Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    10/08/2024, 12:36

General

  • Target

    8612f690ae5c7dd69a67dac11d9f4222_JaffaCakes118.html

  • Size

    44KB

  • MD5

    8612f690ae5c7dd69a67dac11d9f4222

  • SHA1

    ca61fa3d38ab394aaa7e83206755cd1a6479bde3

  • SHA256

    effaf867f4051a9db865f297b8abecd1531070201528c58201dfee9e7f448a8f

  • SHA512

    6d132dfb63a342931f0cdafc9c4c8ffb214cbf82c4cff02705bb8dfdba314edaa57ed9e57d39afc0b2146b4769914fe28df9f2131b9804dd2f12eb46bbfcadb4

  • SSDEEP

    768:wNklTNaDRljWKGkcKw6AkR+CKgpu/s0M9dKmK3TIYQqdUIwhG22R1QkBYIssR/:wWTNaDRljEkcKw6AWKgpu/s0M9dKmK3l

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8612f690ae5c7dd69a67dac11d9f4222_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1476
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1476 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    820b3007f38bb3cba8abcd9b4784325c

    SHA1

    688ad4ca059693e1adec5b3aeb0a79bfa9669e24

    SHA256

    0a85cab2c2af949c3b6571c02cb1d2736a28f6595231102203c9a33cb82c5bf7

    SHA512

    a84330c5281bd926a47bd4e0f3ec56f4b03f0ce1df6c2f83a6b7bba52f30f940a27c7b20a6b77152a3c07b62665bff09acde4592c60c25e8b5fdc4e80e33aefe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f4a829a9e2d503f37e57d82f388f544b

    SHA1

    e6229df751fca5dbc8a0f863115346e71cd95374

    SHA256

    e43264fa1ff21d72bbe41b382b5cf5ee6ce930dcf38871976044611896ee48ad

    SHA512

    ad80d30ec07bb279437d722cbae9840427622fca4602c565a77ba349d2766792aa0675784bf62b85c66d3c4354a1987b80cba2c0573b5988d5f40571c727d0be

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b7a53d6eb7ce05d2bd36e54311c21e2e

    SHA1

    fdd039b1e6322e21a922d88d0c56ae4e7923b093

    SHA256

    31fd768db76a968082db9761919a0ae28a5bf51b230824227445954fbe953faf

    SHA512

    1cb0a9a427d0cc4fb8912b59937168f149f6ffb461dd177d2805fba9389a8c0931cd156a754bd4db2db82d55b881d43ea82bc75b39a81ebca7ecabc968b659e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6e5b7a4dcd7bb0614b8036e2660cc2e6

    SHA1

    bd7d2a476ac34f3678748eaf802010d33c5c8d7e

    SHA256

    36a655e5a3ff2d633fbb4f7b6b3b18f4fbff28dae5de1db3f72c22a17b676a3a

    SHA512

    b1079798ff225d3c6391a47620aa7b55d63374f18e88926709ef82f061f05aa47d3b8c981df866e214597aef8ee9ff46c20eea27ae810ccf6ab4836c222d51d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a5f844f1d6f9abce640e5a8235dbc2b6

    SHA1

    4fee00e811e1d3ce41a1a73b05e4538f1446474f

    SHA256

    3dc6c2f88f1da0f4683bcf04674e29cfe45b3598f6a7d850b81b6c41013830f7

    SHA512

    bd495d2bd437005a2c045864c5995d4a4bb82ce1b39da8f0176a0bc60d70de62b1a1e92288ad15288d378604f597d7263766e09b8ec4a5d53598ca012c309b16

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e3d35e386fe8bce56730ebfcff9ace42

    SHA1

    1c8c30e46d9f2ff04138d46a3e24ee5dab67cd63

    SHA256

    61d768380d7a4c292bdf25a0c05a9587b52d5d02b36bc910dce6fc839b4b4c53

    SHA512

    aa143169841568a994c69f8f00cf50250469514b31050651b0e44ea862f6a0d54164628e6ef4587cad3b38b85c715c3648a86e4a5c3e6dd06b957f59ebd4b1c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    994973603e95af182fb7722ae9319b70

    SHA1

    4adf9d8a0083e5f39c8a35f0e9325a1a61b1f9c0

    SHA256

    62634c31384f5cc09540668ce339579a6b4b24f4ccbf19f21c6da3bde578b5dc

    SHA512

    1e6071df1fbd97492bdb3777042e66becdaaef2c02c8649e42cfcc17098a79ce8148bdfeb4639bb12bdf64270ecb498350067ffdb3daaa7f63c3f92971cd65a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fff644a9e57bc13bdb479ebf0cf46626

    SHA1

    f03492722c1d116d269792a76140b6a51e97d91e

    SHA256

    483827d4d79bcc7440c9eef37f9549eebaf312a904038fbd310cc64da6d2bc70

    SHA512

    da3da363602db03e871e2a523135f53c7e1fd70fa9f96149bbd467e84fb46cb6c00c0993ef7bf75aaff46b90fbf79cd6e01694a675ac2bd7236ae648dcdda9d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7b8852c2f7e2df63962d5460f3af21b3

    SHA1

    e6afba787fe2b974fdb25f69f912847f9048a25f

    SHA256

    0deeb1af9c9c27685bcae32fb63096e5c68d4f6dc1b9cb31e79f6f8467e1a756

    SHA512

    a6078336ebb56575832229a6e44f6e7bc14c57bbefaef95c04aa18f050bad58fb6939f411d6384dfbba5948c402fa884146c5501a1fb78786d4fdc121d75df12

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    18c518e2c9ad41346f3d014ec96b1739

    SHA1

    02de54fa62de67d88331beb64fa5dc2a05372c14

    SHA256

    607d26a6fe48f2d9a9eb28df7e0dedbfddabefcaccac7f2031f0f728ac67e08f

    SHA512

    7913fad4404d086f64fd44c926501ac520e587d349233ee43523f6f88bb739c3b78bfe521065362e2d4ca62c9be7bf8b796c350561444794940cbf4f59de1d6e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q98GZSGI\f[1].txt

    Filesize

    185KB

    MD5

    51b9be2d81139289ef75ad0510f692e0

    SHA1

    338e153d9c410dd4c9412edccb0b80f2ba6343d4

    SHA256

    7d131d29212e5b4734ad81aab1c3742970087792ef0fcdf99052fe31ddc3d2ce

    SHA512

    c7176ad34fc32ff78b47f5b706e048ce9eadfab92d089f74b11d2bb71560934f6d947d8647bbc49636fa5c57da4e3234e461d9b10b841ea26e57796c6835c6f3

  • C:\Users\Admin\AppData\Local\Temp\Cab8355.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar8356.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b