Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    134s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 13:50

General

  • Target

    d2141ab71738c5fee9ab3117745e9262_JaffaCakes118.html

  • Size

    66KB

  • MD5

    d2141ab71738c5fee9ab3117745e9262

  • SHA1

    747dbaf4ddd8d6225cbb7ddf8320d6e42f4bd976

  • SHA256

    ea059162d8370f75ffa4723251d8aed0c10093610f2a45ad0367cd2fd184c58a

  • SHA512

    c97c386e0e110f7a3cd5fb306dfe6c615beff5e9c7e2b09a9f6db1f016c78715731bdbaa4bc9821d33f10d688a75f548188db95480f310d902791f7ebe0819e8

  • SSDEEP

    768:JiogcM0St8tN99OIs+mjleL/oTyVhCZkoTnMdtbBnfBgN8/oycc8QFVG8sP/IjkE:Js+qAgTegec0tbrgaCcFNnzAC

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d2141ab71738c5fee9ab3117745e9262_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2848
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2848 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d6f243afbff8cf7ffa26474e8ce1a8bc

    SHA1

    9f820f2afbe29ab6ff7c95354de4a0af2480eaf4

    SHA256

    7dafe055fa19c559360321ea10549a48e71689a5dad23d0b57ce0e243faee80e

    SHA512

    ab502b068f5ab531ce5e7e0e128df21392cbd75ada6a7bf1a9c1652a30235cca98067adb73591135348f459cbb8f8c361aa3880aa2d3f71fcaad97c006c0ca67

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    009b1452b5ca46266cb194e0d0dda872

    SHA1

    9ba7cd5450046a4ca423309bb1f86f2ceadcc485

    SHA256

    41c8e6f91c96e778450ebd8cffa05f175af5b39955dca1f75e960436c9eb5ba7

    SHA512

    dc92f427096863edf655c1d8f4263b79aae57582ffd7286d492ba8ac6a4df6eca18479ec795ab7bcc27ea0417ee06d3d9bd5b851295b5fbbf47021ef7ca91b64

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0183f4cbd615d9f9b715d687c8341fb1

    SHA1

    d528777d5dd7907d0deebd9d7246a7e0c51009a3

    SHA256

    7685b1114b557bbb1fe3bf6c424fd898d8665ff5c4278959b6534d048d2d94a2

    SHA512

    209131b512ba11dedae576857abde50729593a0d423c665612bfd61627c8794ad89ba6333a07d935b6d70620c6410c429a3a56cedc3e310b2ddc1ef7edd7a154

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c9510ba85ce2f92e6c9140bb2fed7344

    SHA1

    62dbac8402f691d7b0cd63ebc6ecb054e656e083

    SHA256

    3a1eb42af6dafd3511c7c9d8543c3a5a4fbb4b8607feeaf17ee8876d5057ea38

    SHA512

    e5596052e0d347f3aceb95cdbf80485be9737f3710fe8b056326a78a7691399b54309e75bf2d681f03a5afa5ffbb85e23a56844f798486988037b97025e57cc9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    33cae54a9626aaba3102f0ed0eb43e22

    SHA1

    341923306e660aabc0bf590db18a597466eea65b

    SHA256

    01f9954be64278be585d39dd5c17ce844e5cc232a6af006900afb73557a3a614

    SHA512

    abf821fde3da0dbfce3a2aaab98222974c6381924bac37b0f5f69cb92c52b0c17d6186d47dd3920ac45a11a46e66e67ae9e9c23c64e03f64cf2c7dd6cd6447fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4abc579bf1488766bb18c75fe208eefe

    SHA1

    29e7c4283bd67b507891939ceea238ff2472dc8f

    SHA256

    50e994f1d3b7c87a35e47511136ba1e1f8738005026c7458c6c899a071f3ade5

    SHA512

    10c41d5b13521b2ceef83fcb7b4a655fdc390969c7fbacedd7082d0d8f0eff73157b64938bce389421b22b6c7542cc1064a28f73804bd6310617f95978299811

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    30fb6385baa39df6be6bde76d371fd6a

    SHA1

    d8963c54c23b446e1579c4d8b452e12cf9ea3b4e

    SHA256

    a44e1af63b8753beea24828eba55901699490b42f446f9f568a59fe386bb2c2f

    SHA512

    8469145a155492988ea8f6654942e481fa46d478557f3d412ceb069a8dc0218e0886219090529c758e20836669d5c48c2b51475452ae8788d5f52c5356fa8071

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    61cd3bfd2b436b74b62ddbc8eaa7ece1

    SHA1

    5765509a0dab87f173fd82d36b20df3fbe5310d9

    SHA256

    50cdbf46a94df8965f8e101ff79b1653396db77b66efc6f7de12e83209cbef46

    SHA512

    3249f5d6b14732c3740b9ebdbe9588ea88b3dc1007f8f999b89716fcc0d189a0105d169bf81b6ba4c6200bf6552f62288be70d59b4e94b65946c1a4e0262d613

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6620400fc75c9c28890abca47f9f8bc7

    SHA1

    5bd2bc9eadb4def79d60b6210a84b44e7846a889

    SHA256

    0cf37ccb0c19f8bd6577190d3f287cd312e00c26f35cb599c16d897f710c889c

    SHA512

    3767dd10df95086b232b42a18d2d0c82075acf3158ae1d992f6ae976071259cd04cc34e74db2a33302d0893e7146dc143fe699c1fb62150f91f5abb6a09a26fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    046c0b7a2641f71cb3caf4ca18f21a59

    SHA1

    5c8e0db4f8f658c959069b5d6b94814bbd6d8c6c

    SHA256

    2d082032e5c50e713f75d0a0f60b71ba740f41646618feb0334773112e00649d

    SHA512

    a19e960e16153aacdcf578a3e035270f19b659b4055f627a3d6b056e5840fa313bfd9d0b42de5d0f44fd9c7098af406fb11561faf2c07b73eb27173308c38ded

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c58567753b0dfc74125111cc12378380

    SHA1

    594668977a06935df158689b8afd9c6ee2ddb77b

    SHA256

    7c9fa73adc182a879c561dfcea70983ae9fc9639bc3d187dcedf9e76275d9ba0

    SHA512

    5a121c280b75d9601e93649330c91109ccb7327684f96131bba07b849ce2c551be0c73abf55cf431859a139a5133ace03c8e9710d254961a58c9b05b7a91f06a

  • C:\Users\Admin\AppData\Local\Temp\Cab7EE1.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar7FA1.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b