Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    126s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21/07/2024, 22:07

General

  • Target

    61969ab9ad9b84be135a6e93067462f9_JaffaCakes118.html

  • Size

    84KB

  • MD5

    61969ab9ad9b84be135a6e93067462f9

  • SHA1

    ff3b921d34f4b55be0f956a43c878a01cdd0c17c

  • SHA256

    c1e4b1502c79f12868c3a11397af3a7a425c3d84117ec24fdd2d171d0f2fc6d5

  • SHA512

    ae9a966e56e25aa5468c46a5d5f14261865d1abcb2f873e76db65186cb9d681b0c11548ca1cb04152d45300925f61a61806c4b1d25ce4546853a53e707ad58c3

  • SSDEEP

    1536:kFNEfkDsZd969E2ZHY1i/bETZDZeaH3Nm4NmdNm6Hv3KDc0vnTyMtqhbM6NT:4+d49/HY1i/YZDZeaXNm4NmdNm6P3KDE

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\61969ab9ad9b84be135a6e93067462f9_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2412 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    ed8b674168eb96a81b98bf6063a1f85a

    SHA1

    5a005aee09097102b827edc01371e2fb1fae9da3

    SHA256

    90df974866011dbd55eab387cac419a21b70d302a400ca3d59724851974e1add

    SHA512

    74ee6deb337f6f28332dcfa2b794f2c41a0cb63a6d193ad9e4b8072b9348762e8e8b7365fb3c9f12da0fff36354ee807350777d130f0c9f1f61df7c04d8a37df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    5fb3ea4aef363d059f65258b55e579ec

    SHA1

    89af70fd912b81fde45b4ebbae5e0176e6aa8d25

    SHA256

    b8ffd947fc836b11e01eeef69f643419af57d8e289ab4782508c9ef18062a88d

    SHA512

    897ee51946edee69b0a47e1c8d6cd16adc4aa16b39e372582e8ca77da31036250f229ce32db9e6959d230551f2291d153e42caccbbe3063dc04bf697f9a01116

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dbdca808934a344c0515d1a95fae5613

    SHA1

    620c1145827231cc080d65995aa6d92a71d71cdd

    SHA256

    282f070b1254b973ee967cea81919039a14d71996f26284ceb968a753e84b8c2

    SHA512

    0cf3878d44c404f36f93c517eb4eba206660efc9c218f487d7387f3c723c6680b129e8e1c9658d54c29ad2738ed0edaa3db708ef09d8eade97961b1049003a91

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2UK8J8K8\jquery.easing[1].htm

    Filesize

    114B

    MD5

    e89f75f918dbdcee28604d4e09dd71d7

    SHA1

    f9d9055e9878723a12063b47d4a1a5f58c3eb1e9

    SHA256

    6dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023

    SHA512

    8df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0

  • C:\Users\Admin\AppData\Local\Temp\Cab6088.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar9B2B.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b