Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 08:26

General

  • Target

    d3f12633100214dc978e0aa5b18a5d34_JaffaCakes118.html

  • Size

    139KB

  • MD5

    d3f12633100214dc978e0aa5b18a5d34

  • SHA1

    acdd90bee13c7ffc38ae291825c63386bdb78492

  • SHA256

    b9b58bb511316a1061bae154f94b0429691543d76e2e30a73a278e73ef727a50

  • SHA512

    706066242cece4c066a4147d0f3729898cb7f20c9806ad4e9d72b3b835d244139e0facf0792d1542d5714e73e9c6affeda6e7b5830bd7d428c21ae61dea256c4

  • SSDEEP

    1536:SQbM4B5AfOlmvyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:SQHD0HvyfkMY+BES09JXAnyrZalI+YQ

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d3f12633100214dc978e0aa5b18a5d34_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2060 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    53355341f2ec7ac61d88b7a20b2cced7

    SHA1

    ca95511009bb8ab58101893acd68567cdd05fbdd

    SHA256

    467fe1bd0db0b802c049bb69d5dea1c4f9a3372825c0bdf28b67b30df2dd7083

    SHA512

    39d1ababe5069f37598a4e872dbd50fa2df8cdbb7e25d885040d26450f92b45c438f20fb7516fa686d009aca6ec6c8c0627f47eb8d5a7cc8da1772e36da96e09

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1e638aa027af3108170817715515332a

    SHA1

    e1a2883730ca669688edf3a4a741cd1bd8fe150d

    SHA256

    bb97ed5aab42c97efc4023ebfc86e62d5a92fe89ac84aeb3c958c19d60692b5e

    SHA512

    2ddb2d1208fe72c8ee74cf25d6c614fb339ac00c6b16c7c80df3935d3cd0bbc01c75e501bf4a0a356af28f2cf57747b4ccff4afbdffaff2fbdea01c36b3febb9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eacf94562a52d5364c9f52a6556e8127

    SHA1

    973735e3d1137bcaa3486f347368df5490a2a775

    SHA256

    89d38caf3b2b75764f45b2f36ff15132ed89ed44755104c6278c4a56dd6a8d0e

    SHA512

    fbad04fdff015a260e14a4ac310a647a2f9541c236ce2408609e4e77e64a069c2d73a5ed32bccbbc90f05bc8c6b5cef9a78bde18ae4625e43efb127eecaa3ff3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c7088234570f391c18631c556511dc71

    SHA1

    0e7ba3359d9084b76868e757e326eac20b79ee12

    SHA256

    a0930942f154710e400ce308cbfdf8ffb79e0f3ac1603b856c9cf6bbe00d0696

    SHA512

    e4129bd744cd6f6e96bf70dfeaf64771602a73b604f40a09bbeee1fb5f82c3d4b500da884456da6d98842024ac4d5fa6cbd8148c772509eeefa0720fb1387559

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f7ebcb7d183813b9431aa770a882ecaf

    SHA1

    1850ce5f1e9db019d71e9da84550c3962606e176

    SHA256

    ef233d2901762a5ac42fb4251ce81941ad29475876bdadca30d66a17652107d9

    SHA512

    0a617a508f6145c048b6f2239e878c26375a56b0a6b6057411b71d532164d28a02be6e635558e61d4c9dfe903c89bb90565b11e9219d2cf697509ea0153e57c0

  • C:\Users\Admin\AppData\Local\Temp\CabF681.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarFDD4.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b