Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 13:23

General

  • Target

    c8e66697ca7e9ae1a5f5ec8916c1b3ee_JaffaCakes118.html

  • Size

    53KB

  • MD5

    c8e66697ca7e9ae1a5f5ec8916c1b3ee

  • SHA1

    c6d7d549cab8eacdef30629625a093ba6d16f4c1

  • SHA256

    58e063125886dd71a5d28a2d2819da6bf61659a1494f971e07648de56d2a9aee

  • SHA512

    a6cc44a5ca4fad883b1fe513b2dfa279a2cff63841d7319519dcd6e689486ffe11c72cd2d0b00b20ded48a8731eb2e992330bdce557ff4ee9cba192cd45e2758

  • SSDEEP

    1536:CkgUiIakTqGivi+PyUorunlY+63Nj+q5Vy0R0w2AzTICbb9ob/t9M/dNwIUTDmD5:CkgUiIakTqGivi+PyUorunlY+63Nj+qt

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c8e66697ca7e9ae1a5f5ec8916c1b3ee_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1512
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1512 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    291a91d927e342e5f70a8cd7c0bc5847

    SHA1

    17c02bfcc0b97d042435f72b9284cbe016b71218

    SHA256

    b8921ce0212bcd6e8752b4be740ba85b6dc3caa8ba9e411adff5617db37500df

    SHA512

    712c334984c1b96d02af59ce3a8d7df9635dca3f34e613d21171893368b41f105f04b5f1bf30dfff925a48b765513697891d1c0d9cf0d6a4a8e58232cc6048eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dffcc7fc4ba6bf608c362a9741d61e64

    SHA1

    9195def0cddeeca6869a3ff88417b26ed0c3bf50

    SHA256

    c8beb64b035c029a44bea0d0888ffe19f78f23445c76028ccf1510d8cd546a43

    SHA512

    6ccfb5f986e9115f00fbadbc24429d4e264ba748a623565e97afc341bb0fd8659fa598fa9a1d0345a5af8a750db1b23ce3e6cb9541f508b6383af2a113ce446c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    51e7cc85c2f242a15f573b781039194d

    SHA1

    c35f1ddacb5a8f4ec16cf5906de10c3d8071833a

    SHA256

    85ce40600e7e60b845613b6b6ce601c0a4ea1d75e64a3da1eb437ba7f9b0f685

    SHA512

    aea77cc508dfafc54852d31eb12afda022f8dfa049df88c1878d193688b7bdd6606f057a576f322800facf198ed3bd18d022d045cd9dfbf884252c245fb734fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b2623f5deb210d8371a1eddddbc2a391

    SHA1

    295e16a2126fb2b2db29ee51883b3d5f68fe5549

    SHA256

    752fe53b28a2b2e18be54d5cc6c598b78177ed0dcda0b20233cb77a362750255

    SHA512

    d0e2178d13bc3f61848bae27477054f2d7f7955064f2c76ca582fb12c58b645105153061c2cbd1ebbb74ab4270c3c0411a736ff604c4bc7a03e17bb65432acb3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1781c5d347a371e0316ad2d06526e131

    SHA1

    d0686b4b245791443186979a30457bc2254e90fb

    SHA256

    f65333fc51e5ef6b3063c013035b50fd1869fe97b8caf94e203f4fc516a5067d

    SHA512

    9f541ffa8e439051cd7b9a3f60d24a3de8d53554f3b9331ee1184a0a7d4eb25b1d327889609f244a2d083600746c5f8ea23c16753fae01a2ab6e348aa89471e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5c67d835aeba3c2ffbbcf7dc430604ae

    SHA1

    8434d1383f52589fdaf0bd9907ddea04470b790a

    SHA256

    193bf1f210ed1f00365019b0d37e5f2c6920e197edf7e4c72626769bcada1dda

    SHA512

    ffc02c9538ac61b24f95b51218e7dfe985967d80ae77e37059efb27a07f6605f02428e0983a12dbab15d51921f4398884c717babd0250ac3afae2afd14c59458

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    64037e46c26ef1649263263d84e1f444

    SHA1

    5a872b7af79bc5ee967223e6dfb9d10f15e7edbe

    SHA256

    83736dae5bfef2529e10f59ff1e17e5393616c235fcbecabb095e3a3a31fc62b

    SHA512

    66c935afdd3fc61f142b5fd01ac3d4c99ca2ad401a1db776e96df00d00a4c2e5508258b6ca96fd1d11f98d126fb3afbf5ac794ae34fe52dea1bb36f20d8142da

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    179d0e3335d5b052991c8d4be9858f50

    SHA1

    b6e5914f6704c6b3c07580a149e5c03e40b9b66b

    SHA256

    55a24d6f03d55982046c377d280521f701cafa5e233a0eded98efa448498b671

    SHA512

    ba46be20a487a55daf2f806c528eff9374027848e15f9dd77eccb3de40fadb642fda0c2d00b58c1e3e720ad460438283003936ef58dbfe145c56f9db8b65ad1c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    921198e51cbd3889bef176916c5dc47c

    SHA1

    847ee50586daa6f83e44dc9de1971ecaf5ae1433

    SHA256

    4152fd9a0ae251b7489374f5baa558d34fee00f5b06944bd7dce63578e300a58

    SHA512

    73808d2d49a38c9d50d292973989586c8a8ff5f420e75600673415c532ca361e51209e87c346d23e2f65a5ad96fd71b83473f4313fba0d5073f967ede5f7499e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WNZH54VQ\print[1].htm

    Filesize

    706B

    MD5

    67f3a5933c17b3ab044826d3927d0ba9

    SHA1

    5957076d09bacaa6db8ddc832b4fd87ed8f05f8a

    SHA256

    97e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64

    SHA512

    03ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e

  • C:\Users\Admin\AppData\Local\Temp\CabCE98.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarCF27.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b