Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    12/09/2024, 22:40

General

  • Target

    dd2d2122f4ad3ec4b26300782b57a2e0_JaffaCakes118.html

  • Size

    21KB

  • MD5

    dd2d2122f4ad3ec4b26300782b57a2e0

  • SHA1

    68ddd57dd1edfda12300e7071b383f5c011865b2

  • SHA256

    d50f2b53627970b845f831c28893165dc389e485a8e69e0ed7363e69b7f42b9d

  • SHA512

    fd3cda6e8a570f97a273e48adb087e832bd0051f37926cdbeaf4e6a96f5f7ce3caf190a6cdcf1cb7622de55215a0071b029e4d946a0d9a2298ba4a1043375ece

  • SSDEEP

    384:vab4GkPSQTHTv2egEQuBzCkarEwKr5YfNTbu9Jx/pPqB0v:vab4JdTOegEQuBsrRnOx/pCB0v

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dd2d2122f4ad3ec4b26300782b57a2e0_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:560
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:560 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1960a3af6c7ec4ee12c37788a42f80e2

    SHA1

    90f88c7bcdb446c933f8157d0909208af4a5a587

    SHA256

    c2060cbc00b19e87925ab982fb15b36270bd5ad20da775c0be2eb1d6afce7e8b

    SHA512

    38f5c1c2f8e82469914343b73044f79744094d0366e25b626eb77f08d091ada9dbaf91faa5ea6b68d6f54f6c323c76adb4c81e6a37805462dc1340946bde4d18

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    92a44296264c333c0359e4b81288cc38

    SHA1

    3a89d1f68113a4024ce30d5e208a326e912556cb

    SHA256

    ec890cdcd8298ecc0bc3e9113cb022a652132501b4d32b475d92a16264f0d4a6

    SHA512

    bfb7574b87e5b238ca2c02403bca0063a855362b96ba6af4b5e35a4e8f5b18c32ded2f2075cd9045442cebeefe30c49ea66352c3f516f7be642963a772bdead6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b29bbf3e8f4d4646f94618b0d88ef8cc

    SHA1

    166bf77743ee68349038a9dd1fe336a562218550

    SHA256

    2696b6673ceedb573ea6a1df23721865e1dd9f02843e416f15115a505ad6e4d0

    SHA512

    9d3ebb9e36eb3a305bca2b6a1d644e088530ec9cebba378f9c20fad02273eb7281b07651bc05007d7dbeae557225035098cda35492d85b2521c4460ad1673147

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0ad07b102febcf9de7233c122a11e370

    SHA1

    83b39d87e5a847bdee645c868ddea8580557c1ff

    SHA256

    d1c7d75b5cb009925b607a9c29a659c341aaf1595813667a59d581168a08596a

    SHA512

    e8536eb8ec90ec3feed6f954eae1c1ee970cc70e6610e1267f04c2488f115805a9accb2ef9220e826c5952c9dd051e37b1f35e8f4d12b3c608dacbe1115c6166

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d600d6c2a85702fe79fb9fcef1054070

    SHA1

    202e1967730c51d4ad3497aeb21cf20dbeaa8c09

    SHA256

    b199504152fa8c43f8309a084bd2bb329eb04c79bc665ced9bb6b30d7f9660db

    SHA512

    35b0de73bf841c05da362885972543ee49ffaa2bcff33042c2c86df1e746d4a900600333609fd147aa3e6981f702eb5ccff4cc44e9ee44117d28e3a2a2ad6fe1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f189d8797abe1085749b2ee66adb1528

    SHA1

    7ad2f0fff38fd4c8459308dfc678729430647b9b

    SHA256

    1a1b7ec5f45ba9ba8837b2757238166ee436d09a4d62ae2c04dfbd0b8b38131c

    SHA512

    8c6db5387244c8acb97405d6dbe957c4a679c702dfcbd3ab636859bae46d40f42759e0831401a35ef8b1a592b21b7269850284c81acbb4240be554ed7a15ca6b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    de73992c3e90075be88aa5eebff0db72

    SHA1

    fc45fd210f535fe3d7b738bc18784132468bac9f

    SHA256

    4d0ffcbf8a329095ce7b59ff02404bcbc4aedd8f51845b3d29125d4381d16b11

    SHA512

    f47d006ca09bd24873521e3b32d2c71e58882f882467cbcf54ac00e1b24464b6d3df557f75fcf3178f8eaa03a052a34057785a1ade792d9d60960213e278e7f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c9e40ad3809c71f1b060d43001cb3252

    SHA1

    a0cc7e3b46b20c20858211bf1ed81f9751842bc2

    SHA256

    c0d34208ca72dd4bff2d2b6d98506876528e314945620a35fbc9fbdc41596b20

    SHA512

    cdb4abea2ac132339846910d395e9ad1b3018c5566e23a1c4d894e4ab2e76cd32157743e110e9311525e7b8dbece3430205172afb049b7f425f2a60e215e2aa6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    60300d0fb6d2098de8dd3a12c45da8cc

    SHA1

    c894d368b10ed60faca60dd4b19ac1b5ebbbff13

    SHA256

    0560448a53c4ce62fa60aa83c7888ffd02660100f5fb4e1cd03987ec8b27b90c

    SHA512

    9a44c10aee9ad8847fd036fcf7e1d19bd16f637a8cd523523f76954c3386b370bfe2c64e6b0a99f4a38d59745f196083a5fab9ba1c1dcdfb5667ca8355c18692

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    58d231d56e8dbe8ded6998bb56cf1bce

    SHA1

    4946ea44f5b22acc577ecceddf4ebb6e45a374b6

    SHA256

    58ba7b247e7eefb46b0703f207bdb59faba54e3e52e410248fdf3130c67ed6e2

    SHA512

    5fba95b465a3e80d1e579b2b569b29552782a4e55000f3177c953cbbb0e59d2e6fb61426807140b953ab85cc110441bd5a12eb62cf073305f615817db5a9860f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b8365b631e0372015e5089144d097fd6

    SHA1

    37cf9b419d1d18562a4eb320896dac95c06a3f3a

    SHA256

    d2a80611d005ff9e064115554a11c9cd91885bff6e0209089cd53f8a7f7a3a09

    SHA512

    ac4ce0cd7544cd94a76be3f0e974164b0f345cecc0844cb7b69006ec56176604899a984b2fb08a38f636771deb12d2cd15eef1365ae72881240d4ca4b2ce0c63

  • C:\Users\Admin\AppData\Local\Temp\Cab4CF9.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar4D6B.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b