Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    06/09/2024, 10:29

General

  • Target

    cf567d15c44c9eef4d824997ab634feb_JaffaCakes118.html

  • Size

    27KB

  • MD5

    cf567d15c44c9eef4d824997ab634feb

  • SHA1

    8ed6f91a3e2531dcb2fb4129b7d64b0fb733ad61

  • SHA256

    397289a64c5bc07002052e688a4bfcddf52deaf252edae0015161ff2705fb175

  • SHA512

    d462aad57a8f61a8804ea6a5c398c07164b5d8a7544d70c968951e019689a5ec9023b771e8588b73dda426b05e3180d4705302ca7dd8752a808b87a7c7288d42

  • SSDEEP

    192:uwzEb5nBSnQjxn5Q/onQieLNnInQOkEntIqnQTbn1nQ9eD/m60vFfQl7MBrqnYn5:IQ/mOhsFeSBl

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cf567d15c44c9eef4d824997ab634feb_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2688
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2688 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a71739fbca4c71727d63ccb1d34e39bf

    SHA1

    6dd32e85ee49bf7d3f459321b1392947dcb2c86c

    SHA256

    6b6379ecc2aff4de19ca73d2aeb91915def27070b393d744c15d98c076c7e186

    SHA512

    c6b604a5ee2e259077592d178f645da9c324eff2a899c2645510f0b39f1a60d9fd9489b111922766e8e91095f9f6452cd4e7f73c41037a2977b201b5143bbc90

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    da6d705130ebf9db88e3fa62e0d3ae89

    SHA1

    2b3680d540c9c1f8650efff9682c6e2554c1de03

    SHA256

    537d4d38d9afe259a916dbc02dc3a52fceda3a7c3004bbd915cdee1b591ebba5

    SHA512

    254d32d019273579b148c6afc0e9df891aa9e05fecc7b8770ca8c95cf995e0f45ef20edc4d7388536f3656c8793f38d446bd83cf619c84b43c8ebd1772df6e32

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3329786b373b4366958bc42be467be50

    SHA1

    c20b925b70aa55f71cdda2da64677fa310c5034b

    SHA256

    2f9f99a47aa1dee6eec76bd75cdf34627a90a421c68e3b5c3e7880320b6e8da9

    SHA512

    bf0f5036b2639f10b0f1b7ad5809844b359e4eb125d34d4471e445799fc21ecdcff394d02d42e3ab89c0eff1b8c75c4ff45c902f004c92e43f6c6f5da0a62eea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b152095b9300eb8d967629ebf17760d6

    SHA1

    518d03a060530babb671b153ad08d54472cfb25b

    SHA256

    0e3cf0e6bfc12bf519d0ebc840d047c850da0636601a342f209315d64af5629b

    SHA512

    f0efeedcb843f523ca18a7b3481c077cb4dc9f250c9449c44ac2b68d987c9b00ae4b6f411b0db073480e89370b217c81ce905e706d2964887c327e3ce66bc3f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ac3d8a7778d9474b80cf611b1bf74a50

    SHA1

    c1bec90777ff34882539827aa04c82a4f7ca0fc1

    SHA256

    dd52c7ae1279fc1dde6cae8dca1e283267b2e54959a852c9784e342a98bc5248

    SHA512

    bfd245759dc8660b631003f501c07f6be2547c5e15ef28a2ac67173b4a021e57d6b1b1bfbafae200b16bb1a0dd0737871e69b2b1a64db3a7f06ef266aa12c7b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2dc6b2e6cc68fbf566a6b67c6b0048c4

    SHA1

    db5ab5a506cdb202e69df4dae279aa5f5bcf6c7d

    SHA256

    222c9541711006e0ceeb4abbdba350e3c4e5cd982048c17fad889d78d2884901

    SHA512

    1e3c08606159175b00d0fd1a837693e348f7788851cb1438d3c1320251e4befba238b940ddd1727a0a8aca5f65c74ccef5be456fd8c015d193fab237ffd87b67

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e4d0b85d90b2b118510263a44ad52749

    SHA1

    9bd708dc8f2204236261f6d52529eb3f7fa26bac

    SHA256

    5a0bc784d26ffc253d9991af9392636051f58c99a64875d986eb7e423e26e576

    SHA512

    c0c7a9572dffdd29a2dd011da81aad4e20a0d33992cbb2840452d62efe4535e7a0962f1f40d46d875c49dd614554eb7034fb798d6597a24ea4f78bc06492bcda

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5dd461b4a50ad292dd67ee2206e9e1b3

    SHA1

    91ef64b2ad3e38946ca6d15a227bd97e555cd781

    SHA256

    c320321efe95e15b59d658dc024b56c3cc9e6ba782529b934896b48cd2ac3823

    SHA512

    7843100d8c9a3ddda3b51e21c281bb97084283ea2d3e86b9a1253d72cfdd0012a1b32ee0d32f42a0e330d3d694fc0465fa2eaa1c398981ddd9a0292d87a1e7ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3af67058b8f0bc4099ca293ca4483ed8

    SHA1

    221fb21dbe10af974b8064f0d15aa6d7405cdae0

    SHA256

    c567872d3a9650ad959f0db321d502b13cd3aace8187503be280f5e2f81c44fc

    SHA512

    124847fc485ba2fc406c82fc8521e89c09688666179d67f411b1f4ae243bbe68dda3a09895175e8f3951c0e6633ee21faa51a4933d3b4ae9e62b57e7bf574649

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c275b68c61a7ffd4b2133fdafd299b3e

    SHA1

    3531abdc4cac3f2f80f7f05299f2e8b287ec079e

    SHA256

    8d6b42ba847c9b6be56ed14401f174d58eef8979168ca0b21ac70f2a24a13816

    SHA512

    fddb0e750086d8efd8065a1ef837f18e4778e72f1797ab2553ef0489a3e598bb3c73eea09cf4d4706e69fc6f1478fb61abd6bf139ac54f9bf205d6c38e91ff29

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    38f2782bf23352c0e8d4272fb01d9d44

    SHA1

    7d250d520a2ed0cecfa0a283281c0495a08a9685

    SHA256

    455335ae13f8d47caf2a9222aed7a67b50f4bd6088b900014997801605023cf8

    SHA512

    290e1bc7953da1aaa2ae63588c674f722be55dcde40acea58f94b2293f6a18fa619cb52abdad7c76c898f4c384302c5bb34311548f63065460b98608cb4087d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    348c25d452141d9e25f7fc39e5af16e7

    SHA1

    b602ac233f7dd3ce3a7212567662efe4edf66a6e

    SHA256

    6078fb9f53dcf5e8f2021172c3403395e6a957c6f7467a6a5b3667746780b825

    SHA512

    2fd0eb4cb32f09ab42c6a88c744d6716870ef9ba8c602ff8e20f8836e756adddf1ca64e20feac71a1263493dc5debcd0d4d40dddf6c5d9d318bfaa995f7a93a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d2f3d397e1b1560f03ee48f281815b78

    SHA1

    7416a2c924afe4125e67bc717943ee04590a5a9f

    SHA256

    1dc7b15ce8a8d45be276b22558e6a20a1c6d937f4eec169272ac8eea445f63b0

    SHA512

    0b5133146f35901b165e10bb83b91cf8ea12f594c6f2ec9b9f0038246e64672ec6ec869e037e085b51efefe414d50815d2c51f23e6c58b52582e253fd560a735

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    485b3e744909737b5e034bf0b77a8515

    SHA1

    4048664c065b13cf6c0773488597dec87e0c5d14

    SHA256

    be67e587ded174669540b624b5f49d07bb53f485a7819229d48a913c5db697dd

    SHA512

    b6bf8eb7e63f97a9dc8e58033f5dc462391953d9807a0d3da797633fa77bc1dac08fdb9ef925fbd8cc7f35da1ceab7cb230cefce80bb1aa6a70a2ab5ee16c620

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4963bf4e17b897d0dc825f27c9f16266

    SHA1

    9f0c94843e1390ff7789178d26c70f3a53092725

    SHA256

    cd8f9f957b35109397845070b19c35201f7ded529a9bd92cf9c318cd15284b87

    SHA512

    67193ea8d8394db99ec530b70c5f72a35d245306310245b3dc879c68bfdcec73e4ecb0622d47dc9dac4f6ea40e2f4662aa4a4ab0c9c6fee3e8a7294ed705f3a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    215c09d0964eb4b740aefa6dea371ca1

    SHA1

    f2ccee64faa405e2930b667c78ac6b91fa8cc770

    SHA256

    7d9cf9117fb0c92ca57fb243e2d7a4f8fe9ef9cd57a5a3ba99391c89f54a2fb9

    SHA512

    9783e9249fc40f6fdb479c9f4bc48f0fc73a7b5655cbf9b9bf4d41f86f202c8606dc7bd50e82e76400aa813d0a53468f121fc5344da3a47034644b448f2b0dc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d166327d383b1996c71e959e2adeff9e

    SHA1

    f9df2a9f5120752d61d3b6a73475077081724b45

    SHA256

    3c9b4593b8ebffa80e6d31575401836e4db739cdd79c8fd565d17f97dae887df

    SHA512

    523bc51b63fd95b6d08c8f5b44cc01d52d999118cf56be771eb0b26973c88da5d33cb4808dae0e79a4b477e40d601300b2ea2b3d932b1850097a9ba6115690cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2d97568f4c53b16f7064cf055a33b5bf

    SHA1

    0843381a86f9e147752ef49c34d0bc6fa064125e

    SHA256

    1399b2cb9fe1ade049c57e3c341f402093749dad0c24f783e543907cd7485ebc

    SHA512

    b00db966a6eec24d3adc086dad11010a64027f28a1fac62581520ff6bc0d3022ce512d03cc1f9573f2e04da642f68691d034cb8c7039bfa72f244f4e6d9e0dd4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5f258097567a591dc08a803a80ed5930

    SHA1

    f0e95cff86ffde9492c5882f47d19a6b17fa2811

    SHA256

    b56cee9e8bb9c01420832cc51d6079516074420a0a3fc1c46f3fe3ceb44aaa70

    SHA512

    807652d1badb9cb9fe544341a6552b593fe1c344dde1566078381a94e87ec636d9e6315eaae0be497614cb4c942b4bd062cdd33c8dbc80f5f89dc32207634bce

  • C:\Users\Admin\AppData\Local\Temp\CabD78D.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD83C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b