Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22/08/2024, 18:48

General

  • Target

    b8bb33d635194e466e84b4ae1a930075_JaffaCakes118.html

  • Size

    13KB

  • MD5

    b8bb33d635194e466e84b4ae1a930075

  • SHA1

    b9d0584aaeb4128303cf6f8a90e5075f7c1c2658

  • SHA256

    90ffe2757d9ab2edb80fe433613d4b9c0cfb49298dae06b1408df00b86265248

  • SHA512

    a8b49e68e2919b3e6de62026c6af93ca2f6b54886292dd54e43eb99907782a4f1ac9070f0a3a24abcb36fb4faf84acca6f06b37cf7b4474f20895f04019b0e8a

  • SSDEEP

    192:+0j6j8e889NLaytEw+f6o8IAO2jif1tO0hX6Ghd+skA:+0j0J889NL7+w2nAO2jif1lhXmsb

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b8bb33d635194e466e84b4ae1a930075_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2056
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2056 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2e987f34263fc702fcb422b33210e893

    SHA1

    e0905c4b45675dd57492416e9aa9ff7f6092c6d7

    SHA256

    f2adc6dca369f2823a946ee0992c3c55ef387c05fe4a5f004bbd568d17349619

    SHA512

    ba693823b67651d19584cd02aa93617fc058b8b2d4ba377472438484f44fed69688dd68f38441c0ff8f9a7c47e3cfd0401def86ff1cbd875286c84bc86c473e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    113dc25ec5ef3cc0fd4353d1a1b7b789

    SHA1

    fcd174101838b946f286f3c5eb67b3a80251d131

    SHA256

    bc83396fd4522871c86369d447a294cdc8c9770b9a4d2e0d7a9b5c80fe6c0445

    SHA512

    a4225dbf5e0ea3217e54fced5889829d9de3ff646c137e3da4adbf1b795a72fd23a7828dad2a4fc4b52fca208c2ca3df7dee34e3083523d1aff3a2d7718a111e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4622f10bf95cf21f677db3958a2d7b32

    SHA1

    69bf6c2c6326b92558dcbf688547b78988194818

    SHA256

    7dd9fc4a1c3f0dde39b1e526e89c6c35396e62923f2c218dbfabd513501a6bb3

    SHA512

    84e1cddd9232db596432512dbce8ed6c68625e7e4aeda003a2ab3365a26a4f0573d45e5f4102f246ae22e18b2777f52d7de5aa1d4380f2f3b6c15280106346a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    382a9675d7cd3b0640b92f60658ff7ab

    SHA1

    6d9affba09472691138b1bb3aa3ba6c6f90f7224

    SHA256

    d08c160015e6bb05c102d43ee44b4a5b9660f00072ea865aa6aee16d112d6c61

    SHA512

    526b3ffb8b2e40d57616f135d8cf35b18462efae43436e74eb863d32e538b022ecbdb924d268841a81a1b4cc23f00c21569bb396ff0067992ac060ae11315c78

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cc8cc71cfb00cc4e3dfc453ce3702465

    SHA1

    c0e89d719628af65041b2503008f37821e0d7852

    SHA256

    ccdd7d638a1258b42393547c4239ac469f6dd1f97c8d34ae1490d5af1255d1f9

    SHA512

    7d0a26adbb27c971e34d242d0db98fc139b1be21efb4b4bf1132a5a350a5e5cc85b0f8523baf30a24e2b5e578b22c1df12f827931f4e77b6480dec09af78285c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    11bed84acfe21d9fe304cf024192ecea

    SHA1

    888ae2df7babbd77aeebe97e007f3924e834b196

    SHA256

    d22acb041a86dbcc4bbc03fc8ae5eca208f32be8595b10eb5c97de9b83591e5f

    SHA512

    9497b3644421022e2dd94f71f879a4cf5254238a66a5f6bb84a5da8899cc8fec32a71b32dcfd02941d3be4dedccdcabdb4d1c125dfe716f226f5e824b458eff0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    82893415442b415065ef2add81c4b8e1

    SHA1

    cb0cb6d0506650eea2992e3324b60ac333c4ff63

    SHA256

    c79bdb3812cc356ee2f2508aee2960719f271060b52b72e153113342e0a0db01

    SHA512

    65061fe5f9f211cf69d7ff061b9b2f1dfbc39ddd8f949c9dbb577a0c01f78695ed76d0e82e979d454949c93b8d4d92ab6ac1f9ecf380c472dc010cddd9765bff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5166975f8655d6aab16a3ddf54a4eedb

    SHA1

    98ce6816b203f2d4496ffc1bfab3545ddbffdbc7

    SHA256

    1d66a76019b2bb6945905cff157bfd84e1cd2a91ae7c5433e2926d406d76fad1

    SHA512

    628e941ec1afd52f5050a7d34b1e673022d99780f003371c5b966f926e9d990ba18cb60edc72743f4954ce1b2360870e8e547be99d4ecf4573d3cf9390b83b32

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0338f67cba71e495b20d76b20ea69d54

    SHA1

    cc87785880ab3257a3248d327907d7a5281f5312

    SHA256

    807ffd6b506d937db0ab47a192b853a2889e06c83ceb00095bda1dc81df13fd3

    SHA512

    9b0bc0439e58adcf0db7ea7a7cada66215a570da8d89c9a47193c56de1480dec03f8e83a2b73453a48459d7e15a743984f5a8997e2a23cc587d06a663830abf2

  • C:\Users\Admin\AppData\Local\Temp\CabE11F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE141.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b