Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 18:58

General

  • Target

    c96e394d280d654e02a0bd9712b3e3ec_JaffaCakes118.html

  • Size

    19KB

  • MD5

    c96e394d280d654e02a0bd9712b3e3ec

  • SHA1

    b397975e2b9b956e48abf6c358a42795e198fb49

  • SHA256

    7db4e5284f7ec223c5b0d73c64464c88bf586f98f3c097c899b9b3379b653011

  • SHA512

    5f10b04633628318eaffff73fa12f445bf60152a1e029a4baef6777a84ba1721ea589a65a0d83dc8a739be45596f6614aec3dffe0cf77f505392c90da479fcad

  • SSDEEP

    192:uwXsb5n7RnQjxn5Q/CnQieRNnTnQOkEnt2UnQTbnBnQmSgHMBxqnYnQ5QNnlnQVb:pQ/gqyqo

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c96e394d280d654e02a0bd9712b3e3ec_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2072
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    03e7184c60b4ac852662610db857f370

    SHA1

    a33ca6d7e3f76b26a545bd2404043624b0cb493a

    SHA256

    dd639a1ed2b868b2c3bc2d37697951ceea43fb9dd9e4156673f8fbfbd2ce7933

    SHA512

    4699e3d10a2cc5a401c7af7e43ba5154d6fb73bdee9d3b85156bab23f44adeb719cb728ab4193404ac590c248ef370fa02630605fcd1b9b7c531f837082519e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9a404198d6366926452820ee0348d642

    SHA1

    a11406da8ba387620beff8684c9c3d4dec0b9271

    SHA256

    fa52871abfa9b8e07616c3bcf5eecf0553d4d1698cd360cbf47f6d3ca458a0c1

    SHA512

    a67e5ca385c0dfc358d943b16c544c2f155c8c4fd78808d056426b37229997aefdd457651cb2b0237b396de3a0092283f168e7751b403894278aa32506ecb623

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b00366113cb1b5ae3daddcf49d2ef134

    SHA1

    89c9a04b9c6bf947b156735906023802232e81ed

    SHA256

    1e112db580af65b19175af7cbd861e4a4bda3389884e1e1fedd5b0f370af6d79

    SHA512

    acabb960f612ce7ae263a03a25f15d1321d51552a84a4f243758e12b2a1fe2032396fd838f8bea11f78679b5d11cc056c02aabb44359b729ba83604d9bb0051f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    243a8c86373fa48d573db340114a690c

    SHA1

    8b968991f108c24cdd4bb300b56d6d50e8e3ae55

    SHA256

    6bf3ee44fd29548cb9d17a45321e3e33218e935e9964e3433cbe7abac756eb21

    SHA512

    f909b01b5a02824ccfe034adab7f9823c909a2d1f72b360ed410eda174eaef0dd3e4e9232d8be4940950d9d684a31e1e600c9f69fe55c27d3e8fc327f2be9044

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2a51bbdc58361c5b46d0675793973976

    SHA1

    afa6a44285e538e0d5a04d697dbbf1a736842726

    SHA256

    ab8ccda93c7544bfeada63baef7ae3e16e5d41b653dc9f3f013a3a3cd81be684

    SHA512

    a47f275021be5374a9ef2ae3c86dc112a9f0251b395db4fa9181f623dd5856cf183f28cb6a6c1045b94f21aafcac75bcfe7acc9c9f94179eadd213a5a9b530be

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4298b0608d1985af8b0688eeba164927

    SHA1

    23d3442da7384b3755a9b5dd82a23a0b57ccfc51

    SHA256

    4338042e4ca08ce5670f79229145b98a944a3a91d2006914205c81cefebab2db

    SHA512

    34fcba8d1b25f5fdf3b164aa9f3cf84d24e529396d486e0988a28880c0f4a41fff8b15d1cac60fa53dfc29e22042ac3a7d1980173fff7307ca00c77b9f3667f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    edebb1ee60c2d418107cf116794d7218

    SHA1

    ee0b0d30217a9f49ba20abcd3c2a67e054f274f1

    SHA256

    ca9233575f5e6647c0da8ea1d29fcbe01dcff804e0db1c6837aa27cb6a5c880d

    SHA512

    b7d57d5267223be3a16c223d8ea71e16c2fccd32abc9229a00e521663bbcd328df54540fb2ec262cc3ce4ce4749f6516f0dd2fd7b7170a45d15db74af135b1ee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e9f9908b3a6de867b9175d3f286ab753

    SHA1

    132209bb312bfaa27b9f1c6e85b4ebb73f93fff2

    SHA256

    6f5084547e383f9b924136f093adaf0174eba6125c5d8f4f692d19c700d153b2

    SHA512

    af37e72f5d717547e5a10fd50830da643ed563062766befe253528a794072a89509d8a6de359349291c5911ce4282f9ade9f5d8982f1b7bbcad3f726849937fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5fa1d94048a73beee61e532a7512f928

    SHA1

    9446f74719b51a45316cc45e77b3d28b53661759

    SHA256

    0a75a4a5e24c367ebdf8ef1889fab0608dd19df0b2c5d918e061f4b45dba5a7c

    SHA512

    d20690d6c7c0f1bfa71ed3b919a6d174fd2f6ac20d453a7e2a2f77f0ec0ac40b06a4fe98a35ca1ddc9a4fdbc5977ff74472b1f961c91a32d59c3894b513d946d

  • C:\Users\Admin\AppData\Local\Temp\CabE12D.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE1DC.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b