Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    138s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/09/2024, 23:52

General

  • Target

    d74b72924b85b52c1cf39473f335b995_JaffaCakes118.html

  • Size

    37KB

  • MD5

    d74b72924b85b52c1cf39473f335b995

  • SHA1

    1b3bd66b1c636a5b8858ca0ae44b4311b2e04b47

  • SHA256

    6aca9a216f59e07f49e5d34ccf15593e3cc344e9a45d4fe7da1d75cd51da56ce

  • SHA512

    734ae7e5eba66d35e15af2debd0f50db51b97303ab18106d68e65497478d26523c87be2b841b2b524de9b6befa770bc9207fb7b2853c9a88589d996e6ca599fe

  • SSDEEP

    384:TjvHwduTvmBxnx7RL23mcVXWV+PzCsBSGXNEu0:TjquTv2nxVLkVxWIVB/XNEB

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d74b72924b85b52c1cf39473f335b995_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2756
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2756 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7554780d6ad94e3651a5da45d52f15de

    SHA1

    0a691a0240b0525798f44a27f31289f10cdfec67

    SHA256

    6aabd397526d03f438dd593778aed92936ced88047b17fac5e04c2920300b3d1

    SHA512

    e37c9f13b1d567fac7a3ec93390700e9f32234f2d24b6995c5f72ff1eed2dbecdf4e9fb002fb3639847c3af71dca1784d0cc6c22e8a0bfd2e4ca05850108d359

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1c774a3c3f6c1ecfc25d8236133cd8a9

    SHA1

    c326530fdad2c2c975b327d372b395d4cbd8ad2d

    SHA256

    1f643faa551e45d81d45b57caf228d2c6c89ccf7de36cc9c1e1451abf8f1697e

    SHA512

    001e12d6bb17e276844615a090240bcb3c33dfc92364b8d0bce03e90ea36f7b56f16a6ec5ac80868704550f296a6c978226ae59bcc60dfd688b8630348c4b376

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ee008634938e77a3155cf280ec9afc93

    SHA1

    7b4eea6904325fca3491569ef9abc4a1413d8cac

    SHA256

    2ca89a74d40a4e9eb867480146f15201df65b659aa4af2d1a98069e7714e141c

    SHA512

    4707ca86be07bea6d9e138ac8aed35656139944e6ac952ba23966145a7f97023f44b368b16a9eed34b0ecb795512ba305c174084c8a65c66635d4aad689531f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7dd6c0b2dbad6795625ddbae49f451af

    SHA1

    a4ff0fd4060ee94dcaa289c26198c17446d8294d

    SHA256

    4a8ef9b383c8feb9909a0647d6eb98307c691ed2deff0db70c7732e8d5671466

    SHA512

    26dc8347f39923d375a103e8bec5dee5f100d01ee293376033abb911ae151e17d3e21006697e4ef9a47ecdad2da0b85e4887e6d6608f2f9ed18486cc7375bf1c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    690e121c95c89efe6a50423f104ac369

    SHA1

    4ab89b1f7379a25812f865c0baa8aad993e67019

    SHA256

    c4e040fe5c35d4d463edd49b3817798e91045a053b11b42b58420f8de7accbab

    SHA512

    17da67749ccdf37fcc2c6ad4599b2c6828991d01c0cb8ee77be338e1205c30452f48776f07b7e84c2c041de1188695003c6f8659902cff799dc39974dbfb93e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b36d23755e2439bbf092a41590c1839a

    SHA1

    7707dcf29f325ebc832887c828464af232c294e2

    SHA256

    369a49b4e1fb9b1447ee3e492bbcd41a296ceb1a4439608cb6c71c9b26d4b19f

    SHA512

    a9fd4fbec4252b5581f038b0745f5c5a40c735c66b617310ab43cc4826cfa1e6d34d013eb80805e9b1457daf8efbc6c0044cccc7c33502699048467a94e68cd8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    56d7cb4cf781ec9ecdc7672c26a1ba7d

    SHA1

    ef3e19693db3c6597e6c54ab90bee5972d171e53

    SHA256

    6c923e852cee00c9f667d9b554c3d8eb05770b9d4d43360d9bef919f6d9ef795

    SHA512

    094eaa1fd64799bcee6fbffc3a819b2853e2fc1804508a6307df6819ab4e3f86cc4222b9084e929a72f8be6816a339968b2026dd5ad7016c013ee36de1c6bdf2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5df4c7da99094e14e5580ad9e60974f5

    SHA1

    36cce4bc1a1899601ff37125a98d16c66fd70ae9

    SHA256

    84d616b045a6d281237816c18a7f9709547fa4139ad252d947329305984e9d9b

    SHA512

    a5b462257ea91f93ef3ffc060ea5bcde787a6f3426e34aee0bf8719dde2300bf530baa8cb0bdb19ae9c75160b2bea12b297bb4d273d3018b4c57475ad337f3b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dfb9b8acb577886a18507e3a02b40f7c

    SHA1

    25643588fd69c07e4eb8ad2226d4cd7dd3454330

    SHA256

    1a4a67962dcc17073bab4c25030977a9b503ef3d20b89e63035f5344c443f769

    SHA512

    714bec66e4a2704c78062a1616dab6b22c5e4662b2874115f6d10d576fc68dbb9e35a9e818e761d6678ee4399c2ade00324da78432ecc5ed76f9794601588b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    048796cbcf2b0a1309680c93523485b9

    SHA1

    cc02a7f791e2ce6ee837344d15bce090b4f83577

    SHA256

    b08098ae65aa919b85d21750301e4a8e0aa922b7ee17f210159a1a9c8113bf05

    SHA512

    bfe5517d29fba2b0aecc3891cb2901549c8896b3fb1ce880692ac82f5031b01ea8a8c2929506485835d2c761c21b73c44003974ae6496de0e1823cd84991c621

  • C:\Users\Admin\AppData\Local\Temp\CabFD93.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarFDA5.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b