Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

23/08/2024, 18:12

240823-wtdygaydkf 3

23/08/2024, 18:11

240823-ws2yxa1bqn 3

Analysis

  • max time kernel
    140s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 18:11

General

  • Target

    bca83a810f272b52d0c53f4010742e39_JaffaCakes118.html

  • Size

    531KB

  • MD5

    bca83a810f272b52d0c53f4010742e39

  • SHA1

    5477368be6523ff3065373c01ac06b05f3486109

  • SHA256

    61a1df93b3075d735e99477e6a11949ac2086b774b94679d7db71806bbb68891

  • SHA512

    70417cc55fae1958139e47f5a4e3b00d801d794fd3bbdbfab01ebe0f714a6c15f2f671733bb2efefecd68e96d464bf0809c4283524073e6559a019f735e27cf6

  • SSDEEP

    3072:S48yfkMY+BES09JXAnyrZalI+YAA4boQwlTDoJrvVZxyjoYyHotsNq8BCpkvTgaq:SKsMYod+X3oI+YYIlX

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bca83a810f272b52d0c53f4010742e39_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    0623cc53019c3cb86c55726390580a0b

    SHA1

    b2fdcbc5953f9843064a22a5c08139b4753ed282

    SHA256

    ce759239c0d965b4ffe9ff1d6560cb2199c8ee1ee7a8a2e0f301ce0ada9ae742

    SHA512

    12449bdf29f609d290c9892620fbc781fb62290a5594d77d08c2b1689e36b8a19a4e4035b0144848567b628da25f75c89257967a3da51d5d0c70c66129f86167

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    2518531cb142f812862fdb9006b9b420

    SHA1

    18d1640ab2042ee22277228e04c81731a6145fe7

    SHA256

    622bf1143040c26adef2e89fae3d753233aa424270d0684fd482598944f040d5

    SHA512

    ce18625895f8b6937f12b988cd3a84f371073081b2c88a6d533be4f3b501e08438ab6e3f163c389c56c1819b032fcebd8435f7d8c3542a01100e89113d6fbdd2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    618daf643e815e905c0e2c7894def192

    SHA1

    4b5aa73bfaf547e5590ad972d88789380b16a19b

    SHA256

    c21e5c2e87361c3fdb29e86103a9762525b8b6f8f8d9368cd8bf737d165b050d

    SHA512

    5e6fece1b6015066a0cd0ac54587489c735fc44b293737b9f15d425c2fa03d4f736e5152a208e0c03f7854c3ce1fe1089a32d5dbef310d3cddd3e49d9618ebf5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    b1d09836feffa89c669d0304b6c59ee1

    SHA1

    d488e9f53bf283fed1c4a455e7f06ff497a82e4b

    SHA256

    b4f8002e44d056cc1af62204f005d356dee5edf36303e2a620541d4c39b63b13

    SHA512

    665d57799a2e05e34de359dc62d56a6df7ea84bc8d4fc7b4c84fad854f154d9ed6e3b488b2f4acd2ca2bb34b938cd894bc72c370a0adfea390efb0189579bef3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    ed143909ef0bab3b159efcbb5c4541c4

    SHA1

    61f1be238b2a744fbc20700f22da9d6b02885a24

    SHA256

    acb7d5401517167287400e05b4faf8c603a73b5023d83bbc0c52ec72bc24ac0d

    SHA512

    721046a79a7995e952c9f6c819869402c069f77d1486390710878888939cca8e06c0377a2a2a7b65c6ca8fe96c0cde3b70d02b1c2959edc97d3b1ee3834e786c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    eb6f9aee759bd9e23a6cd9eb09e484f3

    SHA1

    c4a6ba1feabc2a0b47d1a01106b7bae5666b8f48

    SHA256

    87e85cdbb6c376c1951212aaf60f58f962a4fe7c9e3824ae59209c6b9f628021

    SHA512

    0cfe4c56f02e767898dc78e7658c55a40027b3d6216b4ed5f5f4e9d2792af76ec9886c861843e59f25919a3c8bf042e0fb03b28e3b3dbc00e80548819f30bc65

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    ab82a887bf72a31f5325ae9477240ed6

    SHA1

    9e1fe89be4b94a2bc5e37fe03310004ec005f1ea

    SHA256

    c3e06ccea3e231168a02ea1e8d479e1beeb00e4019b52ab550f2a713a6e56409

    SHA512

    5aeb0036c5d7eb4107374a58e5d5bfaf12c0509124ab7a5efc7219f9791234f9590c0c98b65262c97843977f977b0f17d8f23ab756bf387f7f99d84c8da6ae89

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    a6deae1ccd6eb17159947ef3a54d2e97

    SHA1

    e479a1184e181aa3414681cc9c74e049de3bac10

    SHA256

    48f4823e9203422575e7ef303046e77ab131bcf68733483d4d9c22bec0a2f1f1

    SHA512

    cf0450af98de936d61fabbcf52864a7dcfea7006ab2435562f38cae638eddec2f635d622d6dfe4b7799dca1a85a5a1e2058c78ca2219dadd74f35b2e22273d2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    9f4432161647b051b44153dac8a8c490

    SHA1

    9e58080d8e588e149749548fce0455e25a2edfd8

    SHA256

    863061f55faafc240a6f8bc6d22fa41fa035f111398fc7546eb9839970210d20

    SHA512

    4d69fc182479643c9b41b005f7a34900c641573900ef91d082985bdcbd5c31bf8c1cc701b586c5fc65aed06b8c170bc066b2650fa807d9a0bc37d6b0ddd9b0f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    1a782dc6badcc3a03906a4045541194b

    SHA1

    a1cc26ef70fcd2d472b9f5f97c553f975e2c9487

    SHA256

    88f63dc87114bcb0b56a24abc0b16e7d5dc14d177f1a4c7ea0e650d26fe2c6e4

    SHA512

    1e45a63dd415297f0da98df79d14fb717de6525b9cef6fb4086debc3a0c3d79dba61b20f3d19f534da47b2c0a42b815fa23a1aa1731b9b9f21cde299adb9a679

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    0a5e56a466c315c5d45127eb8ec9e7b4

    SHA1

    b2f289cbf1ebc02a34bfe51922a2d4cc6f7fb07d

    SHA256

    9f148d8ab0d2880b4fc9be887533a972376241c6e509e1f391454132c45dfd3b

    SHA512

    b6490ad8b20f9f7deb1b4182b5d5901338aeb18cc4e2f7239435637b1892d79173562bdc6ef0908278adb66925c5c5bfa3a6a8a325208262ac0d794e00393510

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    50525c58eb3821e488dbb259c9fcee8a

    SHA1

    3faa78e0651e0d833806424d7a995ff663369695

    SHA256

    13969bba97b158e47ed44bba80778d974cb65686c932ff55c7acea3851fcb99c

    SHA512

    eb9427b5f58c205c9afb4fd4bc1d3e35979666bb9df520f1b4a9b3471347414493070716df2e3f4112667b396e48d1d82685f5ac32b2a50435c3881735c60818

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    ed097e1e27bfd7bfa0a70f21f783e682

    SHA1

    11076801b7415a7058bf9a340e2553cdf1db2cb7

    SHA256

    4db2f010b7a0f18897eef2b23f6e24f353096e423af4b96f1a19e8d8fdf8a100

    SHA512

    141dd584ca60ce2f0a74eb86af6834d431b47f0ea99142d03174c5d9d79dde241c1b0be027f51e978956639b0ef934e0bcd05abfabd96871478013a4535ce0b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    33bc7bc3f9557eae734cab43f34660cf

    SHA1

    decfc0bd460ea86325d24d8c1f4e142c5908abf1

    SHA256

    35599688038865c3c4e0d909438e81dad8fe615cc8ce971055224e3b8c0d0a73

    SHA512

    0455951050ec1b7a868c8584215220d54e1debf6189641206ea1cfded35e389a1ec45737fa9e558754590248e05469e9c071da95f0f0b76f1f112a07d7f75d11

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    72ea7852b32432450701577f3915ae38

    SHA1

    85af327441269dd53437744a1caf43a6d7579925

    SHA256

    37e01e7c8bd4d529c9f142b64dd1e2a01c55649c2a3e770e6edcfcc5b5481065

    SHA512

    7b96cbd0683cfc1ced8a6f249cf84b21826b2001835a1d1b98cb0cc8c548864c79effb3f075c58d2acc180a1fa10b04d93e72283d8b7922236e494a506d22c78

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    a4ecbe0dc5ccbd519ed5fa15698c720b

    SHA1

    93201b6e1f1425f270c1e18efcac160f65b83d0f

    SHA256

    6a6d7e1ad8fbd957fe18c1e541127856dcb1f59d0a355cce63defd4aa55b2b68

    SHA512

    706885a62caded055066b8871dabe7f55fe5f4868b1926d9e755e3203098e3716387da32d60275ed37cd9f81b427ef4da78a1862573797973b95e7f2fcc958db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    93bd2c2824e507f669e980ef7d389bc1

    SHA1

    90ea026d9b45d8c1c2c62132933f552caac56401

    SHA256

    44edc3aede8d4001d62b8b8707ea988931f39ef0d04d92d2f67b96810488c7dc

    SHA512

    9ac1c57f55cbf1ec174cc5028d3fc5aea09b299baf443d7ae9344086d9c18db92001244987da3e67c780e90516c2327708ac296bedee052fea7137222096273e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    e7392dee911d32881e835370036f37cd

    SHA1

    0b14fdf42512737fcb62b1325d8e2e1d8effcd73

    SHA256

    d4c4cdf0a3426f73512b3d48b6abba549ecb1ca0e43116b93551ba157f4a69e9

    SHA512

    7b5b78900cca6cc7afad40780e0f8f7446bd161dbda621816d09aeba02d2eabeea753cc99353f8729512337c8b6fb16000135543ab57e1e827c8b7d371c76985

  • C:\Users\Admin\AppData\Local\Temp\CabAD13.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarADC3.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b