Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 01:17

General

  • Target

    ad57d8070bfc181d329492a71012900f_JaffaCakes118.html

  • Size

    3KB

  • MD5

    ad57d8070bfc181d329492a71012900f

  • SHA1

    25115ef1282fdebabeabd44386891df1a7e7d01b

  • SHA256

    41fb522e544346c67ce60c7b3f7d680045acadbc44ccb4b5cdf022e7f4813ecf

  • SHA512

    f5b15e22849edec92e955402d02650e785ae041a28154e3ef03bf6d80ac2389f38127d590eab867701a62f0bf85d98f808ebeb2f427c20ba25dbe4b169489aca

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ad57d8070bfc181d329492a71012900f_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2780
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2780 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a9a606d9b21df7bfa1b3ad0d7e4e5ae6

    SHA1

    1da83def4ddc3af2dafcc35a0d9625bfd1ad2c7b

    SHA256

    9640aac47e5db5b787625db8306156cad724588e1f1b8946b748f1396d16a0bc

    SHA512

    c0d3d8ebd058c34bf0a816accc79d3defb47290197bdc51cc9389bd2912905b13790950d3120f3aa7aa328d271b13ecae929470ca2f8612258a44eef9b0511d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8cdda7d69b3bbe4936a43810a0b40b30

    SHA1

    3910191080d60f778d91b0eb95b117811a591d22

    SHA256

    77c096ea6d70ddb4b260fcc737a7b900bc9634909ed51bb86d3314af1252e41e

    SHA512

    953d1df3c9fef3df476718a0fbacba1927b0e716c1a00d34df1692350469ef934df544ecaa2689e2b38353949b791d186b84c42b0d8026938953dec4ce8b692b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3a6e4218d91adabdd4cc45bbc26c7aaa

    SHA1

    8d676692b08b661f55ad8458f2aea76f3909c49e

    SHA256

    1141e8714185e1c21574177bdf3546627850eb6fd5c934d104bae5f75978661a

    SHA512

    10b0b3fd53d4c9163dedd30ec933bd8ed889122858b8e2860daff39800d7cb0e7cf57614597839ed4fda4ca1755d98d37e82168f94b8c326f5b04df84fe9da33

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c8e572e65a33496c71b02472a54ca860

    SHA1

    60e70232e463541777eb2de72e2cc8539fa9021d

    SHA256

    77e364ad6fb268dcb70d3a402132dc502bbf129e40008a9783516fc9415e8d26

    SHA512

    3c7cac24c73c634f0d553f62cbaaaa8c552475b96f9ec5863c726adb8e4d82b8ecd2711da51809bf1a4f9ac69dd18012ef9ef28822b6614795ce1a3b5814a2c4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cf253a842b608e9fff0b33a18fc93eea

    SHA1

    f1c845d7d8a9e76335b09d98465d0de67fec5212

    SHA256

    5f8ce9649b6e7252bfa5a41bca8e312fa6ffd1727a1d848fbf2028112d8bc33f

    SHA512

    ee65fdf35d880476f190124ed244887515da7afe4804cf0a7fdf4f47ff954e1bc7365cbcab3b5c2b6813ac4b79b612681d59b1d46b049abaf3e4ce5e831f5e8c

  • C:\Users\Admin\AppData\Local\Temp\CabB70F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB7FE.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b