Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 07:59

General

  • Target

    d172135ff9925239cd6df90e2ad88e95_JaffaCakes118.html

  • Size

    5KB

  • MD5

    d172135ff9925239cd6df90e2ad88e95

  • SHA1

    f451e3cf6d7507c5ea3285b264c9aca8257d368d

  • SHA256

    fe5da5eaa8b9950f52f148925af0b3f72fb7e894ca2f5ed1385f086a5be2b26e

  • SHA512

    91246a0cbcabcc807d725f2c14c3561758ef634759c115b9fa05df64e92c04be434b266d72afe2cc896fe41a3bbe1bf2f2f148c3034c92a85042fe9fa4d06875

  • SSDEEP

    96:Y43nJkBc0CmWMahUxwTUfOR50sB/0STxjTapJNlSCoys0sjsrr00sExk6qItv1xq:T5kBEmWM2a3mR5t1vNHs84k6rxq

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d172135ff9925239cd6df90e2ad88e95_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2416 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    991dc7057322c67bb6bba8934aafa22a

    SHA1

    998c443e66abf1c127f19e16a0afd673be74c21e

    SHA256

    7eca56a1fec3a9748955adca4083603cd7ad5f78b8ddcbccbe67fb03fdc95746

    SHA512

    07d2b40c3f8562cae845cf207ebfcebf3b9b31a1975a9a4386ad8122435d342611cb76c2adffb226baa977f72a4c1d24d8211e596fee462d32bbe68666b65fa3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    05325d7bc6d2c19ff5a3130d4ba4c773

    SHA1

    62ac0f46c98bf38fe6ef948b7592fe6e1aa157e5

    SHA256

    ebf7314d2b978d76375a0db766bee3d2f01a1af3868e4d5ed18fee0f9f87442e

    SHA512

    8b7957cfa196d914d6a837afc965fdafe0120e9747c89ba615976a8cfc1a03d5a8b2ce6de4f378098cc4f842c46d6fa5bf8156b0b1fdd40d9f80cd76e21e4acf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    048bc9e6fd219547179219e097c7f141

    SHA1

    0b6c68f48e06e805e05cac5a0134bc9a2b1c3558

    SHA256

    dfc1af538ff68280c91a701a5c356b35200f2fdf8bfb53748017f374fc4eafdd

    SHA512

    a450d041d42a7422b6581dc309501a20c28d655a2bc78fe5289b675b7dc765a680b5e48397926129bac61621d0d71b98eb7f6a3d1210d9f476dca679adc3ff95

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    62028ba0ac562d4ac97e1532532aec1d

    SHA1

    7ef6a248430c7c1651774fc9f2cad01badc6fc07

    SHA256

    3afd5f13a927bedcedf2079eb2ed05c1b4fb1315f42b393a38cec2b728fbf27b

    SHA512

    6bb18e9b21b0df299cebe0eb3b2594858e8373cc7aca7cfbd1243e041962089dd8b2d7bed9aca8f68795819fc552a3205e0cc4ed04f3c3c1353f2dfb8b84e3ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    930f437a3586382bb6b6d087ed522ae5

    SHA1

    2131343aa1370a6d5c10c3d8552add67c6708794

    SHA256

    e6d1d63ef54e99d9282573ee820a2d3c2ca2e1b732fe22529110b930db2d540a

    SHA512

    1cd63619600f4a0656ca5558cde8a67fa166e37f42e8ac338ac1a5d5abb330a4c7c233167a4f1f30f03313e51f4469364eecc7e1eefd8d7d0bbb99c1d9802fe0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a74f8a64fcf79de8db970ff1fa23f6c6

    SHA1

    c2b67980102e038d48304405c32bd6a869bfa250

    SHA256

    5b167ba8b9f18a24ad3d05b8a166e95714ac888f533e049ac8ef967281abe8ce

    SHA512

    743a0a4d88b5554370dde91c8801f13a0a5c4acbdeb6d0d04eb5a08cd08fcfef92c0e9c072ab6c3132625270381d0ebac752ab478ff5903cd3c70baa3fe77bf1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    59d3a255cde0c53ab4c3194ad7408f67

    SHA1

    234efab5813a1e2ad1a98288f942d77e23cce3a3

    SHA256

    f17ccf5d68e31de6c820ffb6a437505f3d7450caf74846a6405b11109538ca21

    SHA512

    99b66011f118cc2cc3de9f4414d88e316709240acc8123e605069b04416522c45d647a0c1f223ee0c2519294c4f117cc8097f1c41d1ab2d9ca5fc6df7a3836df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8f1508d7ded7a576496bc49cf8a00bad

    SHA1

    9030bc374839fb526999b680a027fc307384cd0a

    SHA256

    755e588aa36c669a5a21f1c17dfa64406a5c89cca409db66e9b4db59a814824f

    SHA512

    3e4b4d2806bc1688e57fa68f5efa1d23d5dffaf11eda417f14e47649722bbf351a32c8d4f16bdb450159a6b8aba476e50bf1b34dbe05eb461eaa75b689a0391d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7733f92ba6387036494cd05829264f7d

    SHA1

    68b99837211187100e7c1ad9a230b9fed11908ea

    SHA256

    f61ec4a60bb5be85d13262258d54f7fa13ecfe7c366ba33f25a11296b5034587

    SHA512

    da38e1e6a7f17f5b9f15aae48356e3c8f547a5e9a47fe12e0bfdf217077aa06abcfc5e03de4f32d6ea01076d8a49e00a96006d6df430b088c66c56f0aa174158

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    39136df4cd4c940c0e83403748c97632

    SHA1

    6f1bae5d5ccbe0311b6765dc1fd61b026debae7f

    SHA256

    1f4ae6bfba52c3d035c772b6769ada673e0c465156a2f6cc2441e275def64a7f

    SHA512

    817de4cfbc85630c11d7836f78cac8c441d0655d70c4f13aeb3c16b32c34816a6094501d6d85d54f152c45c2831ab0ea46249e162982953ccd0f43fd5eeee120

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    60124bf6de68eb76e66a827801b3d112

    SHA1

    73a72ce2ab18cbde2319c2216cce227e41c7e03c

    SHA256

    df798b9b54b2f875828badc939318db433bbb9c32f5a732d0274721b32945191

    SHA512

    8ee457806db331a2a6666bc401d08ecbec939768807ee8e06f8846d69cf847a0e2b26928e4d74c4da20f9154bbaa8dcdd312ffe11590c15ff01ac00a9d9b4bb1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b7b4a949b2da4371159e555911f0be1f

    SHA1

    241215d7d2084d2316f70b52500791e148a93741

    SHA256

    341badfa5378430d3c2cbfa1767cb5b743742ab19953d7d40cbce2e30810283b

    SHA512

    9897a5dbd0f48217dfa8e7c5668d67d5a7e9dba049128808cdc9adc73e3c5c38d1e2e4ca033ecb5bb99f12d913472ca5f3a0bb08c5f986c9d2604c9e9b48f681

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7fe5f738f852ec43490701d55204e9bc

    SHA1

    0da8208e9ac6fccfdacef85f96fda895fa5e1b45

    SHA256

    9343323d1cc2253e1d44efcb58ecbe177eb92f37727b958fe3f8a8ab8230fb88

    SHA512

    40a19b4b968077d2b42111b78eff162910cb16a7357e028e7acc837e1ac622eba19965d6326cae102886ef0b5a3d672de9a992a87bd2290c6bf956cb0549e817

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3da697461fff0f54e37990f466f955db

    SHA1

    f90ab9633e7ae1804e3ff725354f773f7ebadef8

    SHA256

    1df40814cc54a7a54fe1081dbe74957fe7714b38f66c009ba7fae75d42e57b30

    SHA512

    ddcc385631ab6b5887e49b4cdf18b6bd37ec5f00f1eb788ac1fab9be2537ff8832c310c0c0d698933dfe5ea02ef132ab1ff8e30adebb762b7834ab76cddcd572

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fa66b8604fbb6624d2c6b136fcf2e549

    SHA1

    73ba522b9c7060be71b8250742f266da6def6caa

    SHA256

    e0b91949079710052165722c27d0e81101e63aaa282f98a7f29781b70753cfeb

    SHA512

    052b6982812600c04b6013533f64898796998af075f34c78fa0f0bb0c4e0d5a968882436d5371a8a0a6e6ec198752e5818c9f023360cc8df276514f4efa61802

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d54f19f1c322971b222e861e5e5d6692

    SHA1

    2dd309803707567641a565da4cfcffe171cc1b89

    SHA256

    517bc403110e3ab0f092944dd9ba268a5f67df61ab06f33f9a7daf6f287cc514

    SHA512

    bc48ff4d99bab2de419c3ffcb8eecfe2c71dba89a8230ca7e5308417f593ac6c9a2ed4a67d56f119bf9322bad40b933063c9b0ea1c922a3e7261e024642dd8eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5c7079697461984e67c77a3ddaf0f591

    SHA1

    e8628739321acb5ddafa1ab868dd1c43a9b76642

    SHA256

    7c9c12d51645e4bb673b2be6b698e10b3602c0f05ddab98254bf426286cbf04d

    SHA512

    a4ee06c03bf15ae984391ba6de0ced7c03aeb4e9b53b508a7137848823d1ed013f77c12ae08d794e36d2973a559df27a447277916514cd8c9aea0bfa1a218f79

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    811abfbaef75efd2d3e985966fa8fb36

    SHA1

    c8a91802d1feb6d4e401804958ad758e704983b8

    SHA256

    f6c811a10aa88cd8cba37574ee561ef6f74963552deaf5d945ddaed47e653418

    SHA512

    f9ad054cd08179743a2dcb4a6e038075924bd06a6d89b073dd92b09fdd2841b42f1d19b5c86c68d21a6d13d547dce8f2d1623bd9c444015e5e76bf07f5893cd4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ab28102d33af76a3b44cb181f1d9101f

    SHA1

    8b9a7e8e54dc49af7d385ccdf140cfdce05b9b3d

    SHA256

    83451fbc0ef391fa1efc9ca378a8ee6f74c68674420d4d5a16b6e64df202eaae

    SHA512

    ce8c2df0229811c01c031f906de86f85738746de577643dfae63509083e34f1fa25c780e3b872c0ebd8e3143742f11a8056af42c132969e9e4b3adedc6a307ff

  • C:\Users\Admin\AppData\Local\Temp\CabE580.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE9E8.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b