Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    25/06/2024, 09:17

General

  • Target

    0d8408f26f8be2876c298d717d9951ad_JaffaCakes118.html

  • Size

    2KB

  • MD5

    0d8408f26f8be2876c298d717d9951ad

  • SHA1

    8d30de044b1bcb970d4a97b9453bdafc9000ff41

  • SHA256

    3a861534dfab6e8f457b7a18cf95f68d8d9af7cc901c818d96aecf22e28ffefb

  • SHA512

    a3954c970702ea96a184f4514bb0dba392490478e5ce225fe8ab627f730da8dbf8845e7fef4c6664c718d56abd30b97673862b3ecbe7b6b874fdb0be56a5163b

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0d8408f26f8be2876c298d717d9951ad_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2932 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    87692076def5db852d1ec6c3d729f4ba

    SHA1

    cc60f17b718d30ff0b628b92e32167b10bba8762

    SHA256

    726c4e2a6ee0293ccbd242e6cfdd4dd151f0e829334c924f21e452e395399af5

    SHA512

    4d3e7fbeb948b08464b00f3cab20eb9ef259f4edfe3a68762ffa1cfebf4fc97f0d9da925a122ea0a397a8627a82654ac3bf2700fec7ce13dcc2801d3724f2803

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c76e80b56797dfd09570c72ad4aa66c7

    SHA1

    6ee2fe273784b2b7d253f2170406e56a4d6e290d

    SHA256

    d8770b7deb3bfb7bb096a75600b8943ef199255fdcdb7d2acc73795a22db308a

    SHA512

    504469da454d17ad88353870ab30a76615b06a59636147820dad624ec38a89db2e4954a787d2a4e8e86389b5d80598d1addf391efb2562b62a20a20875c8e1fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    02f6976f7e8d5140e477400ac4f6871f

    SHA1

    970f1be840b7e67fdbe43bd5cf9a59bc7a270ef0

    SHA256

    f4025c797f2b71085a336b75ccee40a4f11b6b0ca3ca230144fe175df386b188

    SHA512

    eca33027e85190e2edd52d390fd189ba20fa603733e5465a3c78c786bf968255647e36779f38149dce06d9cc62a99c8137296f4ee8bd281b6e8082c44a259976

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9980edd0a17757c59bca15f2fd9da907

    SHA1

    4b3376e10816b66f30ee42470bb9220c6ede66fd

    SHA256

    fddb7221c7325c2c8361a20a43dab4d6aa630624ea2b7b3e4c9d27b952db383a

    SHA512

    427bf3df6f412e9f277f6995ecc16009bdd115a1f833928af60f1ade1598cf31d6c53f720321b96d1cfeb34f5035cbcbf9f5ea02cf39a28ffda31a1ca8c3d222

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dd88028c22711c8a4db30daa0e6e8169

    SHA1

    e0bf62b3ba66b7de4f74a20993a767510e8fdd0c

    SHA256

    2d632d7bde8243727daf99788bbb687f588211e96910224e6d30812a2293435d

    SHA512

    26e5c90cb36de95c166cf31d1f934450b87f47ed5c9619ed1451131b11e3564df35db187cd7a172854e4ff63006af0f27fb41b691e392381646feecb52dee927

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    186780133796cdff79babfdadf3146f4

    SHA1

    b9042e33f8f746de580e11ed8b8b9ad0081939ce

    SHA256

    e86385c0fa8b13d81ee8692db452e797dc7f06fb1efc55b0d8dc62f3385ba5a0

    SHA512

    d878d519ca6c142a36ee1ff394787b120dfe894c202095f1e4764c4212872442c5eeb9cfda31883d6e859ee284ca5c735e130265f307c265c3566c72cf1fa3b2

  • C:\Users\Admin\AppData\Local\Temp\Cab7456.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar74F7.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b