Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 09:20

General

  • Target

    aa71d6a5359ddc28806783c965f3eaa6_JaffaCakes118.html

  • Size

    135KB

  • MD5

    aa71d6a5359ddc28806783c965f3eaa6

  • SHA1

    f5977b5226a3d88c11997f4e0943279566779000

  • SHA256

    f05722820e9105b4cb22d42554a75c897b9d4b36c793ee1db3b21adae1a2a38c

  • SHA512

    868975162238ceef6a3640889a65ff3a0ca45640cefd7451755cb298c773708be9ba3324360d7cdb6d4639c8aa6bbfc1e72e6c1dfc7fb6fcc8b7ae1a628d86ea

  • SSDEEP

    3072:9cL+Oh/SSodbnckaYJNQMcZfgf5Cqh03+RqFHjHCHQNTkE6GH1rNDESilW3Vi2FF:9cJh/SSokZBJilsF

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\aa71d6a5359ddc28806783c965f3eaa6_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:408
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:408 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c01887ea14cb88c9a85119490735d2a7

    SHA1

    8af954221f111dbd5e281974d463846ef2683197

    SHA256

    57dddca4a1a7f295a5bc4fea7ee4062eb00e81ea412c1d9092ef119f25909698

    SHA512

    059984b8b499c8d586129c501caf2d8cfdbdc643586a2f51e9085eee0f35213f1c83cca728050a86a4f6cc23cf28b1ad36b8e549c44b689e698080aa9942af86

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    18db6b8965fecb58273951add1bcca70

    SHA1

    7b51b883b70ab255dbb2bf54f587ff96f3ea9fb3

    SHA256

    67b87162cb94a3aa09673bc40971054d109c8f647b8887d11fb00f1c7f04e52c

    SHA512

    46dcd74e47587daa503e8a7bfc73e4d27800c061f7736d6fb2bc3d4aef38cbb2d6e1a4121fb0c79b8d0d1ba8f8760183b9af4e0049f853e2c2481b755fd0a903

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc3dfad98ca96e515d21bd3bcc16b10a

    SHA1

    528666e8ddb631fe6b4438f082a909c92969f126

    SHA256

    02a57e1c2a14f87d5b99b343e43b41c73288cbbb429803297533213a11e6e63d

    SHA512

    3af420396e30f697b1b982e5c2f24184855ccf05b2e6ae168d26b86b31a3fdac5a24bf3b3747ef901f289c07e009a46ab15f763d9540215734dffbdf47a79814

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5bf2dda51de532e71d64eb30196c2389

    SHA1

    24250a337a6057d09798421ddb074a2316279963

    SHA256

    a0f6acc9edc26d30148f47a4512e2445233df16976ccb0b42dfaf6224d1b711b

    SHA512

    c7d7dedeb73013d6dd3b4ec6b2839d30425304ac61a6b7b0c8705b27b61ffcf74dbdb6d63a5b762491343e63c6e41ac2d87e6bc60f17eddf8dc646291a62d5cf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e6079426d7f4216c7289f74e058b8efa

    SHA1

    777b57900154556455afab262e5d4b64d64912fb

    SHA256

    c88a87793a8af31fa543d1d8a3bf828e61f51b0a940f83fea59ebd335719efc2

    SHA512

    340009d69cc3bb5f75014399bebc3c613c509b54e38881a384d7ef69a241b1aa36b7385248fa0ca04c1e3d2112b0999d275f89032d36e729e68c5012d07be2fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cae84eb1f83e058fd875a18a595b80df

    SHA1

    4ef5ebc82d8dd156b37b325a8b967b9195e8633b

    SHA256

    ba458cefd09e19e0b7df312ecc0d75d18d98fc76ba7416effe6967ed9e391fd4

    SHA512

    abd46372b5e779264c62789b95efbd6106cd0e622e29a13e4e2b3903009161cc92a05a2a56b9e5705e3f4548e51fa636a603225a5e3ecf4e9e15e1fa46b1ef9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3c4799f3a4cea579a18e8e9c81eb75f3

    SHA1

    e5ceda5b6ccf1e16f9a9b5dec1a727d7ab1d0be6

    SHA256

    8e78089f9d69df63c0ccaec0deaec0fa5e793e170abd4fc782b9131acc693ec3

    SHA512

    1981ed63f143a6211f53f98f0dd65d80e0163a6bc89a6fe6200351af022d113e5eded7bfd45daa899e8f1d8368b0720a1d09bb2e2534a5a0d9e7d32eb36720fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6b48e932fd30bbd04560bd8a1c91e161

    SHA1

    7e32345acea4c8b8782d140480c4ba021be92335

    SHA256

    a092e1c84dbf74ac6f158332b1cd953c9e5edfe800eed6beadffba781dd1075f

    SHA512

    0d362c24b820dd09953cd74620196d3fc8a702cf9111998c8e1bb970ab0a95593869a994b464841946c02c02258607433c28f0c67bff6af5b9901ea41d4c962a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c4fb66d85326c2bc4391a909c01b6953

    SHA1

    eaf631cfe8e9cdab136d46ae83c73565b61f3823

    SHA256

    1e134ba39f009cad3ef2a8d2abedfff48ab36c28dec0d09c4cfad45afedaaeb8

    SHA512

    5c8c5244d51eea8c8c80a515780c209afcc5d95b97bf6c423330343d6741f7b8dde776fc43ebf50aac67af5a54e1dfa3c02f50916f557721877097aa030ea3af

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    46625693fbf1c168661e202c202252ee

    SHA1

    02fb2ea7c07a6dfde0a0cec6ef8218004b0b7dc1

    SHA256

    8ef8604df5de1d732333140bce5d9d3f380a7405ceaf0d097efda3aaa964feb1

    SHA512

    1d9b48c8b408b2a6f82fa4f43a51c8649edbda2f844a80a6629da854ea9aba3aeb0dcf7ef4fce670546b91ca60a0a54c284bac5d49034ed34d7ff39cf4e64f10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    654353d9386794012c32e5da2865ffa0

    SHA1

    7aff26ed814994f873178db369fc6ee17da959f7

    SHA256

    137ad27cc4c802b2027c8949662e0b1b5279522831ea1624a745ba2df289e440

    SHA512

    384d32850c2f4f81c16677abd25dce3ccb20811a5bb8cda27603a89d47a6fe0d78845a48e3c385bad9b2d95973c7044e1aa0f2737f58e6f7faf0b7f970772d11

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    87ed000b5f0a77e7fac6097512b07f5f

    SHA1

    644b9caac12b758b816ebe1d58563168bf08df56

    SHA256

    3904dab7fa5bd35d20418dfbebd53f4c1b836d32afe40e82594f2d9e24d4ccf5

    SHA512

    f7563c8ae5f18a521156c956b8679909d7d6075d1ebdedfedbd95a0336739368dd2fdd90c5ee9a4b053bfcec274fda5f54d7beb43d979e8fc1de3febf8b0482b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d5bf3ce1bcca4e5a95d64f3d147d6f5d

    SHA1

    fd9ff36f124c1fbc0b90e024687e1e458ba326b6

    SHA256

    e9d075d71344a6bbbbe647e005ce768539f1f8cd08da1c2a5c35cd40b40c6c94

    SHA512

    7dacef39b5c387e4a354170bc9715e6d26276c85af6bb7e3e0ae0df609457bc5e95a08a485300f3660d1d36320924871ffc8e3cc91fcaf375a8dc61698923508

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    17badb7348e06ae7c6f1fff5d3ce3b39

    SHA1

    700e510ccfdc7248d7724149b2899f6cba233fea

    SHA256

    d4ea92cdb482af599f4c2a94c3f9cd760d05a161cf07229057a7f0e324236c49

    SHA512

    3914401c5c69465aeb11995081a25f64ccc5c81c264f9c96fc0fe98dd9c65c2a00f6d12c1add857678a4289cbde7285467b75caa81782930378c9a9075f086d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    98caff6b113b29041aa6a12e799b8c0a

    SHA1

    802908ee36c9e229baa1229087b12545713716a3

    SHA256

    82f44bfe71535dff6f6663969e7ff6be65938a304dfe1f6c2ef06847f7c4a9e7

    SHA512

    c06f9eae04a96fbd63abe39ae6b65dfd6704d7a87ac9811ed66b189c25849ccf8955465d01c81ff8a8a99fddf789a2c20fac847dbe43a2e6b6f6be03ed7cb05d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    44ab170693bdb85f2776bbf46b80dc30

    SHA1

    d25e32e7682e32bf812fd0e6cc3b0a02ab113cbe

    SHA256

    cfa503415e95bcabe8244c444d7848f21e0489e2311c952e2f0d6e181eda6378

    SHA512

    530bc7e0070a93925c3f01d1f4ab32799b71e2ad56153a807a9417b0d16a8479a45556643869b6d4d14c1e6cf18417af9869b0ea197febebb1f838b2c4596c9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1b895f3575191722d0bc075e2f246725

    SHA1

    8fd1271f29e67215df441b27cdae33497823e940

    SHA256

    f2fbf1e13ff445c5b56c9eca4167d32068e7bd8679fce8b5e940dbbb12e594dd

    SHA512

    a4f6fc6c09546db82842ff049039a94cc059269df564471f2c30e6473f2a29721a73e431f8d44b17af50accca9de22955bbb123f2383934cdf5f6e1c7835e98b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ee9dee4ccc61655627e639af1986398e

    SHA1

    f6b3d05d827ee9ac8fec748dad4a59c56ca4c183

    SHA256

    be4bab068654874ed213434bb30cd0c29e88753c9db3712985555012c782b1d7

    SHA512

    69a76b7286ed8db49dba00817ae4cf02e855cb2531be0fc6a9db7fdbc68c4ea689678e980956d491326a34580505e22006f0b31154ad36e50bb319dc6c8bbf5d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f7d414fe884e54e00a94e23c06ec2833

    SHA1

    e657a00d342a56157f611c98c8ad731b7c4bfc76

    SHA256

    f00cc60bd760862577cda5312579dd8b33353c116ee6cd2ffc72f5521f116c69

    SHA512

    1288b43a72c77d35800037747fee5e152868370275dd82ab6d66fa3e0601113ac14313673632a299da8ab75e3ce4dcb103728d9734930d2dfdd562dc64569c2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C02877841121CC45139CB51404116B25_9CE832D646FBAFC5C4ACFC523FDD84AD

    Filesize

    402B

    MD5

    a37bfcad1b39f9f966aab9b95b55ec69

    SHA1

    fdc4be36819437a6069034a285557c361b21c501

    SHA256

    f6b2c39e04635279671e51174f3e0125aba94ae9b6251f7dc685756328985cc5

    SHA512

    1b5a6145cde8e768e42aef7957fb86e2cf12a6f6d149b4ab042cbe27b120425d4300e791e93e70b33dffd0387a3d95481490fe2b4b91c41c1e3d0a884ec85661

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q98GZSGI\plusone[2].js

    Filesize

    55KB

    MD5

    950e589a42fd435b2b6daacbdbbf877c

    SHA1

    78dc5743d4b541018adafe3a2b49b6be5f1c7944

    SHA256

    c5e3093bd5e8a58f04846013ead66d36ca25457a0475c9c72d8cde60e598fc0e

    SHA512

    cf2aa139ee4c2f79ad5dbca6239e4d5179a21f54cf2c3672c45915b3282bda5f5fa702c241d3b5c02805cdf1b48427d34e86b627904055a46ff6ef11be2b2104

  • C:\Users\Admin\AppData\Local\Temp\CabD3E4.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD3E5.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b