Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    132s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 05:31

General

  • Target

    c00ca12a660e28e02c8c85c38952ac4a_JaffaCakes118.html

  • Size

    23KB

  • MD5

    c00ca12a660e28e02c8c85c38952ac4a

  • SHA1

    5afa1af526ad7b2081a34e09dc3cffc96e5bbdbb

  • SHA256

    b896ec5d7939b36a9155c4517e0c44379b657ec493ae7bbaf22c500e71855cbe

  • SHA512

    29cebcc88d1b2a31d4aef4bda281493a7e4e8c092e6267bf8f3d6a487d903b466fde8cb3a11a36224864dbf27559cfe0d9c029682486a39a009cbb2eee81088c

  • SSDEEP

    384:TphIOw9cAfEJFNxwHEmBUQfQ/yg9r9UOXtMEOcj6kgGgs3wu/2kyql:3

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c00ca12a660e28e02c8c85c38952ac4a_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2588

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a77891260e897ee0ef107248b74ea1fd

    SHA1

    2c5fc332e0f31a2c6e7b2fd6bc7aaf55e5dc7da3

    SHA256

    508a33030f1320963d7675eab83a08f3cc1adbb979d29d3b842f76b2d8e7fb5b

    SHA512

    1e4a44dc87ba8262648aba8fefacead43a4038e14467a0394f3036c35a4e1ef6ca6a8e6fd3417e080cafc4e8569ff43682f9add8546c3f07934eac8dfe35de73

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    95cdef58cf76a36fad0634841f7f1752

    SHA1

    a63a0d14cb20b2651fc1cbd2c592f52655320fc6

    SHA256

    c3c71dd70103e8eb0eae467fca3742ad081b9a86733dd278e120fd0379107cf9

    SHA512

    b0d67ebad74e777018d506825f9df5b7f560898a9a2c2345c6421cc9289e0178445e2eafdf33244a6d2ee052ac354856b49836d3cc781a35359068b964d1f59f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    03de49e09fe6d244260743294d2360ff

    SHA1

    00420c052731df3c4a235b519db42a0b615bacd5

    SHA256

    88091e3e9dce8eb0c9c78de37861de949e0ceaac193a3887cd6d44b3b8e1f25e

    SHA512

    b823818f7c2af8d4c0193dd732f3aeda9c302bf65358f01ddacb4d545c159d28414c79db6eed6042315c4ff059e272f6d6464d07b4afd7b2eb4cd940b084c504

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    be1f0ebed7b7e73160d31309339fa80a

    SHA1

    7acaebe8335b2005b5de1b510a7a092916456743

    SHA256

    14e34c91fb4224397a8faee61b0c064e4df61a20f9d252affaadba58c72f5b92

    SHA512

    bc96a4db66eb3e7f0fbcb1a180bf18eda225f2cf89e4b345f412ffe0309b89d5a3202e0b53404f7377f4e8dccf1050f025804badf22a0a2d35624c4b5f62f971

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0e4d24456fa5cb752da2543d3c2c8f22

    SHA1

    3c89041ae1bbfda1591c821ca3cd0931b54f80b5

    SHA256

    8e78ce7146d191c1ad52f4a6fe6115c8e03dc34722545bb330b387d58fa8ef8e

    SHA512

    0caa5ae8c4887e67c4b95765e111059aa90bc03005fcfedd9d39afb1a513173fa7aaa18207da9d9fc47f8f00d6a1e385c4b256e643a7557a8c08e356e1af7021

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    acb40c52b1fd69649f0d082bf54e8227

    SHA1

    ec46c5ee751a7d69c2273805f1b9e860c7eabff1

    SHA256

    fa526be786ac4aa53dcb099efc0ef10766421efffc126ceb2cb3503f3cab305b

    SHA512

    a8e89f9eb4f076b82187dd91b197de3cbbdbf9556cd5e7f5924817475d7e0bf3aeded2202986d7a9238087a8987902fb416c2da58b6e381d78f8e938c275e4c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    948d40d66b171863f65726fc39643b30

    SHA1

    8fbb5bc6024380cfaf759190a98bb11eaffd6fbf

    SHA256

    86f3a7f4b85339afe17058190f826bed3473cad4e951a2253cd0f15a8f5f3bf5

    SHA512

    d448fd7bc9a0336f5e1e706bd1422318029c0f37f9e192c2f0a69f2edeead3858f8ceeeece5dfa5adf04f31afa6009bd9bae77710d9417fda90cd6899c1db420

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc8f19d0923c1f2088c5c6088c0de7c1

    SHA1

    a474863d87a4802df5ab2dba9710f9da86cbcfb3

    SHA256

    c762d7cc82adfa8ea34f9faf63d6e8010d3297cefa2b417ccdb10e7d71eb5c19

    SHA512

    ea3624c76d2163f43c00009149e6bc7f14d5937e0d6f4ae2ac7767b6ba9678148c09858cd60325ee35e636943ddf473415beb96285a34fed43ee29a767ee6ea9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2b6a93ca83bd609e07c74832bd222cd1

    SHA1

    c4a00d658587f44b80f1479185eb2deb938f66be

    SHA256

    77aca435c92ada0292a6333d31dc5e8725717742b4532d35aad4f44a4f491045

    SHA512

    d28554b13d25ec55f9bacff7739b2728cab31e0e7818a5b89a913aa3cc364ef5b1a38053323ee3312d2cee69e0bf3d76993af268c40ac16013f7de9685fc5eec

  • C:\Users\Admin\AppData\Local\Temp\Cab170B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar17CA.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b