Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/09/2024, 16:49

General

  • Target

    d6ba131822e613f23f23c7dafc764f1a_JaffaCakes118.html

  • Size

    55KB

  • MD5

    d6ba131822e613f23f23c7dafc764f1a

  • SHA1

    d9cee4a505966ecbb145be95c8495088244cf755

  • SHA256

    654e073cff1192ffc45319168cd75194f35e9dd1ba1065bd833b2865bf850c88

  • SHA512

    cce1692500b350f9377ea685df1525b5fb056afa611c0752e55ce118e74fb746a48b743d86dd2dcc28870b86c821f14275ef3902793f3137f8d4358a043ef2d6

  • SSDEEP

    768:cuc6IHLVvpBqN1Dq9P9ovMUyQjMxFky4CC5yd7T+semiekAWrEwVAIT+9M9GlTxc:cBvpBvcMklAC5fjmLieC

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d6ba131822e613f23f23c7dafc764f1a_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:275457 /prefetch:2
      2⤵
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    de7287a6b257bdf81b9649313d8ec7ad

    SHA1

    4972f0d6a4f76a1f51418a0c012166c048203c5c

    SHA256

    b21289e6b5b261d379ae5eb25f0be6aff940877b07880173a518fac02c3c3e9b

    SHA512

    8fac7c20dd4c9c7d0a330f5809586f5205876005b832d6f5bd8d3fd19fe9bc48d1f8587d576da73ce7fdb9be0f4b7eb173173a24f4b126f2d402ed985743f2c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b6bcf0f8ba88a43e57c07661e214879c

    SHA1

    526ad0407ae8c20949d3069501db6a5019cc6779

    SHA256

    cc9529133143895b0a2b1f98168a45dcbc9bc2e22116d560df907938b3fe74ca

    SHA512

    5f4030caaa5a1d2bce2ba5d29877190b349bc04a932bb234b6203b86031688b04ce1265d95a795b1b05d70f6d3b247a23baec51e49bcf7eab38499c91acb8b28

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c91967a5b597b0cfbedafb237c843d90

    SHA1

    9284f89ac56289fb9626722d02112305722b5c2e

    SHA256

    4eb1cd22309fa4f9fc0944f37ae2d4539369c737d7b2873881a3708567f55acd

    SHA512

    34c38ca35f67d02e43a539e1170812c6d41c3fe4dd00c76b4085e6de0e3d03ae676b6f5517fda25ba6b0842ca0dd9bd197453ea043ef78e7dea4d0866c79c67c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b92ef734c7b9c75c3c78da58c135c5b3

    SHA1

    5cf16909393fb83465381bad0bc0db9246cc18ba

    SHA256

    b742d2bde79bfc405ffe35c53e99bb5786f714e16b639bf7b1d9af44c98ecf59

    SHA512

    afe6e75fc843026c6e8c722e828d7a0b3d850eb0598e3b51fd477e6fd007e696d322f318503126363e13d1a87c2154d20ed2e9ae970f3552ba27db5859145e4e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d70f461e41c0ada2dcdabb91818d7213

    SHA1

    847f800cbf3d013e1ee649ff70d533feec1a44dd

    SHA256

    2461a85a50cfbd75764201272762c3f8bc6561763bbea15440c3da6e0f57f142

    SHA512

    5363dff08e70c6c946f2c7b339eedfb49a5246f6aebf44466192606db1b6053161d9784a659039fb5f24597f5402e067ff596100a4a80d04ce0bbb37092cd352

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4b49eb44af23203b0070a569494d8537

    SHA1

    11d58ecd2b586c4bc38ef6c118a92fa940a6e609

    SHA256

    9d99709ea3f61f4aeea482eeb2fa9e92bc1b9241003d5d9a89ba79493aa64fc5

    SHA512

    de2a55e20d5f4be91713c3cbea7706a2cfd375de02b21db0f3535318896a3991176c2b2050c735441555ace57e315e342f66d025e6a54603375ebcfb9cee538e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    99fc3ee3bf73069a11a0728ccf11305f

    SHA1

    7f6e1afdccc99812917e99da737d1a1eecce8e24

    SHA256

    fa08e631a806bc034b76b7aaf423df4a7139c005852603f9513338fa99436b78

    SHA512

    af51d10d60849972b6ac9a68b7c8dd44145dd9a359b8d6556f0541cb4d7be4c3b137e57567dc93dca5cf96051a6a891ab7c5b88bf4e5b0c15277688b77c3847c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5874bdcb0d3ad4480bead9c15f381305

    SHA1

    e83610c5472638036169bf924cb843125061d1d1

    SHA256

    786689b0172def399834b158c04891e7b8d33627ca651f5f0672005b46a7ded4

    SHA512

    5b25730fed5ba649a13f32e2f095ece04ef81a8c69370027f79a9ef32f9a92c031caa33b4832ac8b20d4a47fc4655c782972af5b37f3bbd8028673cf56aae63f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    01e188068addd8b0f3f3704f793e38bf

    SHA1

    ef7c72bc0a2009ffdacad89f31c3d2fcd818baf6

    SHA256

    001d7842a2e259ecda9a60f29bad20651da3b106c3f781d4d8d9f8a4aeb376a2

    SHA512

    99777233fbf9fd118cade46ed8f4919db4698a88490303d84cbd2614e778dcfca8a0424962c62ddfed745d8e78bbb0a6e00291e61dd03aad37ec89d8aaef71fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a243a8503408739d21d182033d7443c7

    SHA1

    9e522a78a262af1dac8ede48cd5b111d7c968922

    SHA256

    5dd22d5c9e5e4c31258904be63cdc375554ffb8d8e51545aadc23bcb2c598cb5

    SHA512

    da0d006a2e31414366c70f578890d29e15185829292da9c3d34f24c0419f8f4529f1263e8efb97525073c6a69e91e26a002c48bb2c761e32256356f88a361256

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    60da43835d2bb2658cbcd136f51172a4

    SHA1

    d811ade636e660d9fad4cfbde52e35845862853a

    SHA256

    928226b15393225203b146bf7829be0e1b68b116edce923aa8ecf9de205d5379

    SHA512

    09b1df18de28cb6caaaaab6c96cb28da7caa09cc6d859fb5228196f398c80e5a93af27b0f4c9c7d7fc5a3ad6cd57c041e6e8937293f04eb5ca5f9f72c01938ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    006f1bd75a3a2ff26c8745ea72e2e3f2

    SHA1

    e1033328da2da6dfe8baadd1be53ee58ff46bd8b

    SHA256

    163c995150b621fea5a5c82d4f12877472e9fa8076815c35b539e32df52b9c5c

    SHA512

    beb2d02f68de7483f6c4a6575a71239e1cb828450c7c7abddef32098b22ab0b5adb45e6f24047fd23229e3821bc6248afa8d1d2ed1e2f50f0607a47978251a60

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    df78864103eb3605978d4b89851bed73

    SHA1

    e27462a1c8a3bb6e5f3c33ed7c28e4cd051519e5

    SHA256

    38f0e9c9508dec588ed1e8ce842032f1256be02edda321cd00d72c79839b4a40

    SHA512

    927a7dcd423bbf1494270829714a095bb82286875736901b98afb1930aa2905d7b27cf01f35706222887f8d80fbfad224cbf50db05f08a040b1315231bf8df3c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    073e7e55390678ac92684b0b8ef32107

    SHA1

    cf53182e1c42fd5ef3a947a82526af4e12d28e61

    SHA256

    bdfd40b4cdeca9874db78a421d82a659ffb59de529f159cd51d27db8421e2227

    SHA512

    b4f214243a148c8a06dc5439676ed073834a83e54d4ab17fb2ec5b33ffcea5c94606971aa013689604db6fed48b9151bf468e3f0340cf9f79e910c81f8ac5595

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    435dc4df4cf54feeb3ed8b239a275f2e

    SHA1

    0179ac92ee9088684e8a24b0ba2049174e32b359

    SHA256

    96dee5a7377b0abdfd459bba206e5e1eb99806e08f9767a0f903ab3ac1f96c3f

    SHA512

    533ff7c1a987845426656ed357ba1aba4142200c1524e49112672a4b13bcf9e448e7755a93018293eccf9b4d38178a76279a3c0ff6b2bcbc68e049f38c098228

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    08e93818754061855710d59718fe9a62

    SHA1

    5e651299415df1a4d250de30c1217857fb806793

    SHA256

    fe906329a07615f80b5de73a658ee2b4cc9363d1c5b657c5a407039d3e66132c

    SHA512

    6afa65bce1ebf18dc5b9c293cdcbd79d0047af1f0d63cbe73c01addb4c8ba02d0489ea3d474196b7a783ad26b1db6ecaba64220a0ae62dbc427b77632993d1ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    828b46546b95bcab002894cc077b4c1e

    SHA1

    78e0544919bf9b33c3b1c06be283643d531f2544

    SHA256

    844a1c2e10aa485241e9a2ca2b7396488d634092e9c1cd52b830f41b25a9dc88

    SHA512

    65af6758a132a54d27ef0b0b816222d1833b11f65dbb306f4ef6a6efe1b7273a18741d9deb493d9be1e3243fd2493d5a3cf45467733a3405d3d3f5c04444b4ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2115c89c1da9a7c3b3f0c3791275c57d

    SHA1

    5799b3d55d843cf2ae4ee4992aec8136fd31674e

    SHA256

    5ee54f3fa70b4bbe179cf183a0ab405f120f8a7f56190a7a86e4653ae8c2862e

    SHA512

    fc63df0d0bd1f317c28041da79d291a7773d2d369dcda6756e0acaa3bd69e2de41b0d3c0b1f44182af3292b7100a6ffc4b4fbd95dae96099be04101dfc33ad99

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    53834cae8aaf4f39599d54e6a1a12c14

    SHA1

    b58bf918a34e127c123b3a59fc31d4522fe72bc3

    SHA256

    f01f5f12badd6c2bf3f7076bd0ff051df818fd5b4720ddb902775bf5dd387113

    SHA512

    30159cb0d5ccf96b944db8f53ee956376c790cf584d3cacb17dd1bbce0cae7a742a28386cc305bdeb99de87fcdac5477d4ba6018a86fdd4a820d974875d53288

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    52c059ca47f178da88ce8e170f424439

    SHA1

    d40b8ff985fba4a8c3f0219192a1d5ce428a8faf

    SHA256

    85f2f070c8df7b8b5ad19f3e251823396a661a7d11efc780ac3150c8b1917cc9

    SHA512

    4589f21ec0df531936f8ff3fd1fa3ab5ad6089501877d8a4d83efa946d3701964a7b54d404b7a8b87d5d9e36447b9491a211d73b85d089114b76741c646915a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ea3071ca7372bdec4dad52337867fcee

    SHA1

    308f5364924795e17569ca762a8b55dffa84a6de

    SHA256

    eabf463a04cefec87d390fdb476581f42be8ab1eed3b48f95538c8d5c7649e07

    SHA512

    b73e96977eb64822a91264327dc78e7caf6262bfcb93d42a6040367468af100aa7bb2f90f87e657770750845b7cc253e136e5bed5e81f597fd50dfba5fb94b22

  • C:\Users\Admin\AppData\Local\Temp\CabF21E.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF2EC.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b