Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    130s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/09/2024, 03:49

General

  • Target

    dbc21acf503483a2fb05f55faebcba18_JaffaCakes118.html

  • Size

    18KB

  • MD5

    dbc21acf503483a2fb05f55faebcba18

  • SHA1

    1ffc91d5fbe736b3502200a97a02c41fb0472057

  • SHA256

    2b7b4306afb369f1e3265975462ace76e553a2064299b1c5e9f8d67260674db4

  • SHA512

    099a94b8c183d346d9612f37e9f79156a0651fa84872af69ccff03328b7b221870d7e32147c2c2a04b448a4ff6dad69c3433136ad4ab38fe3264dc022425cd05

  • SSDEEP

    192:SIM3t0I5fo9cKivXQWxZxdkVSoAgZ4BzUnjBhPh82qDB8:SIMd0I5nvHdsvPqxDB8

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dbc21acf503483a2fb05f55faebcba18_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2904
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2904 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    85db96af9b9a74f8fd475884a1408565

    SHA1

    5bd67c6547311569dd34e209d7a505af2889c1a0

    SHA256

    6a2b3387c96346a5f0dbebfafa73d1c83a7bdd9f16720903aec9019519b84596

    SHA512

    b5b6bd143bea74cfbdfb12f0c2942d9219914b27843f01bb4438153d997faa1ef40781ee47f41cfcdc942636a77bd659b79c43de9cc7938bb5bcd8c705c90989

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    99674a4da8da27f285843aed772c799c

    SHA1

    513eb01e1d7a48325a4c4eb8d1f03b74e32cb9f4

    SHA256

    830b040c8d1ee89960ed7313a4aff710a9593c2942700682544b320cc08a7e34

    SHA512

    74aead1747bf3b03b83184aa35f7cf5dc1ffe03955d89838e3e1bfa4eeb51a5c9141c7a13f454df37106e99f4e8da74c0600e5049b627389ba472f94336e04f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    344a1acc73d93d46d63d64495d38b2fc

    SHA1

    e48d740fc40e34dae66d7e84b068c275db86475f

    SHA256

    df4d28b8375535961cbebcf5e324b8526cfc68aa481722d6c87257ed14fb82e9

    SHA512

    50cd47030fcb72c5d3705332d5963389d2ceb8c72d2a18d62ae3ba31f9088aff02a91faa955436e1a854c8f21ba17269b9e740e600a858a19a42415c5d67a4c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    687ab728b96d916b4fbb1c2978e803ca

    SHA1

    2917c8d8d07f04b3536191ae894dec20b33499d6

    SHA256

    90961f64e77ef59d756e1a4d6fbfdc84f445462507b7c9b4c3075260750561d7

    SHA512

    e7f13d34faa4a16f85ac7984fa73a4f6f23767bc758121334f22bf9d08ac6b232ccd4650b242241d010624c4789a755e303f813341ef041c9f36619bf5c5c9b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a8b3a57f79411bf1012d1829249a397d

    SHA1

    7391a520525766a8054a8bb7561481d5ecc6750c

    SHA256

    e6581c8d069adf4ddefe2bb746b9035a82b7932aca7379adcb90c3416c162049

    SHA512

    983796dda367fc334ecef2cbef9d072492d7d8aa54899476d5eb3ff5339e307f22120bda171956a2b4a2435546417e2e9821c38cc7603d698df526461115e7d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    40e02bdcf564571f25914dc0c656731e

    SHA1

    f48d46af80fb2950bc313099fc355414245bb9db

    SHA256

    43aa7a954c4a7bf3c0c7732d07a9600e1e0459ceec84fb2682df28ed716b4662

    SHA512

    7a7e6761a8c7d45d07c014dca93c5bf4f486aa28005a5ab7500c555bebbc669bd68542f711661e9912639a9a6451a017f3c183226a94c16490dff7ae4932913c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0bfdd88d6ce0da0b7efaa7073212a23b

    SHA1

    b5fd180468499c208ffc4c3e7b956798a51000d4

    SHA256

    948a1198e41270a0fb75cba76fa297f43dba2c3f681e6f7a177de1c174c2bd39

    SHA512

    8b4fedb2bdcd1e04f204c4da10eaab5e6e933e8366d51076b1248ef0f4785739d7cd8b51c650ae904e6e4a20f0ead932ff699adc8bdfa4d41621792f2250cb9c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d63221be802dc2952510f3ac29cf0888

    SHA1

    e6236ed975f0578244a01a8d39e9ba91626570c0

    SHA256

    3bf218ebb097e65ec49752182fbfd41ac9ab884f2b2ed5218d5805790384200d

    SHA512

    96cae1ddac000f0fe2a7d88b7c558bdfc1dd3ad3108c959935d73e1903e59844fefef74ffcdc6e40f495a9c5248ad01688afdbd917768eb82f51e8966a65e968

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    95762767029345b033b0d3e5a005c503

    SHA1

    7c699727eb6c925d0120c77c8556d912710fd32c

    SHA256

    73d0b342b1046a2ce3a3075beba82175362430ece248146cb8f7d0b3dd744e13

    SHA512

    b0c9037dc789bd6437f64cfc786ac0a02ff09cf8320000b42d8c1656b11290ba0c8379da52a11fd12ba1e51d37fa2b99daa4d897689f0817fd2daff44b8c3f56

  • C:\Users\Admin\AppData\Local\Temp\CabC294.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC306.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b