Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    21/08/2024, 02:01 UTC

General

  • Target

    b1b81da17da832e4363230e7444bb93f_JaffaCakes118.html

  • Size

    77KB

  • MD5

    b1b81da17da832e4363230e7444bb93f

  • SHA1

    d0d6e745452c88b24e4eac84658f57f8d7815ac5

  • SHA256

    904f60d9fc01024122f7d6f3988286179b6d8a7323c18f189d9c883a30e91d04

  • SHA512

    87bab6eeaadcd449a4b0e2e1124fe1a2e439eb388e7cad22354079636a1b250c1d5cf5ad953c1e99a034c7a01bfd7aa16451c206ded36d7b81bb899ac2e7df80

  • SSDEEP

    1536:gQZBCCOdQGDjv0IxCdjcyRN6JYRen+TQgk8IqY66s6Yk23LkDyV2tRH9/ThQ+wWZ:gk2CGDjv0IxijcyRN6JYRen+TQgk8Iqs

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b1b81da17da832e4363230e7444bb93f_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2232 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2524

Network

  • flag-us
    DNS
    double.boublebarelled.ws
    IEXPLORE.EXE
    Remote address:
    8.8.8.8:53
    Request
    double.boublebarelled.ws
    IN A
    Response
    double.boublebarelled.ws
    IN A
    64.70.19.203
  • flag-us
    GET
    http://double.boublebarelled.ws/FrMal
    IEXPLORE.EXE
    Remote address:
    64.70.19.203:80
    Request
    GET /FrMal HTTP/1.1
    Accept: text/html, application/xhtml+xml, */*
    Accept-Language: en-US
    User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
    Accept-Encoding: gzip, deflate
    Host: double.boublebarelled.ws
    Connection: Keep-Alive
    Response
    HTTP/1.1 200 OK
    Server: openresty
    Date: Wed, 21 Aug 2024 02:01:36 GMT
    Content-Type: text/html; charset=ISO-8859-1
    Content-Length: 577
    Connection: keep-alive
    Access-Control-Allow-Origin: *
  • flag-us
    DNS
    www.website.ws
    IEXPLORE.EXE
    Remote address:
    8.8.8.8:53
    Request
    www.website.ws
    IN A
    Response
    www.website.ws
    IN CNAME
    website.ws
    website.ws
    IN A
    64.70.19.170
  • 64.70.19.203:80
    double.boublebarelled.ws
    IEXPLORE.EXE
    374 B
    48 B
    8
    1
  • 64.70.19.203:80
    http://double.boublebarelled.ws/FrMal
    http
    IEXPLORE.EXE
    770 B
    942 B
    11
    4

    HTTP Request

    GET http://double.boublebarelled.ws/FrMal

    HTTP Response

    200
  • 64.70.19.170:443
    www.website.ws
    tls
    IEXPLORE.EXE
    395 B
    215 B
    5
    5
  • 64.70.19.170:443
    www.website.ws
    tls
    IEXPLORE.EXE
    395 B
    215 B
    5
    5
  • 64.70.19.170:443
    www.website.ws
    tls
    IEXPLORE.EXE
    357 B
    215 B
    5
    5
  • 64.70.19.170:443
    www.website.ws
    tls
    IEXPLORE.EXE
    357 B
    215 B
    5
    5
  • 64.70.19.170:443
    www.website.ws
    tls
    IEXPLORE.EXE
    288 B
    215 B
    5
    5
  • 64.70.19.170:443
    www.website.ws
    tls
    IEXPLORE.EXE
    288 B
    215 B
    5
    5
  • 64.70.19.170:443
    www.website.ws
    IEXPLORE.EXE
    190 B
    88 B
    4
    2
  • 64.70.19.170:443
    www.website.ws
    IEXPLORE.EXE
    190 B
    88 B
    4
    2
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls
    iexplore.exe
    747 B
    7.6kB
    9
    11
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls
    iexplore.exe
    747 B
    7.7kB
    9
    12
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls
    iexplore.exe
    779 B
    7.7kB
    9
    12
  • 8.8.8.8:53
    double.boublebarelled.ws
    dns
    IEXPLORE.EXE
    70 B
    86 B
    1
    1

    DNS Request

    double.boublebarelled.ws

    DNS Response

    64.70.19.203

  • 8.8.8.8:53
    www.website.ws
    dns
    IEXPLORE.EXE
    60 B
    90 B
    1
    1

    DNS Request

    www.website.ws

    DNS Response

    64.70.19.170

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    35ebdd6dcf5e4cfc7272af5a986a4f8a

    SHA1

    9351f01a777b47a813d4dbfc42905c382fe2436d

    SHA256

    759dc74519e0d716f1244cfaaff0c924c93319a37b85271a05f48f99f74346fb

    SHA512

    4fbfdd662912643cdff6a6fff9884dd6756de342c30fb5ba955950df8dcef57fdede4982451737414b44026f1dd32e85c754d4d83bc461cb9c5e9a4e7b651fe9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5f7299e1cc553598ddc20e55032e8d08

    SHA1

    df7245338c3c6a82a4fc640ef09f6d66486a480f

    SHA256

    077e190abe26b17665764bebf960c904a165f41753b2fa71dfd10fb3dff6472d

    SHA512

    140b70fe1310578a7d944ddcd57ddb9ecb987f725334d6ace92042f611e4bca1e500786e39fd2980e71413e06d726f3ad59ff9a50a021ca1bfd9525a44b4c88c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    06131854e2c452c082392041530144df

    SHA1

    84b36e3e2495a42ac77e7ed9faf1aaf5457e7ad6

    SHA256

    a5ae4faaf4ff173f33ec62b43aa0f8fbac3c23e8af10f53b0980d9f4a5f158f0

    SHA512

    45a36ef0121147c3f17d202da47924679c5cc7108169422ac90b635eea953ae987f9d36677cb45e116094dd6bebd88dc76f5ad10dfa939292eee27cdff5733a5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    04c7916d5dfed7dbb47db84ebb9ba7c2

    SHA1

    5960b3db267a8be8e4228b36173e9a53307fead9

    SHA256

    e40346b6455ba41e08d9c2772e57c54efe0c7f14c772a4515cde6d7bb7b374fe

    SHA512

    26738353a454dc4a864cce4816273491d1637c0232505a1111c24c1a65b9a8d983bdefcc34287fb8bb29bba689496660f3178de176b0c7b91eb1e4d002028ee2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    654999a077166dcd353fbe6d4752c2f2

    SHA1

    15a9595b29e4b3ccadc0892cb3f9421997d4c41b

    SHA256

    62999d4328c024095c819c245fe91f3198ab4a427502c34a5d5246262bcf0d23

    SHA512

    505f4ed957c788418a317b9d2f852bfb3776b419bcebea012b574fa7551663fdefda625d688ae50269f7ad22bb920bb536d16910ad56e971d1f372faf9ee196a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9e0b07283d30416d9ecbc50db0fb44a

    SHA1

    4160957cda8ab1b6a2ee031a59ebb50cacdb779d

    SHA256

    d95ca59244797bce1b3078f36c06c305081738c641bf336f52f8f60be94579df

    SHA512

    0715da2a0f3bca49abc060ebff90a26a4840a2f773dfe412ada624e6f2db5ab6c6e1f8498f5bcc6f5bd089802a041693e2fa1c2c8a5e5200cacc8bf67f36b442

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d330dc6515ce0d19db4ff5b364e9807c

    SHA1

    18da936358e7c99b3b2c994485b9170c2e4b7590

    SHA256

    6f1b004025b02edadb0445c176a43f089b0984d0ec315f115f9546dc6fc86771

    SHA512

    08520b1605671f7f9124737cba75e036b422f97639f467d93214dde7597e9c6093e98caef37ff6434d22748918ed1468f84dd44ceb31dbc73f2b2c6014fbb61d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b75588459f150effbd313731913b2b74

    SHA1

    b75efd2eb917fa4581e1e46fdc5d9f8cf63b4eac

    SHA256

    8dd3cdd6c647563f556076e21a089978f823851c8dc77f00260e9d8d90c0cdd8

    SHA512

    37e85e05f24a1cc56ecf837d3720c26594c834e77926b831f72c96fcd52e91c522c61cdcb1e8cd6db6d52680ff4d1e5427ead388b8849f138e8d04f05397e133

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aeb76bb9515f6232301e7fb93e2c8cab

    SHA1

    4a1de779242f67afa4af2db6173c7b45e1918af6

    SHA256

    a00a31d2fe05ea704a48e5ebb061647a4591dc27ff60fdf435097a34ffd847a0

    SHA512

    ae4640208b228e8bde8687277e97177ef9cd67d196cd6bf708d76357c41d4a536193e0d5beb7d875bbc9483cb1e61bd10204092710ee5d5779e8e42e1ce7f558

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aac8cc855f3b1ae7568b041a5724272f

    SHA1

    7e21b4e9f5cff94c86f277b5671e339071dcbd20

    SHA256

    71e96da31b7f1379825225b4864534ca383aad5e951cd61af5b86e9d16895c3b

    SHA512

    e4aa757a6cc8bc16a86b67615ba7c4e92d43842b94ea61c843f2100ce601abaf2937b8c7ecaf8467cdbd4960c746697956f939a521a06d1f88e60e8fdc49e4b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    89e45bb90c95e899cc11778db70cf77b

    SHA1

    4100fa7a0835bd5a8a722d18934d5e9d73cc1474

    SHA256

    5965eeb1a1589ede3ec993aa4280a7aac5651cb87c44d626f0c8e301d083ac1b

    SHA512

    3e15ce3c473a9bb2f4955090e73f69503252bd029e6938f50aebeeb79ba11e22e82332dba11c65f2897d15c7acca29dc604a9ea5d16d463aeb121ddb5e2a9e4c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1d8e40ee1d4dadb0f226c5607f4984f4

    SHA1

    190b2daf4ade57218f04bf8ed2abddf7a6313fb3

    SHA256

    84ba0b5cd07be71c71916b80e4617a01eddfbd63d6bc305d96aae3c65516c8c0

    SHA512

    28d36f996c2c169472c2e4e2cc682906b36a566ba44efe4797cd09f8d811a291099fd02fd76c1e01d6f4a582e1d5b14010b1a0e2d2da93327a533d94d135c1eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f2701cd41989d7a5318f48165282e9f7

    SHA1

    3887b6d99f3780c4422002a93ef81ce7a17eaa3b

    SHA256

    15a87acb2b5441778a09f56342195aae6ca0b1f71ce6e12408ce3d345bb8a89f

    SHA512

    a7c6931797120afeb27cd45b89e41c386b290dd6cbefdcdb8772c860acfb4049519a42763e9d77968017285c270bc7122f3fae53fa86910f51ff809c9a06681f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3717f12ee843808956b9d11fabe3f9c4

    SHA1

    e62b1228b57a6a606e5ecb3e5bb28a477dd500e5

    SHA256

    d72209ec5ef485d950643c39ba80b6ba93048b01adf265a746456bdca488e4bd

    SHA512

    22ea6fd76f6592e738b9daa48bbf2f336347a053c1058f399507403096c859baa19601520e403625a6a8e13cdc0334ac5ce049b121268f482124c77fbe124500

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    faef43ff272806a82a92c7a1f4e82d11

    SHA1

    05490ba2f980b5a668176b27b2a5919f9184780a

    SHA256

    ff20f91550afbee164238e4b85caf75e244363dfc2d5d0bb6052728e4cef8539

    SHA512

    761837afc04918bda95d2c55d28198bce50569eb06bbb728fd85030e27b13332cfd87dbf589eb4e07cb3fc298cf179ae9ff50aae0986857a69fb8ed3d25f9ed7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cba7f9e88832329f6818fb77de37a261

    SHA1

    7c4ddfbe9b880185f4fd92cda81f81324758b67f

    SHA256

    5ee01ab0bb237fe26e6241494a5c3d41125352217b6f6038e7b2f1c05160ab5d

    SHA512

    d655df402feba91960733b85b9212e25d110e2ced9e1c426c3c89fa2f2ba10677eb1035f564f9f783d79581e6546e435a984f135cffefded168222e92296c77e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f8b819b48f44ec4e65420e2288d03343

    SHA1

    af32d9e936df2dc36c9a733cbd7d00491b81d8d7

    SHA256

    aa49e94e5de1bf7e93fb995dd3cd3fc225cffe5e405e12cabc6168d353090187

    SHA512

    00bbc6d75face44d5430d79168ed36e8a8759f7fec6b57144ccf5d112b13f1e6b1b977d66b67b39a009f1b781471aa82eb5b69c94aed65f5bbe5676157b074fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    63563075db362ba8645fb33782c9f0dc

    SHA1

    6568014df10fd0771826709bb9807dc240526aa1

    SHA256

    dbc0ffb4fd7e73aeecc1397f3877dabaded34b331e72791f4360732335ff54bc

    SHA512

    f122764d8dbbcdec48b74025262dd9511f3557951a4ee398d0b0d9a7f2b05685e6f66aa9635d12421c53bd9cece4883503e4d4c421c2486ef053714223dd5b5e

  • C:\Users\Admin\AppData\Local\Temp\CabD414.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD4B3.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.