7

    SHA256

    791662eec9c3588189a35c4a1556048be49ea5a1ffcc14491ae29a925805b0d5

    SHA512

    8229e383439170f184354c5a64dea64e856a86787564cb852a6d315cfc1d59c34a2ad0c93c01c09958c81b65fd86e9774697b3a59a8be748429f160914ebf210

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8f210895145f527bb2eafa9c6ea24292

    SHA1

    58fb020d91577ee5133822c2c7ec3260e363ed68

    SHA256

    993b930ee1773ff5ded3273ae3a1145ff64cfae852262c8f32f434c7f6324eed

    SHA512

    987b6237107526adb83bd47e862b1364a1ffda7329456c8f348099ee31da477d7f082531ac71cd9970b55abbdc62d7742f518d4b0a88d61b532dc3ef75a7e080

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4d2f035f5822a839ad54f524d88d9e50

    SHA1

    5f80ea67892623c36107f6e7042fc40f5db71a74

    SHA256

    cd79e4f3333f1930b806cb0f3e457de0a88ace5355aa50d15cd05063af3d744f

    SHA512

    0aa629432c6f1205f5bf21d2ecbd8c5e0ebd1a70ae6a5b600fc9321651a23581d9bab96a34847c5536aaadc6fa4a585c1fbba96c7621b40ac3adf7a6ce493576

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    504448d257f3ea22053e6e1bb5d9612a

    SHA1

    2f03b0210c81f4a8ae9acc55c09907c977b1afcf

    SHA256

    0ab2c7ed5eada7c03c338498ba6656261b25d831840869ce9c3177c28f094459

    SHA512

    ed51d33db8012ca221fe202ec5459bf8d3824fb16d6f8a2fb424d16ce086b8af2d8d2036f63246252ab02fc238cab9c6c4dfc6c1fe2067371c21fb531d49fb7c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    36c205853e439307e6ad433de77c6b5b

    SHA1

    f7967d83f6ebcc6044789a6f2bd975caa8af0628

    SHA256

    992ce82b323cfb8b2173777babbee99368d1de0a9071fbc5996624beef37207a

    SHA512

    c6395dd63933c0a39e3b587197774b591b6f237240572daa30b19a6f6052efa81ae1012e4e13a1029fed58aff32b422418e80bf17b7db29336dd8f2a7f1f8203

  • C:\Users\Admin\AppData\Local\Temp\CabFCB.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar10CC.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b