Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    13/06/2024, 02:34

General

  • Target

    a38b8743c758be39c501633160b2c9c0_JaffaCakes118.html

  • Size

    4KB

  • MD5

    a38b8743c758be39c501633160b2c9c0

  • SHA1

    5b567bf6225f8b674b5bd4e248792b3524a03543

  • SHA256

    fdef280ae8611a7212acdb56d81a16127e0953952bdbde52e481a8db19c39ecd

  • SHA512

    969108c6b7fd685b276cf746f9a7125ec2a8bb825ba0130a61ec6d6c5c6f04540e1cd8f546215c37c9d4f16ed7d8ec6c601c6214ec23d4047ede7f09f68d82db

  • SSDEEP

    96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o38e1vd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDA

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a38b8743c758be39c501633160b2c9c0_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2188 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8f345173796db5cd41dff882bfcf1fa1

    SHA1

    c600ef24ef4e50c63d93f3c9086373edad914b3b

    SHA256

    eb60849332df88853a9a84c812f30692f17636b3753e919913b06da8c67ac3af

    SHA512

    8cbc9e751c0b6fa61b9451ad36b6c997169754aaf2703bca37d3dfafeb20ada8ebfa01f7a3b7ff7742c872c9a65728f480c96b1e823104a2619e7f607ca443c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b6566df02a714671f72f792b54a0b918

    SHA1

    128174f648cd333be8821a9cb1e79e6c28e5c2fa

    SHA256

    a1050e4890805d3615fd8939b0eeaf6a147a6ce500523025d7f010261519d53f

    SHA512

    4106f885d0f45921c86ab436f65de3e6b9e0f123f641665d0936c3191d13e2a5eaafda472918fd58e8eb5be02d0aa8ea1e63086350e4448333502dffb89c69d1

  • C:\Users\Admin\AppData\Local\Temp\Cab5F91.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar5FB3.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b