Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    11/08/2024, 19:36

General

  • Target

    8bb0b7021fa6a688e54bd826d9a6f725_JaffaCakes118.html

  • Size

    23KB

  • MD5

    8bb0b7021fa6a688e54bd826d9a6f725

  • SHA1

    b1c7f61b8334ef35b881c7266ac6769d5d70e3fc

  • SHA256

    4940b6891896b8ff01dd28b85619573fc0637635410fd7418dd9302702074532

  • SHA512

    1fb0e032c40f1cc05acc739509464c65f00b7dda42ca182fb7c819aae6c6945df02587d4d31d57a0988ead998fcce1075719636aad4d444b576e9db1d8e5b5c1

  • SSDEEP

    192:uWr4b5nR2rMnQjxn5Q/lnQieINnrnQOkEntXDnQTbnxnQOCnQtKwMBoqnYnQ7tnT:5Q/TBJ

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8bb0b7021fa6a688e54bd826d9a6f725_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2724
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2724 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c7372ed9de46fa1465e681e691d727be

    SHA1

    20d821bcc74bba710228c4ea29b1ffcdd70a32a5

    SHA256

    0ae5aed4dd30f4aa746faa48a4a827a2577d93464ec38db72c73a05cfbc68ce8

    SHA512

    529ff90a68ff49b756b0dbeb70dd4b5cf71c970a5d6e752b132e3a2ed086a0f8c7c2cc0b61eb8090ce90c514690ead48cc641d62e0367dffc1f6554b34095050

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0c66d15067f7c82a569a6d445280485a

    SHA1

    b83aa25a26f3f13ee0a9e58fb377ff104bbbe978

    SHA256

    e2ef31a9e9e32cdf0b50ce6ae14c3cf7adb05164604ae820fac7571b4de4ba93

    SHA512

    f700a3ffe1897063c286eaae6ff0bb301617f5adef0fc377f5a8d6b9ae5e447931f15e12fb72f6701e673e47fcd7fdd60008d3a8254470edf93d26c595740671

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a9d6c38aef55ee5dd408530862aa3cf2

    SHA1

    2fdb1676e76142f78b9288b0fd0ba76c03a9cbc8

    SHA256

    742ca4ca22ae570529141be824930fc2a771c7fedc7338f29b16aefbf991b81a

    SHA512

    f90f2674e24f322fc6215196fccf2a1162c82cc3da2af0c9893900da8e84d3d071218063ae02a4dd3dd21e21560c4f473e61ee2b4cb6c362d734012ea3c2088f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    76977c5482c5427cdfafc247eabc8e06

    SHA1

    2984e4d32a08cd7f9a9062c9146c8337bd6878c6

    SHA256

    4485dee243b3be1215147a009903e5777391a5ceb92864cdd4ccc6980f6a1037

    SHA512

    2182890948d785613f5d0df424bb6f89f3785f708df47e048c070617480160cd6acd4e26ca1210a4bc1b45fcda959c0f4ff2f37c9a67c895e6397b246c88616e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    faaf9013f895c384620b3d32e24a779e

    SHA1

    d987eae126367718427b9da55859e11130a272e9

    SHA256

    da43bf8909462d77d8f791827765d2b5ab297ba55b3a3bf7ddb63438a240df38

    SHA512

    7ad5aa3995453b57e52e204538616f9144be4177c3bf568e4b790d00bdaba37a0c50cef05ca6284e02d6408e9c804a9c6720e75dcea03dc48edfe3a1448e45cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e10dea0cc7a33f83f9a47b17ce150327

    SHA1

    9bc818db9229226027bc2fc22816e7630d8cd420

    SHA256

    be9b58ecfd1c6e8d32038812d66afca52e743f01ca893cbc65792e1b972dc9d5

    SHA512

    d5802a961883623fe1c29a0e309393bb9c152fba13c071c7dcee7c5d8a2bc7bfdf7430c4ec5a6448aedf3f58fd9288ff739b5c46624b7ad7f44670b3f12154c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a8b8dc793ff8ff8cb152b50fdf5a9b7a

    SHA1

    978732d317c2a69ba0def7433e63368731f761a7

    SHA256

    7ce84443e06165bc4626d33e1fa71777ff832cb1cb6e0b6608c88525c8fd0f35

    SHA512

    a8d7e1e08226afd1f6d8a7ab0f13ba922681163ca35eeb6b84a2b9c9cccec7792f9086f3845127643ee5fec1b71e56c7d25210f7cc605ce19fb7e4ff3de2fdab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7efbcd5e04b65179866435afa9ddf79a

    SHA1

    52ff3b61ff360ac9e9e52bf920e275c146698202

    SHA256

    bc6bb4b3d29e9f924e66bd39ebef799cd48376ef84a42b5203a5eefb807a12a9

    SHA512

    b2c097cfde8dde6db69954de1c98f9ded67eebc2dd7c8cb37119923b057952e63af7b6c5f3b0790b50a20720f1f71b7df5efaf16c147f9c593e501273d5baf90

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ef972f6b5587384d639ad1e3dfc926e6

    SHA1

    dc36ec5acfe82bb0bec799d442f8f52c18041233

    SHA256

    ff7581a6bb41420ff5591ef135192b3f0215ca84f360cfa15cbbf25e97b41598

    SHA512

    dbd8670c7cf810a0c437e843f39ebb595673179de7f58894218ddde48a3ac312ff8c541bfa13afe79497b7fc9d1967512adf0ff0b6b6da1f61ef20a81be6b44f

  • C:\Users\Admin\AppData\Local\Temp\Cab6C4C.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar6CBC.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b