Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 21:51

General

  • Target

    c1a9fe528920867d838e8957f8640e6a_JaffaCakes118.html

  • Size

    30KB

  • MD5

    c1a9fe528920867d838e8957f8640e6a

  • SHA1

    b94d4999e880651e22cd60e9c60c461c081e67a9

  • SHA256

    a82d22fe74b006eb4d9dd6f3a20e0454c6fb97f1c14f843631a502cf5ba38950

  • SHA512

    e3730666f7e83e2dd9540530e3d72dae39eefc172d0da686602fa9e03d90db8338f08a4804cb9fab9b7a3396d9d60a373debb76cd3aefa13c622867d86ff798a

  • SSDEEP

    192:uwn0b5nW6nQjxn5Q/snQieXNn/nQOkEntQWnQTbnlnQmSWxFvewovekZFyya0dJQ:tQ/MNxFvePnSyCFZ

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c1a9fe528920867d838e8957f8640e6a_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2348
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2348 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    053421b67351a44c1d9992784fd81073

    SHA1

    6ff5d55d2e22a596574776efdb02e8f8e60fbc06

    SHA256

    eec9b6448e96b90db9c91d416979328915e937113761a7d8f393e404f3e82871

    SHA512

    efb6871fe400bc9da111a1150d94d411d676333532efb8ea043b26628162effff2ae1a859d08da74b825329ac1d64f8f906bef5732a516186de3867bb7bf8746

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e9e4e967886c615eeddcefd555517f6c

    SHA1

    3b6b0df63ea09dca9530005955c6dabbea24806b

    SHA256

    825ab0d35d7284a208ec76bd999e6f7d9ae5d3e886a0c69983e05a505e2e141b

    SHA512

    f6b6809c5e5d820483153667506d0ba9fa5023af7abdd8a8ba8bc0dfbd2c75a8d5a1b44d42969ab3f3f86599b869721ee28f037c0632c1b0a62e102fc794f06c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    223e3a838ff5b1f1cdfe1dc4d8d365a9

    SHA1

    71b54cf3db5620aeb0d65d2bc1baefadfdc4bbde

    SHA256

    b70bd93b2d1d90c2f85bc8fed0874f719890acc92e4fe94f64e436fdb422a47d

    SHA512

    da6f9a9f97c1eebe28b0c2d652f454392145987551cc5b71822c32cb03654f5280bb8195b54501ca3671418863eaeb1b1ca182bf77b48ab8b6033f8ecb21e3c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f5ad6206145fe76b14e22a3e33ca6153

    SHA1

    44ff6c9d10d1e7a8aa0cf5949013e5927394a97e

    SHA256

    782671760dfaffe3c1a8211ff0ab41a3a4d790ddfe6b25cc469ab0375ac71b13

    SHA512

    245cc5e0275d90bb414e63b6e0c7e222a35200492807f3be4ac43faba81bc2b0f7e685ad8aa78d7b895bd5cb33c3488216ceebea22689103d2bcdaa4615805e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b354e66a8e2b7b67d1e5af078d56479d

    SHA1

    7aa38d6f384b010f784274408d6fd715837544cd

    SHA256

    ad42565dfb738b2112e676b6abff2ae96e44cf240b4e7ee082c199a72c91c827

    SHA512

    fd89e2d07f7d7bfd56345033e03e57025eb10af10f81868f21e6c754cbef245a0c660db77c5f72412a574d60e6bdd1481c6267a212989b4acc2131885b94ff7a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    19478d724d3d2aced764e74b245a2676

    SHA1

    82bcabd7038881a3e512a024b4eef6d97ec5e2bd

    SHA256

    42b3a702f0b7cb01ad11be46b6190750b40dc03954085dd5dd9c1ff1c2625965

    SHA512

    f58bc500e972f285bb849a0c0836122d761514f79820e2667b91f15cb0a317a67b12a06686bd652edb6fd7d71066a146fbb4942be5842f68744c03d77d09d4ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ebc3467c21cf0b0323bfe4b618bdcb51

    SHA1

    c493a3c7e90e5197b45f398b9926aa3eac71db70

    SHA256

    17a52181ceb980df0f5e4860aca220ebd4e502371298dca650faf91b545928d3

    SHA512

    3a943d988f2be422de896a840071ff6b0336482838c75c45ce7312da56740fb976fde4aed17c9a425857a5023e97060260f359b6c91bf9e3f1114cf4ab5436ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    56ce0b9b12c656e70e6166d52a4e5e59

    SHA1

    cbaca356cad5d5370eab1ceb417052aaca58f2bd

    SHA256

    67a2926502c66045269e60b0221a0b6de207e5aeea05234bc0ad7e135b5a5db4

    SHA512

    a8c6f1e47b3b37114c98dcefc5a0bb15fbd68127961afb8e6a72a8d367200f060090487d4e82bafc7143703e7e8b084b5c3a5416dac76277becda79130cde677

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a26dcd53b4beaa18cab4aa9a9a12263e

    SHA1

    a7d193da14a3928de929e3254b12899a3a47a6b9

    SHA256

    cfce36f4da89992c1282735b3c34cf314ffef752ce75c8145eda46cbd28b2a46

    SHA512

    067a0e006b6ff54f4b2948ae15c54b184924ddf6cf9f386676b0184191400cd00f128b6b4b6fc8249a6fd8ead38e3e95e596e625d6c6a14a897001604b5d6f39

  • C:\Users\Admin\AppData\Local\Temp\Cab21D5.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar2255.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b