Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    10/08/2024, 22:14

General

  • Target

    87e175200196221b65e309b8f1a64f9c_JaffaCakes118.html

  • Size

    88KB

  • MD5

    87e175200196221b65e309b8f1a64f9c

  • SHA1

    151b205bd50afad42c10782b24754536af2c1ce6

  • SHA256

    c24979066b0aad811e161642a15db17b75bb309acc56120d951c290d9b354cae

  • SHA512

    cf52d6e5115402dca86a30b10ccc672a63ee1bd3823eba1be4cea218c0033533b1ea7f938644f13e6e2f8af6b2c998abb6c89ff44e18296f49f87eaf4081c71a

  • SSDEEP

    1536:jC5g8ClL+YF6M5dGM1UoZthMxro1BVMd2oJ9EiMwoIMyoQMx+o1Y9Mxgo1Y3MxvN:jDlL+XMjzFtCUBVvY+FYMwdSS+AaDtsa

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\87e175200196221b65e309b8f1a64f9c_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2328 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    079816faeb18413480599af265cd8d1c

    SHA1

    fc90a1a22f5188a5cb4a19de7fde5f27b10213c9

    SHA256

    be036bc6b5482eb81c60d8300d1412501b9fe973c8575ac9e139aa8b18c32f2f

    SHA512

    78a943521790f76b92fe1e24c9e8c308fe3593ef4001deedb971345792b2b07cf7f3983bea384d19d94c5888e04896760137a788a53d41cddd99e991b11c2b89

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    289c472497d9e42cb274818ebbd24917

    SHA1

    7f6a0ecdec28726111b11d00af884a7fcc35444d

    SHA256

    2aab14089ecc17e6e95e264ed73324a49a2ab92ac8191ed4ebc49ba73c7c74ab

    SHA512

    49c3f565f48f3b83b87af900ad8f816857ee6bb337ac13d0b068a5a6e47e444dde3c074516d57d5b10cad4eca9e0858b48707608b2353067860611a481630661

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eb9ab654431cdc2a43fe5ddb4ed3e038

    SHA1

    95e224d9a13a1fd65780f7d1c52e43830130d314

    SHA256

    f5f29e0c43ef3e381da6d9f87f0914cd6d7bc2fa2963340c889aef9bf3bccdc4

    SHA512

    bf3ecce604c482ab4775f8c448a6236ef77b4eb65f62ce0ac6cb12a85e95f2f31e32fbec45e3a2f8ec4318378dc41d34e5c502b8766a927a9fc397d8ef638561

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cef8f37ea041226d727764c73ae6b1a8

    SHA1

    fa66c7cd06d7cb49358140d589e7b82f6caecded

    SHA256

    5a7cb01e7ff6cd5031c05f4fc46e9f7d433c26a636741488e3a2265d6277f258

    SHA512

    a83a9e23bc0b084c4be0164711d6473d0cb9b70159248e1bd3fc93b15964e2ae2b583e8be6fea46c579b289431a959354a352e9c27e9e3d15197527936c9f443

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a090e0e9bb9fd964f4658e318601b68a

    SHA1

    0b0f6ab927c419089ca0c8f7c3d7bbe0370fb084

    SHA256

    78586bd8344c4ed511ac1747bffafdc63851ecd4cade5b3d7fc95b58d111e7d3

    SHA512

    8677e9b556bb7020c2196b1cf5cf1217af7ec9f283a40acd33edc21a7e205e041c4259a32e8c5c8cbef5a2b898329facf9df3f447e53e47e18eb36314acb0ffd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    581f071a039f56fe890be7c048e12e3a

    SHA1

    14a8bb0f9416d19060f0aadd381773f192e3b965

    SHA256

    2cb16e48c5ac98dc339dbf5c976df41d1f475e993cb1f3eec8fa5b93811aba70

    SHA512

    e89a0402ef6f7a23e53ac23c8c60cfb3ba1c08efda2324dca1e8fd490a3f5deaef4ca9bc1dd6fd629aeb6c6c6f26ba31efa56ceb99f3d5a74cda7e2b2b977300

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    943554356446955be9717089116b2d33

    SHA1

    6f1bcdbd8485eb4b454a5dd063dcc9596c6b8f2d

    SHA256

    94ff01d65b83147d4dcae2f0a3f38659538a122a6e12edf2bb84f04f9b366f00

    SHA512

    49a4bd4ff646f17e32e2aee31f1209dd845603d7fe9a59a7c6187e28614a322d64100da6799e6b06debc24c3b309504ea2a9657a8f9dcd91e763e34f992e3414

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a4133a398508c3452f3a15a97277ef54

    SHA1

    31f894bd0157f952e3519e76d7a2fa7ac7dc6c4a

    SHA256

    fbe04b2cf77dbe6d3a246c8c59e6114ccf1eb3d23c1ad46f9b35af1e96a90b4d

    SHA512

    373d45db3f62d73c62013e52292edf450298497dd12c7a7c02500af261fb730c284a4920afa648c9c7703ed878f24e108a3fb075061677e807df6aab291d358a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    30ed6d279e218b77e8334bf295a6b61b

    SHA1

    7b6b23ac83047099c8a5812093b0821d1c5c04bc

    SHA256

    b8e018a9afb614bcaa33cc78361dcebdbfa2686634d708650be6b1ffed2546cb

    SHA512

    06ab5b43a1cb3bf6f59091183c65577a71d11202d92d0728771e627ad29649590b9052c4bfcdc4bdb0a88ebfde1421024407c1ea0b3e9ebd13409dd8dfd3ba4e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bffa27dd00bc176f5504e5f5957f6f43

    SHA1

    ecd76c5ef7885ab142b8245d845b6d9a8a3877a1

    SHA256

    6cea44f02c6dd2a527ea9cd0b815e0844306306f39d5dacf88c9d49aad2d6c0a

    SHA512

    eabf21f3277ee91cafed86168d440b0b368cb098a66456c6bae7870ea2cddfef19616dd5c5e0d71af813ebbfdef5a37f7e1040057e100923c189239f47d44622

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ecfc9f4b34d0a667f8b377f40b9a3ff0

    SHA1

    7c18fe16cc0ea983b06b712f99ad8a725b0e9bf2

    SHA256

    c116ed6acbda74af8dfa57d10264d40b7436d1a018c2d984060bb94f02bd03f6

    SHA512

    0cda7827da72dbbcefd6eee4e5e37c8004593d82f560c0b0b10884cbdd3a4f00c3bffb5395e1b101245e3ce0d846a467ee65a4b6f9a8d11a0efcdefb1dc8e817

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5043e83d2f67b37e9e4f69d5102c78df

    SHA1

    5e1a1f8548e7102a1bffc995b2131f8f589badc4

    SHA256

    edd602263e2ad82858f7d3d50bc4d38f52eef1d66fa23cd79dc1ca5111ea7f5d

    SHA512

    93791a03d20857e0448519dfae14cef7f3c4a686459b34b047a30ef712f2c6d50bab779d0ad021b13f8a6ef47c3d351095c48b1747b4d73b76705052691ad6b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    093a50ef970328009f3b7e5d090e16c5

    SHA1

    cbdae0e58d2c82c5136cda6f8e0eb9f7b3ef8b8d

    SHA256

    60d48991a115897614d06c53896ba3aefb40f463ebdfe7e19285e8a46f9b297e

    SHA512

    5941269b66048f42ab6c6c8c5a22678884f11135dd1bf7320007c5b0a4bc94fcce4f78eb0817711bc7748cafc5ca435fd69f14c76bd3c65037fe614941182d30

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    87f48b5182a65550e6ebc03e94fbdb5e

    SHA1

    9f53bcbd323879f1123ff9550fbcdce02768ee3e

    SHA256

    8ff4265ab491572439d0bddf4bae7f6cdde17d6a2b1826bdfc813573111f2cc9

    SHA512

    a9ed6a316306866c4f1d253af869e568f418c1df52b964a553be9b14948554f8d71dcdf28ce88016e98c90c62295e1a125c41a1ef5314029ee22ca69064757d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cbe8c0ca800f24b911557d641ee4834a

    SHA1

    bff848d3d03266ca5965cc2444f85ab00dc88f4c

    SHA256

    34d2922177b69d0795ae493d63d78a0be6a54ae4ceb5d817c044a67c1137059d

    SHA512

    5e5838c915b2caae01140d290d9240b3f1ecc7befab33b1ae0aab3f6a001754f37a30b223eb442a39522cf7d7fe60eda2301dd7e816be350419dc144c2c60947

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9504f9006a992baa24bc52f9ed00d0e2

    SHA1

    3a0f637979d827412f5b106ac8a4bcaa9ea830af

    SHA256

    927e7706a5e2bcaefc2c913f1d4bcb32d5a41868991e9999a09d37b16132dd5c

    SHA512

    0c8963d68e7e306d8763309f15ca82c2691da745f8d6b4f475718c65d73c4daafeaa51ea513f3e4eff48041ed6e9d13c9cda6ae5aec950ffc139ef292937c4e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2ea35cd14a7391df0801656c1679036d

    SHA1

    5b477a26a2306dc38570ef3550b6e31064ec69eb

    SHA256

    661869635bc238ddd3549ecad4fd9cff65265db3bc78f13e1cfb0b47b6b3a137

    SHA512

    5c3e0b7462b1dfd77abe381062e1f5ad999bdc4aaf9a1f81e682df923206a509079de65deab6d5008da83951792c850cae083e39d6860400d5d4905c5287c502

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1a63d6c78da0f8ad2ce5ffaa12fa046d

    SHA1

    8f6d3708d085fa8b88b02293a66dae4302a72784

    SHA256

    08ba6bd4b2f8ed9cf50968f51d7ac17b1c78019e4260290300d9e3421c215ad5

    SHA512

    97be55f5530084b7d100a9cbb29462fc093188eae326fc3d5f8bd98d10ba9057de3668d4028dbd55a05c0023e4094ec09dc01c6215a01373fc6edfa54bd1a9f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6a083b0bb689521cd2a6b066d1030bb8

    SHA1

    8226eebd85250369bdb49a70a26175539f381992

    SHA256

    2ae550346d582efe69940353620622468f1ec0f73398360a5328faa089249e92

    SHA512

    5e1bf5d0dc5406cc312decea63166f074b84ee4e8ad00a73e462786a166157f92cf65ff939c38aadd030f1f904c4b44a4fdc339e923cb9857b0f1fd6ae86e621

  • C:\Users\Admin\AppData\Local\Temp\Cab40A9.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar40AC.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b