Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/09/2024, 12:23

General

  • Target

    d64dd89be84c7d363dfadab285b3ecec_JaffaCakes118.html

  • Size

    211KB

  • MD5

    d64dd89be84c7d363dfadab285b3ecec

  • SHA1

    b2aa0bd422376c92ae8d9b2aa3bddd5ca826ff3a

  • SHA256

    1869e363cc991ea8d6f2d1b2e21507d2a8fca1f9b62197c3e0f57ee95a18d425

  • SHA512

    5360f2efb4b1fc5e660e61ba984e3c0891aade7f77d2c01e576e110e4548c02e9396f3b548b085c87273a8e320b24cefd28358f299fbe7821a0da4770bdb2b61

  • SSDEEP

    6144:QXmZcIIIB3G4k5QhL8atVBdiVQ5MIsuQyf5bTM+MdBXpKgXpgx4t4UO9mge/bE6j:zcD23G4k5QhL8at5iwMIsuQyf5bTM+MD

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d64dd89be84c7d363dfadab285b3ecec_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2784
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2212

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

    Filesize

    854B

    MD5

    e935bc5762068caf3e24a2683b1b8a88

    SHA1

    82b70eb774c0756837fe8d7acbfeec05ecbf5463

    SHA256

    a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d

    SHA512

    bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    3ceb605081f4c9ffdcc10a296f996b36

    SHA1

    62f4408689b27a74fb4b32edb1033ec48d57985a

    SHA256

    ec66d68b54b823a2ce067f4105e6a8cbd8435b04c9441b840b27d449cf742df7

    SHA512

    afc71786ad9c5921fe022e72b32c35b2b70eaad827b54f9425242a84603c82271d70fa7078a586fd5fad3e72e59d2c9aafdfa8fb24fe42ff98288d247980f32a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDE8B1B7E253A9758EC380BD648952AF_5F8ABD199E1CF2EB9B30F8FD50D3DB0D

    Filesize

    472B

    MD5

    ba269766b2e838209dfb858760c11b78

    SHA1

    b526f16fb5dc650eb9e09f8fc324ddc798e5b2a6

    SHA256

    ef59a592491d5444b6bbccc4fe4ea1fc5aad8df00c4aaa75b1fe29e567f53041

    SHA512

    c8b295da60049db7c734036e63a0d23d790fd4dcf8e6992524039bad9afbd939c0c1c17c196eed882eac81cf23df2c0f5879da382c4f2ddc7d01b9890e607954

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDE8B1B7E253A9758EC380BD648952AF_F968CA97A68F4E6D5C104EC7FE3DFDEA

    Filesize

    471B

    MD5

    83e036e23558cb28f9260870a40f8cd4

    SHA1

    6d4d1ee3232ae15ba9b8b82bfc54866bb3ccd73d

    SHA256

    a0049ca89063fe23a2c46e2a9cef240238c399ed4cde42c19f8e4729b5130f2f

    SHA512

    b363bcd1f2c77466760f04b8f488eed97304065f196b32a137c86790996e9b8d0817126b068d09e15a9f22413228a39f398a14375ee8cc421e967f99c1bd2428

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

    Filesize

    170B

    MD5

    aa1ef4a6f00ecb825d6930ccd03a9d2a

    SHA1

    ff1db4a56dffbc327b3b498197172b568921bb22

    SHA256

    8b879ed774c66c3d4130c8ec99d24c7e9bac874b08adb1fbd5985bbfc98cd944

    SHA512

    914693a9a8535aff425fff0fa15cdff80235f4f17b202ac82478d019524ded581c638ad621070499df3b179c900e50a6fc35d159aaae03509bd7557017299bd7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

    Filesize

    170B

    MD5

    db3ddccb3cbb8a8bc5cc7704db4d8674

    SHA1

    7859826e165bfaac2ea1ee68b11bf7f9eb3481db

    SHA256

    908215f57e4a668f006d5deef6320b557a509492ba60308d21bfd24f7e852946

    SHA512

    1be2d67be2f9fe8e9bca00140b7e38f18093bf9a1c0e5fe2c7bfc9f8906239cf0f6a5ee6bbedadac7754b55876e9d9266f838a2c8ab8b32db9abc207075f8c92

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    ddd69856ff6eef4e724b95dddc7477d8

    SHA1

    037f7eba24f51ed4ba67ae2941dbf6e4babbb154

    SHA256

    a2f3853b350e22c8e25e0de5e6775612889e94283f8a00595aa502e6ab570446

    SHA512

    793e12290ed7f458bbff6fe6fab9fdf0cd134d0108187296a5069d8a88235b90d029e19bc51b4eb3faa627167659957f7a537bc8fe88a2744a3ed1acae529169

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    9a5828c3de185f143faf7ebf16b0c16e

    SHA1

    148a93651d979c86c6a750089be410385154b5bd

    SHA256

    5fca785a3227b9057f1d80bf25782df8f81a6a46b18146898e48945795ffbe3c

    SHA512

    c32e768b824295915bfed6be21f1f18ea0a897f85aafd437e79a2cfbb97e335a1d7c88136e2bf7d56e254a683f75ee625b22e66643b005402bd03463021a1af9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b2364a63800f07f9e335da2f1687fe81

    SHA1

    ae7f00af32e1eb52b82e3ec3fa8715d479d11a79

    SHA256

    5edaa52f7867d96ff0ad417c40a89a6fc877d3e83b9190c019dc3fbcb48a5fd5

    SHA512

    b5e00cce75601de43d322987866cd6e53e52b42ae61cd49438a3687c56d74fa58b3d02fab96b514e870236181e2df3e162bb04d3bc2b1122eaa5117882fdde97

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eb1f3300aaad523932cd99b5cdce0186

    SHA1

    7125420a3fd1c9915ca00033cbdf0be34addff0e

    SHA256

    29190feb6cfa4761fba9d7a5fcdaba607b690ecd0f4325f9e3ffe66328c7ec79

    SHA512

    c91ff929aa61cae50df3154e16e0433667919b4f7ac7b454c32b902749b17405ee1b9a8ba2877b8f0f525ff367b08ccf3cddc5973e1e975d35a7fd8bd16a0ebc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6f98bafff3cdbbc7f7b8638cf10f85df

    SHA1

    e3dfe7210f50a848dbef2e6c82ecf7bf617aa16c

    SHA256

    a21b3c118c7429956e12d191495c886c103337e3ef00f0860180412cb7555976

    SHA512

    295bd2db57e3b2a32c050b5777aaaa385205146e74a24f8f867c6efe12eed2ffd0a28495a2514cfd72a5ddb29078282d83d5258029695e9803b0f3c842c5ad95

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    75332d8bbac3369bbc4f019f13838e0d

    SHA1

    56b20c7fef8f96fa252c24aeaf4c9c82d95a9fbb

    SHA256

    fd0a588d772afd574ba4ed3a8965d31c826eef0a23d7ebf2439724d41596df5a

    SHA512

    ab1211a7fca109713e144cda0828cd1c84247319dfa7b2853f9a78079aec11585a793d93dd728eb12b93d4e1db7c48d6386e067c5bdd3088ed3cf858077e1fd1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b178fa39078c60133edd34fc6c122d32

    SHA1

    0ad654ad420b325db7c723cae390b7f9f55a2da3

    SHA256

    effcd500f064eb2dd493f82ce641f309ede3d0fd8628ce7f9493e3916c15f030

    SHA512

    664648074e5db7312112bb11a2c30925e8fd37f03769d2d93549a8b1cbfcbd46bfcb828cc503b796656531231dbb5c853fc76de95870b4c67ea289a2a554bb25

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    10ec825f67a7efdb18f2781e5f422845

    SHA1

    fc08a362459e729044a9a3c8a263b5b6c5ebf70d

    SHA256

    33f1017f597f3f091b88c3faa1f16420311ae5f51959da5dba9eabce496d2f23

    SHA512

    4283cbf247b238be3a3496c73cd560799568af0b2ad1e62c4763783570b029bcfcbc27bf4b522110abdc967cab1185e93de302ebef53c17365f9150fda732716

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8a3e201066ac4c672a9e1351d5a0d1fb

    SHA1

    7f6f42b9bcf4fcc0da4a9395b6cda76a3e95d239

    SHA256

    0adf20d0922e62174da0b3969d65bedffbd572423d949912fbf130422986582d

    SHA512

    b0332e46c2e969c724a5e4ab9f440ad6a27b2ed2942a18c3e0d948604344579fe76a372f146cc8ca38ab3d429f10f982cb8508997df3e0ecb665aafc0668106c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    35af1aeb9e7b395b868be75465ab002a

    SHA1

    30458e2a59c2e3726f060a74a142c587ad6ff32a

    SHA256

    43c428b509de5b1de78cf56fbfc95c4e8267ab94d62ba92efab096e61b780d9c

    SHA512

    42411559d20976cd81cf3dc8481319476b8d91f3608d4ddec3c89b0dba153d34253e0397ccf3132f267e899793e552cb66eb273a240d642c777b9489d17807ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    00e9c25dda855728e25b61db51671a58

    SHA1

    64dfc56b49c3f3c2697dce9871545bbb4c89c245

    SHA256

    baf48ec30b7eb23d0382f8c1249d67fdb61ef4f1e65da7d66606dd8158124aa8

    SHA512

    2967cb8d6bddd36d29a8a9fa9e965a82f56028e565ada1c1f5253d58597cef0b8543f59ed29e3bc8b18c57a1f69f360281019e7d631f985d1f3fc96e29e112ee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    763f17803143ca7901c53379b666d7b0

    SHA1

    80e86927cd760e30da05fe0ccd6b728931f88e29

    SHA256

    9dc70aad09a79d3e70cda9848d431dcde0d054713efedd23a3302fe3ad74fa1c

    SHA512

    f074f19c713a5b34bff0a522609e1061b67c78727f6e881f4c999a008ac1156ec11cb741902985a07958c8ebb9070ac1dcae90f83879d0e96fff21f666399aaf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3fa5ca9b40f1d791e1897aad5f0386ce

    SHA1

    644ffe21250456e3d58e69710ce98be3bdee231a

    SHA256

    fe88075926bd2a7dde3d59b7229f7ce4d023b9d1a3b0c4118c018b4ffc41f168

    SHA512

    ff62f1540409d14e30a635da8831e805946666cc56667680ed35b422bcbb07617e59048cf964a14a4c0085b77a9fc30d1d6b7d1b6256e07c64115d7bf2487a70

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDE8B1B7E253A9758EC380BD648952AF_F968CA97A68F4E6D5C104EC7FE3DFDEA

    Filesize

    402B

    MD5

    baa477beb9d9ffff6b389147fab3c210

    SHA1

    f4a050acef70ee2a7a3cc8c3206abc597db7a701

    SHA256

    e024dbf29c8282ad7f60ddfefc8f49ba28a54cc185ec0a35542148aaadbc6b87

    SHA512

    95e3f08b3ea73830a43e98d90c3051d8c4dce7b39d92f5a88903bf4df9fcbdbb6b474f9d03025d263a55e3ceef87672ff374efb54110846b61a6e89372ed6c18

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\njqq61f\imagestore.dat

    Filesize

    1KB

    MD5

    76b640c751ce9ec4407031fcc0f15e53

    SHA1

    e6c7a85b5581d61ffde87a82d0f4245320aadb20

    SHA256

    cda44eb1a69452f6cc512250a2816b414bc009cb857b6b4d362a01bbf237aec7

    SHA512

    4b0ef06355f746ba084e674080cbb8726c33fd5429d8b8e78caeb78104d27458f106dc33b3e88e0596cfeebf50625404c2bd44ff682c465d63659396dc9ccd50

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EOYL2MRI\55013136-widget_css_bundle[1].css

    Filesize

    29KB

    MD5

    e3f09df1bc175f411d1ec3dfb5afb17b

    SHA1

    3994ec3efe3c2447e7bbfdd97bb7e190dd1658f9

    SHA256

    1a2eca9e492e3a21e02dd77ad44d7af45c4091d35ede79e948b7a3f23e5b3617

    SHA512

    16164d66d452d7d343b1902fe5b864ffdee42811ee90952cbfe9efa9847c58c0403f944c8e29db2bc2384ccd516b629cb8765e5e51de37da6efd75962cf82530

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EOYL2MRI\favicon[2].ico

    Filesize

    1KB

    MD5

    019c295a5adb81c2a04ca97aa1a21a39

    SHA1

    d3e315080aeb26764facbd3519be481dbec2acd1

    SHA256

    d9a1f7aaba4ae962e73c9dfed8112161056eb7c8cbb388fa26e9dee8b145bee8

    SHA512

    10665903dfe50cefacfe6be090256a9140cdbd317c20baefc133184756796370cb5a0cb2f739f300602864e57c0d0433b63e8593fcdd56ea4bd6ff223346cfb3

  • C:\Users\Admin\AppData\Local\Temp\CabB6F3.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB6F4.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b