Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    131s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2024, 06:43

General

  • Target

    d9ceb91cbe71b1ab232f29843ecbc108_JaffaCakes118.html

  • Size

    45KB

  • MD5

    d9ceb91cbe71b1ab232f29843ecbc108

  • SHA1

    ba555c10804b10fbabf390445ea93d2e3c4ac3bd

  • SHA256

    b5baeebd601491dd7abaa10d7ed450ed17f5ce8f1f454305d7e1ddc4d367bd3c

  • SHA512

    081032fb4cab530ac0cad3c8f31a9aae9af09fa1c23f64b8f8a90cb8d8d49045bdd0fdb476f96756af73b095cb6ec51b57e2a9c072022a0ecca1eff24a9137a2

  • SSDEEP

    384:FRpPr1TtAMJ6eYOlMXGz4x0/uyONy88FMKMlNeOC0Pff:vpPr1UeYO99pbZMlNt13

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d9ceb91cbe71b1ab232f29843ecbc108_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2392 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e0e5161f00ac195b972204414c0f42e9

    SHA1

    0673f591bb69ae45e0b69ec1662dbb41f53e030a

    SHA256

    87d02fedc6213f08f3102ef8d42e70777b797caa35c6ecec5f070a238b04db57

    SHA512

    760400b520f9a5f6c41ac767075c0eb805f44d383b54b6818a3ee074238f665125df7cd9c0d5a180637d1d900de6158b09e03cc2c827185d62b9f17c6ea0d93e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    39b413e256923246d4a50bf614e2a1d1

    SHA1

    b8a0b8b917e23fcd3dafb59af3f19f7e49a33551

    SHA256

    8dda6f164a309c35da033b5c01598f14215a4a42e2646b3e3f3bb3a59335d1c3

    SHA512

    5b861f5b9a70536d359874b33fb49b717d153d0d57daeeaafb3fa61cee68cb7609b3aa3347cae9052276c28217f9fb573c027f6e6e76ecf7db8a86187764744f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fa251aacb00a80c3ccb5a1a6e5d17785

    SHA1

    d274df534fb6fb4653ef2e5e328eb7a21fd437bd

    SHA256

    2743c7644d28ad273d94c2003adeb96841126db65f6298b156b3126200bf3115

    SHA512

    645cef132fc3c95acbe322b1615d7bdcfccee36313c83df307c09268a3c54b4d9249950fb6813231ac57ea62f0f2df4e7c550a963399f2d3791ce2de408219e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    263b986838530a76ec5e09f0beaaa3e3

    SHA1

    50441576509aa5a8c602dfacacc497cbdd08eab3

    SHA256

    36f6c26b06f5a01e507dfe51c83a7dea8e6d529f0cb34c2e0314b649f82c5442

    SHA512

    b6a046420d64f2aa7f79f8806884729ae83744ca271501b70f026e8475e448c17226ba0d9e0bbf8176798ce195f20da4d43f5225c40c1f81190b699cb1a4a929

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fb1fd764c206852e8dcecf8d97156a1e

    SHA1

    942a81f270f93291cbf1a72c35eeb2199ee1937a

    SHA256

    fa926f7eda5cdb972cf8c2b5f7e92b0b28603d1a5c49c9933085b96be66e375d

    SHA512

    8d005bea18fe7e559f8646156d934ecd201f61e9e6ba8a1785406a63957055867b49f008ca51af38e7454158c5e090638dbadec2d0b4405cac95e60020b35a7a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    70305482954ad0948e29e9635db480fb

    SHA1

    82108f1ce70c3d90067a0414a037d3b9be00c6fe

    SHA256

    2c3673f702117d8d0150b76ca667cd84f77bf379ff04b2e9824414f83d82b6b1

    SHA512

    11b71961d132a7244dc6319e47dd165bb8c953ae3adc5f665da18be98dda394527d1844c73f0b1ebc1e4ad1a2f8032a860c76eb61b81feb5e9beef36b64c3b5a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    651fd7f02fcb913eb4edc90ef0e281c0

    SHA1

    a1451055221a059795f8c15814fb007662659e75

    SHA256

    4acb20eb0208b320aad53f47d5da959a7a0d9795f536c4da07ed6c9aae2abc0b

    SHA512

    fba22fcc3e3ec1b03c19482cd0d27227badf831bbc05dbb1338e47d7daae5171bc9a88af60cb55e9b433b7d14c8633d5bbf7190265d6f9a4a8dace415f3fa8ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6f2b806fe98fe0a8a5f55591ff215b8c

    SHA1

    5d2c65b47e9ebcab64abe92048f94f36b999d35d

    SHA256

    f914dccdc5c53b21e0ab36ff2f44b27b7d43c8e378e2efd273137089c06a6499

    SHA512

    85cba9032994e1846c2140d3e533d264195690ed2e4e015a50ccf885e0b466bf10fb35306bec6babaca27036c0e4c00b5c5cf8b6e0ade7aefa3dbb6f7e56dcc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ccff876e700443a51802b7e193794e13

    SHA1

    51b61f02d064c0ab40aea3f3e6c11d73a28cf345

    SHA256

    009734f666f17d30e5e77a80673a8bda1bde899013b49b9c949f49043f9c1f5e

    SHA512

    8df38e70bac4063782993ceec5156621726508f80a5005f187ea98a16c661aadb53f4104671307526f735268b741ee675812336fc29d0e2369a408b27b695353

  • C:\Users\Admin\AppData\Local\Temp\CabF00.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarFAF.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b