Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14/09/2024, 19:43

General

  • Target

    e0e77c4a2e361ff5614913b1aa2cbbe6_JaffaCakes118.html

  • Size

    332B

  • MD5

    e0e77c4a2e361ff5614913b1aa2cbbe6

  • SHA1

    06e1d7c855f3643e76731b015ba0a88d0fb44d1a

  • SHA256

    412d3ec46381cabccbb33d5bec6481c922149af9e8831dcffbc556b66cfba48d

  • SHA512

    e294c566e1d0d410b0eb2fc7c67f0b1bed775a9c502021ffdbb6f5d2b824d3ac2c0f26c54d65229f8e03cba49fc38e54da5a759e108219c5fe3b31f161b2f019

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e0e77c4a2e361ff5614913b1aa2cbbe6_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2284
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2284 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e9fe234c044c6f027d5af34379d12553

    SHA1

    c155b6f4d1913efc1b457a87b7e2063b494207a6

    SHA256

    b45ef71fe1fe11455a04b35c063feae3864c1ef9b4d851aee8740a56e9f1b69f

    SHA512

    d52c2db9d027732d44402c5aeb5eaa46a5916e946a37dc2407d47298562a0314c773f48c657ae5518e2eef68b406a30fddeb09ec25b37dc026950f086af1ee75

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    48a34c8520ac3ec88260bc3d53ac3193

    SHA1

    4b447c1504af67bef1f5ddf53ebde11ea821fe25

    SHA256

    41f60b9f476981a377d1d1cbcfb4ef757166e25339c325acd2834fe82b88dbc0

    SHA512

    446b09754442a8e36f98d3317f503c1398662fa408b5b33ab381487bbfbc881082378c12bb4cccd4cd12cce205e8be34aef8b9cd44e65487b0e44d35e8a3a0c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5fd872ccf31a4db7bf2147c968932e39

    SHA1

    d9be1aa49f48e2bb12459c37b9151203b0578291

    SHA256

    9c62b91f2be5421e43ab1f08b860e7abd0e0cef8ecf7430935b2a3d2efdb77d7

    SHA512

    1f45d3d51811c54a28855f8cde4343af2fe539d10f6936ad56bd10568ed70cdf617de2506ded732f26f41cd6bf109515221747506901636e82a1b00ec40aa0e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    54107e08a1eba949eaf5e5d6dd4bb23a

    SHA1

    dcf9013c0bf0a51f534e5106cd0aec9eeb5626a0

    SHA256

    6f35aa4754f89a501f16e5a027960e57584a68b0f2dd2c4f10cb2923fd530047

    SHA512

    abca0ba08364ca1b146a03b8f74fd51800ae5a69b39648c43430b06d35b974575c4bf1833471fbc9a9e7bc868e4bce681845e4efddcb4ee333178ac89b581506

  • C:\Users\Admin\AppData\Local\Temp\Cab7D2E.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar7DFC.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b