Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    16/06/2024, 06:11

General

  • Target

    b211ab1252779c1110bb8c2807d17922_JaffaCakes118.html

  • Size

    87KB

  • MD5

    b211ab1252779c1110bb8c2807d17922

  • SHA1

    7ce058afed11edc673ccf22a4866b72166f136a0

  • SHA256

    cb73061f5b36ed9125d17fdcba35e4a89057c26789d5c421961215f95f899107

  • SHA512

    4167efe148c9d23794fce3d018c7c67c0ba069b5637bbf14a8390a5ea34dedab587f570e052e362288409d8cc201c11a79b5fed28f3626c09e76fccdc296c263

  • SSDEEP

    1536:yvGIJV6gtrEtaxtFZo793CauKThjWzymrAamvLf7WCYOLM2rqzf5+lwyb+3vXTM3:IV6gtrEaxBauuhjWWmr3mvLf7WC9LM2r

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b211ab1252779c1110bb8c2807d17922_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2972
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2972 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    8009602146b51345d7ed3acf7cee7031

    SHA1

    a910c4c7ec882da1d78fff96a53be5d9b0dd3fe4

    SHA256

    5b7878267d938d4e0e97833d5b7364891027c4c98f12b66165ee17156d717747

    SHA512

    ffe72a8b56a1ae4345f6d662072961974bdbdd33d2e00f9e585d0fcf96c4e718819e4776998d4f91183f2b3662d3f1d89bd1d24799a4c7c760613694bb115985

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA

    Filesize

    392B

    MD5

    0061f0cb78195beed9da28bfdab24638

    SHA1

    c71a9e7131881f94437f9af037ff6e0983d06d15

    SHA256

    fd112169aef1636debc644461666fce4969bbf4125ab011595a763a28190b519

    SHA512

    5cdcedd8bed9b1cb9fb95f033ccfc7b57ae08e8640f6b5f0c0fa1543a4104a36e1c4471154c8cb4c676ac820cbd119d75cd1e178234180bdac263d6293e7cc1d