Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    130s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2024, 07:26

General

  • Target

    be23adcb37d9c502c693b58beb317149_JaffaCakes118.html

  • Size

    23KB

  • MD5

    be23adcb37d9c502c693b58beb317149

  • SHA1

    2454c836d1adabdf0fb6032fb313570fe2abe72e

  • SHA256

    b47a54d4b2e4412a76ad0770bb04b4e67ddbee397e5729511d546a34699df5a0

  • SHA512

    b28898def8eacad7ebfd2fab263395b7f93a5c443ae60379d2377abf7f3da042f1e39ec83f5757f4b19466c30c53b79ea81ea29f6b7b27f91e7666b6b9a1b232

  • SSDEEP

    192:uwrlb5nU+nQjxn5Q/3nQieeNnEnQOkEnt9JnQTbn6cnQ6v06J4RnQNjMB+qnYnQU:YQ/iEv06k4YY

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\be23adcb37d9c502c693b58beb317149_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2408

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    61e63c2eb54fb2924d933b82b1ddbf7f

    SHA1

    67fb73dff2a2dbc95f1f18a05ec9bc058f602156

    SHA256

    49d586e906856f32d87f0ca13efa7fba950e1f13662b69160590d4611dd6442c

    SHA512

    5d7b671b44f03051fea7caed77c7a13bb9e61f7d2c656b4ce24bb5869d64a6b6c723a32004d39b0eebf9c49a719aaba8d9eab7cb26bf25e785a8502e226a6292

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a94cd3288ef09fe05f72f0eb7fd82998

    SHA1

    0cb5f6d8274f97c21587b44da5d9638883411740

    SHA256

    abc44b87f7b9f83ebca6c87d7936d29641a9e39c8de30a74c2a0b19c96e4d80c

    SHA512

    e40f70b9a3958b99e70c5864c73bd7f61c39b041102f50375457f67f8c7b3722927daa1f7fa5acb7fb2c78641d999703bef13da03804f044b7eeefda9cc6bb55

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9b0632a817035c00533648b68d70030a

    SHA1

    9df84f7c71b19cdd59742eb321fdc836fbf2eab8

    SHA256

    bbaf6a32c484fa8070d510b4464695ff0fe21d05f1045f2d008882bc391246da

    SHA512

    03ea99d6a1964d01f080ed66eac6332e0b7f9981f3cce0dd70a2de71a04be0edeeaa4b8b184747daaed533f05d49e4769f0a0aea1c829f2a77c9723e890058ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b1ff61f9a9be27d8ab96290ec99fd5f4

    SHA1

    d9c0cd5bc376741e5383304450f6904534aff505

    SHA256

    b22d477846186d6431062cb09e57657908beb8e71c3dba562afc656787d0ca4a

    SHA512

    987d49112b680fc7b4a0b77cd4f835b75baa7a83bd9da5101f3978512a05f43c7ce188ad591953ec6f76306f16f074d6f0df20e265a179f66fd1796746c058a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3e722248b09e5f36e684d24954865410

    SHA1

    79b870c34bcff72513fb49c1ba15d8d50bcd429d

    SHA256

    193e280cdc25ec22eceb440fefe14cef82ed8aed98f567c3d9a20b35b50bc1cd

    SHA512

    df2117dda86527ec5705ff7839459fa7728d99633f6abef7ff975389ab6696b37f9c8c3e2635dc985ef117bd6c4d54af4b34f9cbc4498b79a0d8012d0dba5384

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b8d777dbd041d95840f76f5da39e367a

    SHA1

    07b36a6d824473f5ca09c942600bc7dd1c846844

    SHA256

    e7d2e46221187d3e4f7ed7d783172bcb2111e20fe1ff98fbf0390b2df3adf8a7

    SHA512

    df77f33a8d78372055dc0a1220af96baf8d92d900bf14b94ae9d93d4a2c5c26d3ba9f3e9cc41d9cd4d4974c06de3943ce8779e3ac017846ba7c477e898860b1c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4c1ee229a3b162ef3c007ee5246a1f0e

    SHA1

    8ec9bd78fabaf4a38de1c5a55baa52718f0fa592

    SHA256

    09faa04706c3d398e56229805b689ad39b538de5ae55a1da4fd5df8988176ed1

    SHA512

    a2b3f1d879c8927f4cf38d71eb5ebfebdb0d81b031f5d2cac3f5034d9551e8a9c2377153a20649340bfbd18bcfcc028a44385c381c6ce6b1f9b3d53842f2a569

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d7469f1220fb2a188742e722d33e6fd8

    SHA1

    86927da800468661204dfeb88ba3af8f9386f0ae

    SHA256

    fd1889ef00cf34de2800b4f0101b676e5c0f23e695121fde48cbb034a4decae5

    SHA512

    68bda5f55694542a5f7a80b1297d7cf5a9017719c038d43edaa93407c5c8ac75363470646c45c88b787da5cbfc84259383eacd9b1670bee1e667ec5610646b57

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    07817c7f6bf05ee404e3973d1a0086ad

    SHA1

    1d310f2f727cd423e5a0e85148fafbe2e5175e57

    SHA256

    106cb161f41bd2acd8206df63e18a983f6a435788ed1a4930879e5cd9a40d73e

    SHA512

    48674f8099d61950489f8dbc2f6bfc9abac9013aa39a5c4ebe6a8b05c31c986577a9bc1a124dee96cc5c3387c76210f45a504d9a320f9d8dd42ec10e93bf114f

  • C:\Users\Admin\AppData\Local\Temp\Cab9DC6.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar9E66.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b