Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    133s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    16/07/2024, 11:29 UTC

General

  • Target

    4e1d6e80a68604f7faea11bf70a09e8b_JaffaCakes118.html

  • Size

    26KB

  • MD5

    4e1d6e80a68604f7faea11bf70a09e8b

  • SHA1

    88b4d3e7dcf62dc97687372cfaf7e0d89a77d971

  • SHA256

    5ed849e2ef7770f889fa9b5d0dd9f0fe705e500833139b683d35f2642c82e73f

  • SHA512

    bf9153b536dfad8a36b47dbb9fdc22437e9cc8003528e471ab524c54f993cccfaded4685a65987a01bdbe40fd81d25eda09de0bae1cdc0c8e927c3d7e831487c

  • SSDEEP

    768:bjPQ3DFoULPgPWbPB79zO8AT+lk9F6XaAmaL1z3ngnfhQNUhvZ:8261TS3

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4e1d6e80a68604f7faea11bf70a09e8b_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2740
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2740 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2240

Network

  • flag-us
    DNS
    www.adw95.com
    IEXPLORE.EXE
    Remote address:
    8.8.8.8:53
    Request
    www.adw95.com
    IN A
    Response
  • flag-us
    DNS
    www.brcporb.ru
    IEXPLORE.EXE
    Remote address:
    8.8.8.8:53
    Request
    www.brcporb.ru
    IN A
    Response
  • flag-us
    DNS
    www.pingbnr.com
    IEXPLORE.EXE
    Remote address:
    8.8.8.8:53
    Request
    www.pingbnr.com
    IN A
    Response
    www.pingbnr.com
    IN A
    104.201.3.156
  • flag-us
    DNS
    www.adwste.mobi
    IEXPLORE.EXE
    Remote address:
    8.8.8.8:53
    Request
    www.adwste.mobi
    IN A
    Response
  • flag-us
    DNS
    www.ktrcom.com
    IEXPLORE.EXE
    Remote address:
    8.8.8.8:53
    Request
    www.ktrcom.com
    IN A
    Response
  • flag-us
    DNS
    www.kontion.com
    IEXPLORE.EXE
    Remote address:
    8.8.8.8:53
    Request
    www.kontion.com
    IN A
    Response
    www.kontion.com
    IN A
    168.76.253.235
  • flag-hk
    GET
    http://www.kontion.com/include/images/icp.gif
    IEXPLORE.EXE
    Remote address:
    168.76.253.235:80
    Request
    GET /include/images/icp.gif HTTP/1.1
    Accept: image/png, image/svg+xml, image/*;q=0.8, */*;q=0.5
    Accept-Language: en-US
    User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
    Accept-Encoding: gzip, deflate
    Host: www.kontion.com
    Connection: Keep-Alive
    Response
    HTTP/1.1 404 Not Found
    Content-Type: text/html
    Server: Microsoft-IIS/8.5
    Date: Tue, 16 Jul 2024 11:29:20 GMT
    Content-Length: 596
  • flag-us
    GET
    http://www.pingbnr.com/b.js
    IEXPLORE.EXE
    Remote address:
    104.201.3.156:80
    Request
    GET /b.js HTTP/1.1
    Accept: application/javascript, */*;q=0.8
    Accept-Language: en-US
    User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
    Accept-Encoding: gzip, deflate
    Host: www.pingbnr.com
    Connection: Keep-Alive
    Response
    HTTP/1.1 403 Forbidden
    Server: nginx
    Date: Tue, 16 Jul 2024 11:29:25 GMT
    Content-Type: text/html
    Content-Length: 146
    Connection: keep-alive
  • 168.76.253.235:80
    www.kontion.com
    IEXPLORE.EXE
    144 B
    92 B
    3
    2
  • 168.76.253.235:80
    http://www.kontion.com/include/images/icp.gif
    http
    IEXPLORE.EXE
    515 B
    864 B
    5
    3

    HTTP Request

    GET http://www.kontion.com/include/images/icp.gif

    HTTP Response

    404
  • 104.201.3.156:80
    www.pingbnr.com
    IEXPLORE.EXE
    236 B
    132 B
    5
    3
  • 104.201.3.156:80
    http://www.pingbnr.com/b.js
    http
    IEXPLORE.EXE
    624 B
    840 B
    8
    6

    HTTP Request

    GET http://www.pingbnr.com/b.js

    HTTP Response

    403
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls
    iexplore.exe
    747 B
    7.7kB
    9
    12
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls
    iexplore.exe
    747 B
    7.7kB
    9
    12
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls
    iexplore.exe
    831 B
    7.8kB
    10
    13
  • 8.8.8.8:53
    www.adw95.com
    dns
    IEXPLORE.EXE
    59 B
    132 B
    1
    1

    DNS Request

    www.adw95.com

  • 8.8.8.8:53
    www.brcporb.ru
    dns
    IEXPLORE.EXE
    60 B
    121 B
    1
    1

    DNS Request

    www.brcporb.ru

  • 8.8.8.8:53
    www.pingbnr.com
    dns
    IEXPLORE.EXE
    61 B
    77 B
    1
    1

    DNS Request

    www.pingbnr.com

    DNS Response

    104.201.3.156

  • 8.8.8.8:53
    www.adwste.mobi
    dns
    IEXPLORE.EXE
    61 B
    144 B
    1
    1

    DNS Request

    www.adwste.mobi

  • 8.8.8.8:53
    www.ktrcom.com
    dns
    IEXPLORE.EXE
    60 B
    133 B
    1
    1

    DNS Request

    www.ktrcom.com

  • 8.8.8.8:53
    www.kontion.com
    dns
    IEXPLORE.EXE
    61 B
    77 B
    1
    1

    DNS Request

    www.kontion.com

    DNS Response

    168.76.253.235

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3960939b20c840b7a5169d995a520e54

    SHA1

    8eaba4ede4367fc00ea6b570ea031d478078d3e3

    SHA256

    30be0cd762814be3cc69b746fcdd90c5ea772a799f5fbf02534c689508790536

    SHA512

    f3a055e8715350b060ea118a32649d9f0fc308d707f594163a8382804621bf405959d25d646b885c934899dbcf3a69137e8350e37d3a34209b1e6e68fd17d8c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1521c2ba5615b475cb86e8b624e0b9b3

    SHA1

    4a0e462f72d6240be600baf0bc381eeac0b7088a

    SHA256

    9334265b5f82c22db302c1f7054ce3a2b61df5a310136a72c4170590f7f60103

    SHA512

    1771a288e7030c66c6de6f58113940aca60db0eb4471fb9e2c100a873a9206cd85085fb4d011c0d839265459d71cbcfc00f6bd2192c449dab4f807ee323c35b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1710864acaeef027f661980db5b26f36

    SHA1

    ed7a0e3628cb31b65e7735d483ad1db72c825285

    SHA256

    1c5b446f4d754432250793528fb465f9926e4336fa57fcbaf65055414cda4ea1

    SHA512

    b1dcad9770b866c67cd34e82ac99886e25a7666ab1411826eae238f3e0be63150a1356d3d3ea7a79a5c5c035846877b31fc28d1efee918f406f5a7bb676d4481

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c47f4ca826422c00ac6536b7a4d2135c

    SHA1

    8c99fa2db443cf6068dea17ce2781dc9df0c5042

    SHA256

    6145fee3977130a2c8e72c4c7606e73eab55b3824ac05d39fa034f81cd054be9

    SHA512

    1ab5e11d431feebb46f8c0d3c9dcfe24f0ecad96ed17fe2b678533153180e6be794782c6285b23b147769c8537d11e102897a8f2160738214392eddd6c827776

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0e068c9a6cc6a1fbddeec5e9aa93d570

    SHA1

    4c6f6771482294a2f4ea1da3a413528f472e8b33

    SHA256

    63b9c13c541153b17480188d04de5d1009310d72cb75fb217bede3e513dd9925

    SHA512

    807d46211f3c1d668a1e8b8fa85e20aeb4a9731a36ce34190055502c7cd06aa61ab9a013fe39f8e44f4ef656591e56984ea88d486c918dae77790c600e1a7b3c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f8d2a6ec208b759863d942488744c759

    SHA1

    9cda6b698cc26f388d622af8b21ec553dd626f37

    SHA256

    61a14f341d49fe12ce3c7c6931fb6f4f0833303af71126895c7bc525369181bb

    SHA512

    ead0428722dc36dc95b4d411403c87225c4404abdd5c043fa3902fb1c4ccde999dd6fac255160fccbe720866eff8108738e6ec18891f401e43c658ef5553ffae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aa0b2abc640341e967f3c81da2f5ee42

    SHA1

    2688580e1fb6c7a524b67a95c617f1b58adffaa6

    SHA256

    14ce844f78e42718b6525f191f9c650e13c2485f0b3624ce5b08dd69f0422189

    SHA512

    ab71232e23345c18d09b17f9ac4c5ed04c4b0662db42f4511ece966a1fbdcc182fb4400326a62684aa7e8045a96038b848176e75b8110b5eda2e3a09240fbdb9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b4dc3179a58328dcdc89019f03ee623b

    SHA1

    87ff37f18f3902a29f0acbeec865868b729457f6

    SHA256

    c26ccbbb6f98bf0dd78ac55acab476430d943a71c11e015b72ee4774596b129c

    SHA512

    2c98d35966b72abd1687fd0926e9d2b586821d5827334d8a24042d004097f571d1cf5cef62d773c1e43250d5a6ef1c3f76809bf1cbc5bb45f68d7723238f660c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bbee04bead064dc89ab680f692f0b54c

    SHA1

    eaf92e24308d026493d3a29e67183105cef3342b

    SHA256

    d8a694e7d77f69c0359f0699f8eaa36dd6b77d392f71267a596d33d14b1c7c8a

    SHA512

    64189fda93a823e790c38603775e1fd45b1580e7948c1fcf891a482b20556149cf5c458d61db4bba49437bc684e9b9241d0ad23a84bdf4bd4164c8aeccf95547

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2cf9ed642ebe35e61950a17ec6f074a7

    SHA1

    c317900b90bb87ec573cd4b1ca9ef31b71e06c7c

    SHA256

    f134f9e61d1c1567e5b6c7be0e94405a94d355fda0058e36069738c479812a20

    SHA512

    3868cc44c97f5a41bb9d8a9868777536af47d557b6aee2906867701ac4670103fc5a5fd28c61dded339bbf334da2d59a0f59661cbdceca78ea48203d15f4e252

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9d4bdcb7bd8f4acabde0a6e92c9c35e8

    SHA1

    1dbcc6e3095ec35754ad2662abcd9db6156a246a

    SHA256

    60344748944638569ec462d94ec5c4cb9dcbd1279e2d24efac1be558cf20fb49

    SHA512

    ed8cb90851a8d2e864fd2cf7fe56e3394751477d0d958ef08adee1e4e7e17479a0c3feac79b5af15b0b8fc31623edbab1f2ca3f36250aec630d44593188fa17b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    703570418bfcbc58a47db8dda6f98df3

    SHA1

    c60e446de6ecabd5acd100a31478303d9a71694f

    SHA256

    84fb595ceeac80c7e9466f2d9c382354179e20198ec9bd51038acb20a6d809e3

    SHA512

    77c7f71736ee8bfadd671dbd205cbd60a687c3713ba8d197700b8583b0cc3a59b053728072e8fbe4a14477794f10ef7af4aaa52a014002aabc348076f707c402

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    090c7a41b9e254f3864d58fac6cf989d

    SHA1

    75e18515d7e160adf556360799b89359419ea17f

    SHA256

    0cb8d632ab1826082ee058968baafd99d853febe86de80e959008665eb3242c3

    SHA512

    81cf2b32eb45138456e572e7a5d4aa64375144613ca19ca1d4766db0591769fa5a12d5b6bf656c61e20ae2aead52f8e3c04bf46912933fd09fee61b46a501e20

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dd648ad273960cf919df7606b98c343b

    SHA1

    779e7a1c9568149f9059e9364a95f50b0631f223

    SHA256

    a9fdd005d8e97ab766137af32bb8035cfbd4fb7098a42626b866285fcf08498c

    SHA512

    2833f1bd296cdc88219d5a1e31448c94393058084ea718b6311788f40eb5b9dace09807514e7a67d29db138aca081c346c7cc13538b5135825d0c0a527a55293

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ff8cc16d470b1562dc88130fd8184124

    SHA1

    8d8ee4b76bb282c8b3b940b1f0e6769ae1998558

    SHA256

    3ffa661e2af2ee1246339449c85781c371f25d9e11119bb9ffd412a3329acf28

    SHA512

    6611a24626ec78ed3bdaf35349001e1240a8908500f85ca513b03d7a859dff5cb52e192f97e0bbbd6b9bd59102124f8d24bd01b42ba82588c7826ea0a58c5e4c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc987cf45ed56df222d25e46a683a752

    SHA1

    4b63b17007f637755f585025335f15f65ec5063b

    SHA256

    7c1ef7194bf7a5752671813d971ba2ffd99f792878b3ff8259d023fca747479e

    SHA512

    3c24b187f02aac1bd657a0e176e3ba07263b5258500da83bc90d8835a9488dc8e846e3dc6f6f02aeae0e7c989bd68f1c64e8b95742cf6ab81680e02c32f0f106

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3a96c73566d18b40431b6bc7aa5d248c

    SHA1

    5995ab812726331e8cf4c87d310bcb5656ee3d06

    SHA256

    c2eec146cbf996d09eea5ae25c8133a59cb1467077e3bd4b8949432db1eafc3e

    SHA512

    41cb31cf91ba5a920a174e0a7aa200d5633a7348361f285e0e70a42760f3aab22099aacb1a513118c0aac79f21eb5e9ee95eca95d7db9797b07b46b2d18f3f6a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f0ac0bb5667280255019d1718c08e9f2

    SHA1

    41af0db28d9f8606d76a3777d7334305b92eb6a2

    SHA256

    fd46560e725888ac0f17e6cd54741cb328855251ac6a1d7e7a8282c4155acf21

    SHA512

    e753c9f4d1d3cbea3fe80ba1951ac540d5147beac8f7f57719468cef887a6bc2c05cd094e2c5e036d681e330bc5dfbd1fdff730ed7a4a84958ba00da0cd1d2de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a7c2123ffdb4700b4dd0e15d74f69a44

    SHA1

    8fb160593f31d30622ad0d87127dc5e6d101109e

    SHA256

    401abf9f6ccfb18bbfa78916f640b4366c0a7741f1e3d43ddfff14d56d92caf8

    SHA512

    d43e6ed8b7c8864a695c4fe99996783619a4865a4f0267077a8b358054dbbeb4870e7b0b3d4521311f324d5803f68c46a688c4a46af25a3616015823ac8c60c9

  • C:\Users\Admin\AppData\Local\Temp\Cab4B07.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar4B87.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.