Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26/08/2024, 00:05

General

  • Target

    c1de9e27ffc1da21c3e0721ab6d5ce57_JaffaCakes118.html

  • Size

    139KB

  • MD5

    c1de9e27ffc1da21c3e0721ab6d5ce57

  • SHA1

    2fb9e858ba9f7e5463dd68bb7cb88699d9b3ad69

  • SHA256

    8cb4e8bdbb1c1ce287f1f5cc082b015029ac738845de7806bc809eb196a0ce4c

  • SHA512

    89d9365f1fa6d7687f464f73f2c40ac8d234800fe7236d6101bc7b13a0c0121d6e823ad43d229d1ffab22a44de04dec827e8461d2d04b8160be0ac4a7e3da966

  • SSDEEP

    1536:SUVqqVmFlyyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTs:SU4gm6yfkMY+BES09JXAnyrZalI+YQ

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c1de9e27ffc1da21c3e0721ab6d5ce57_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1980 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c36dbf7d803cf248611013e8f8ed06bf

    SHA1

    3085a69702b0dc2df0a0ada70d77d9240492b1f8

    SHA256

    e3dd491ce0a5814f5ddff825b2dfd11dd4e39f2125d570128d6f10e611aaceee

    SHA512

    026999c6130d8b0e728dc2db4103ec74d74a03de06d556444523b84822170bc732cd6d1dd0c410570c1f2a8780451494a8af9282da37adaaa6346a79206eb1eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    06dafe8769bc738ebd916b7872944178

    SHA1

    3e95215d4172d690eb6f869609e82abe4b38b55d

    SHA256

    b4ef38e9dd381314e4d0b7a4aedac0691a791d400e17c8955ab9cff255d7879c

    SHA512

    dbf9fd56ec491f8d8e34271ace787e88c91f2773dcdfbae5b131166363ba7d1368b23f6d96c0c66f5463307c60d8b9bb909da02b0d0fc63b39a4a71e79525dda

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c40131282cd4001d54ab563da6e15534

    SHA1

    737ead5e0ffc41b69dd1529742d0589c2a07d382

    SHA256

    4ec4d53541fb95557557e447bb6933a568e6b5c5f83d31869c878d0e44a2a42a

    SHA512

    d37dd859be0d3dfe4d5966959ae9516dfd8ead63b21af24c87e0c7a39d0ab1c96aa7538d83c8b36a03fd96c53b2339b9c0125a67010935708b383fb16ab246d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7e86905563d0c07bcbca0ed3268021e7

    SHA1

    762568585de32994ad5db495298813c78f449098

    SHA256

    267d019aed51e02e51af736ec5abe4e69bb33ba4b1a00617660eb4224fcd42c4

    SHA512

    895564d54466ea943ee767535efe9e51acd2775434ffdffa1d978a5481af66c1f23fc990adaab6e21ec5c2b53162a565bffd88e24547799fadba607c419cd07e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2ebcc3869a7e84e1f24da5f373a776d0

    SHA1

    ed3ee2810cebf3e9be57bbfd9440fd2e68f9f848

    SHA256

    4b1f6b5528a9eb6c2500a4176167cb916f6b330829dbdd9d53774d5a190d32d6

    SHA512

    5929a63c4715174a20f75aaa39d2b13eed49251ece2db1bf312311e726e310ff4b1ec07c7fb7616eadf3eb9506297e2d5cf4f5434f13a950dc32cf613e938ba1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7655e30dda0e2a04608e8e3193cd2ac6

    SHA1

    7b7ddf1011174e92805644ce034c66767d382bfd

    SHA256

    5be223f10840ea91fa3bc81a187939df1258c33cbd78bbdc17b19c536bc7d4b9

    SHA512

    4c1920a2b52d88c3f0973c2a81d976b46e54e187eb34cd9a09b8d41da0982fd24f5668efbc5e521e25747571deca3f869139b1700de0662796e7be3518349a2a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5cadde1891ae68bf370f1f346855f4eb

    SHA1

    bc156360e7191305bfac5ae128f626523c0465ac

    SHA256

    31bd003015fd18bfcaf776e2d7dee7fbee51954a3892e9a6adde0d586f2c149f

    SHA512

    3ab99791b2df4549969569d1c9e96d022669fff28a3b089aa4bd011b0d366e7bfaa39bed0583015e78e2a406427eeabfdbf5880345ec81f3c74e670f576addde

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a092836ead99fb34b15996478e70fec3

    SHA1

    637e361d27bfa9700cc462e96614a9e3f9b9d6b0

    SHA256

    024d851069603af1e27dea9e17c9cb0a642b009fd7ee642f0cd4542601514cb7

    SHA512

    927c8736fec7c261b6e9aa3b5b096de3f47df965f1344af95a9ecd6c5c5c93ba98161a2ebc8bf05050c4ca58c662d79556e0c1eb5a0547d03d84b6b00ceddb50

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b5bb5c45fccc97816e6801d4d2e4f048

    SHA1

    e42c4ad74e6c793079d065466250ccf610c11d32

    SHA256

    2f5f74b270c47ab68efe52b4a94cca3fa8907327ba704c11285fa7c3af57a1af

    SHA512

    c263f649df3d90767395fe97592ca122ce1a3a49bd42fc18b4b10e4781bbef7dffac0e745fecd8f3acc916631b7d641f8326c6cc17e41fb0b3145b4f1a585f9f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b51858859224401bc98fa55426d3f732

    SHA1

    4a84f0003e376e2f4bb97d23c71c6933036c1e33

    SHA256

    6d3766fa425ed834806bca228d6d92cf963bdd9da697389b4ee620f71943099f

    SHA512

    1d859955b3f5eefa990f97a001c7696161045c0cff3c1417a51e9de4e292856ef69556ba9bb55f9828a5f2368f9d17e2c82efa4fef14cd8151b6396791d06ff2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ffa7901e5e0979a16c4fedab957bfe07

    SHA1

    54a6c7b10217f00ae9ab71c5f4ac4b8241c31cf1

    SHA256

    58980e03d408b0aafae98b5424a59c7cb51be0437df59b5bc49c06410b092e67

    SHA512

    fd2d5aab12c57d268484a0b2104c2c7e3a3ec59dd128c4bab50ff82260e5dc6bbccee1d5b4b23787d21eff756d4abf486bb5ce23cae2d374c081a100e31a8b70

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eb691b5b205b97af77a3d6ef0f291c43

    SHA1

    16783746eb0274db25e78d284c939eae4a1656d3

    SHA256

    f3265f05886ae4bf786293ecaab70a4f3153398ad72f53ecb7583ab48e7cff20

    SHA512

    501fd86b841e7ab2e06c8317294d364161b795ee3c8385b753f3da92c20fcb229252c73d9ced488bbf3920c91c080719f8e73d40926efdbc58a530bb4f5967a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6bf0fc3668dbcc71cb29679ec45088b2

    SHA1

    b7e736316fc1f4460fe700e62d71e80c7314ddac

    SHA256

    43f4523118b50847b87c667038888b6f9845e694f4454a0b5a16814b50b9d0bf

    SHA512

    369bafe71204a65882871530102c06bae52b2f1f1037bc92259ac5c8abefc78c1d073abac7a4749ea74534bf486ff58dd6bf21f2381c5bd988123be214d901d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    217442d7ab323ff5c6f4d9a9fb38ff11

    SHA1

    be1ee03b4530e95b4174bd1d6301904bf42d7ffc

    SHA256

    fa1abd39f8e69c1db19df51a0ede0bbd8ac622842634d4cbe481353d50a220d3

    SHA512

    c58837b8e988770c3cc7d6d2e554e5e8a3fcedb387bfcd27608662d271ce7b9b1fbbba345bea3764c0eea6e7f860c91a8a0ac4f9fe4c29226362b6f8caf12b95

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6d03fc7f2225d8972d1f129fbaf9c0e1

    SHA1

    3304094c06cf2ba0449adcbc3f8128d6a6873b95

    SHA256

    9d4c8b2080c794e83eb6bfea5bbdb65562ab132ae9f8cb775911721f519f8f14

    SHA512

    7e19e6f2c1a4af391dd62e89b8f4879e15fb9815ae0b24c08d628275660f158e7bcfeca282a3c91c2337dc5006157912fb83893b4aa2602018911cafa208be9f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ec18c50af91a7227f0b0ef44efe9bcfa

    SHA1

    3911194eaecf5bc74b50dd72fe96630c87dd52fd

    SHA256

    26d296a5ee85f5eeb61d6d1f8b92fb91f5d371958e3ac5fbdc2d6fb8e582cf18

    SHA512

    cdd2e17be4d1a93fb9b4c05c775a325df465e418b46f5a87eb1a27b9bd0688d3fd5e8e42bf05273aec372d6d5a833c11582d4a54d8698cf397bbe416e180ab3a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    764b782e80e0a6e89cca2762d8736c96

    SHA1

    4483e31a1d752e8e51b9ad3aedf56b65adc0ee32

    SHA256

    bfd92e89fc98f3ad63b56fa1b0715e874211a6a5f9b6497f6862b6184857383f

    SHA512

    37a7b562fb2ebb9f6d1e62383d5297303280f4f59fe55ec2e62f1a8259e793246776a0088667569315c3b6668421250d2bcb8a98b17df8dc1a51cbc13cf12472

  • C:\Users\Admin\AppData\Local\Temp\Cab7C42.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar7D12.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b