Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 07:01

General

  • Target

    eacf51a1021760820fa9a87fccdac214_JaffaCakes118.html

  • Size

    27KB

  • MD5

    eacf51a1021760820fa9a87fccdac214

  • SHA1

    652b4bc502578a3383c1313159f80348d14d69c4

  • SHA256

    9a42e3f2d88a62738bc49c375bb7f6cbd3a7e1f96f487ff390492b4f12c5d6ab

  • SHA512

    4a0f37b929592de303aa28761ed2d98f90f88b2e65a06874062b1481536f2e8962d25c6ba9836d718084b0365eb82c3a993e44189f21b8e6eaf8281c1908c15f

  • SSDEEP

    192:uw7Ub5nIOnQjxn5Q//LnQieaNnGnQOkEntV39nQTbnJnQ9e4viFm60BmoQl7MB6y:lQ//IJdvifum7S8vfrW

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eacf51a1021760820fa9a87fccdac214_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2684 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c1497b5121c862e6cd279178eff65352

    SHA1

    9577953671b1311056831f40648c8f441bd7cd46

    SHA256

    915c3e3759263a4eb827e83f5557b416b0c04912a2e754ed531f64fb7dc77025

    SHA512

    1b6b7fc1747566d7b9c6c5dbe6b52f155257b4d48c90341655f28ed857c8f7c8cc3a97a7c337066ca02e77b95e4b6fbed5d79099bf7b0efb1fae8e12afa8d21c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    845831b0ea8b82176d39de816fbfba3d

    SHA1

    8ba229995f8b973c1d48342b0bb69474047f1928

    SHA256

    0354a38dfcbebd3486410f9cf22a8f2b0b0e430a32a42d90c3538e7bc948c59a

    SHA512

    b73eb3649d4d6ae8627a8a0e2e05cfe565eb8a81486f6064d3dba36ff0e36b746c440d06d8e7e120cf5b80565438a0a037ba3b5dfb951aec6b9a8b5c5e3f48c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    187f1afe0dd56add7104a423dfdf26e5

    SHA1

    a5d80b89616546e95bcd82e9b050962e23179d6b

    SHA256

    09de745752e55048d93d22af6f51da5c533216fe43264b786cd1a31f5ee20b70

    SHA512

    6244fff363e58dfb7a0b0642e650c1bde449607b225b4f476da7982caf9f3ba54b689fc863269c2e1ab3f8e569dcc1b0e49d94937d153f5c78ecd3302b5d1d62

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cce12dad9a3573bf5ce9b6f868b413de

    SHA1

    ef95c2fa6aa994ea48992616c4ee8eef6e317588

    SHA256

    30350df488571e9efd12decc6530064d4c3b929e851398f4160814aff3aa1e99

    SHA512

    5fc6a91784e573385bc56ebc3c37fa7e344de9268c69cd401b6c995b41658a9ff3e4902104dc89dd1b38c6044af6f0f90193b7e0345010a0f9d85f193ef01b8c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    af09117e814392776ebe0a28ea89513d

    SHA1

    781d6f67c1d615a5d9566ae899ffff68b37673e1

    SHA256

    6eaac7f4b2f44d601aa6953f82038a950c04c8a965f01260b6a2638efc665783

    SHA512

    5cb737ca924b1f2bf45f831e2c696e1347a69738d7824711b3dacfdbb87c702f971ad8ba6d6cdec32ca00da5bc055d7051868c9dfbf933617303644370a219a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8229cbe9efcbb4882e212ccd306d2b26

    SHA1

    9dddca334d366460b8815d0d40ccf5a173b7c4ef

    SHA256

    a630d03543626c3a94a7662459cbfb9fb4ee13b3c7c1f5b405b3b87a0608f34d

    SHA512

    82606c378814f9027f9cd1ed0a67a085a34904ab8d627a5cc6b4803c902c1521a0ad5ac8313bc35164f393b1a847efac502a09e727154e2a67c2ba55f1e2f969

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    66d639a495391c1e244d57b7041903f8

    SHA1

    7be0ddc9e1fa8de0107809d823fd493574b23960

    SHA256

    d0a39838d693fae9273995bfcb73ee792ed2fd9debce3b43d2d13cdd2b52c841

    SHA512

    051d3d8938086b0431465025422a5c7e01f1207e4616dbd57b7c3d0e45e179717561f6cbca5cb2868db5b7a37998880eb814faeedfddd476a7780c28814abd69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5897276d86738551e69f00c78dff51f3

    SHA1

    25f3049b45bf8a6eda0721c2def08295d924099f

    SHA256

    f41b6ddd3ebf3799814087ca439a78189ccc5ffd3905cb425a53ebd774515a36

    SHA512

    8ab187f12dc608e960041e67783992827224e549ef89a7825d623cd04b5cb2f2d33764de8f6436fc38d9d8f3e706d3ad67caee9563b1ba97fa6cf3623f3f9b3e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    236e019545be2ec33a991991816d9394

    SHA1

    127f0c74a944b047263fe9c925334e7ad60c347e

    SHA256

    bb2a7b728040eb76e1e0fac9bd09b2fe5d9da971eb78c10f36b6f3a3dae3c51d

    SHA512

    1c7e894e6ee28201c2e90a80e635924f563acb46712db422cb9ed7db7d0fcf1dab81356a8a055d2ec187c64fa546246dc241a24ba469bdf3e1730e6065482d91

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2884c005c987d9897571097111a30cb6

    SHA1

    15e026d7e14e0f11b07c18d5daa7df56c02ff9c3

    SHA256

    de65b1f3a74ed9529c48d4c1b0017a4fd08eaa2e45099300411abc4c26b3fc1b

    SHA512

    316fd6b89fe51957176de4ef6aa18160932eba29bcbe71a59955cc95e81a1bf20c8c822e84cb53ec21d59a46a3d27e060abb4e149bb7b13a776606014d5496a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1601766482b1b5023cc81aac2aa925bf

    SHA1

    cc29593c4493b751e1d85fb17e9fe5d119ddb9c6

    SHA256

    9c28864e05e89886eff2bc90cb8087146ecd720a369a84665ffae8611dd1a63e

    SHA512

    e76fa8249608919d6a14d0e38f965d67b5af6abe16019b4d7a86417b5cb47f2eaa672bc7394df5b2713f56faa9cf4bc2ad211bab4f924c5ed1724ea047ea4f07

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e04189392effd6a0f6342a3b9cd293f5

    SHA1

    2e294acda35237636a0dad8d8781c0ecb6fff0a5

    SHA256

    e3309d3d5ffdfc4fca64cecba9f4515eb2e8adec8e30437dfe2d934acd424b5b

    SHA512

    ba1decd633f4d5795fa19e03f4cd3768d851ce415216d3f179f9148d12eb120a228f45de2e87b173f563ad47e0914b677f0f9b3bba1b7b80fdd670c1f5af3e7f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4aa5887d7e3d7b6746e6b91b6bad9aa2

    SHA1

    e55d27118d27a773cdcbac822a5a685060bcae10

    SHA256

    2a631b17dd33f8d1ff7b1a3112dab8d4df38d127cd38558e492fbbef2fda3a97

    SHA512

    778d7d3c1660ff557d13346fc20dabff02e0d50242ad017c09fb9ed8ebc3a0423122c5a676c70ecf12ee5ce0ac5e793e81ed9503aba2c83a4b4c10152689bb7e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d78c9f789252e40078acf87cab5ee9a1

    SHA1

    945c8cdf5cd7e5b4827eb55fea9d9e5f03e88b49

    SHA256

    6b9c97c863cbd945fe527c46c57907a6d8cf6fa16f30a1eca223c5461d8b30e2

    SHA512

    cdc6104bab5ea5cca0cabbb7f513df1fef826b9e3a0c5d97b159aa6a749e7d68139802dad9217068ac770837ddec5e8a45476b3159d8d59d61f84e263a32d1c6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cd85a8684656cc02309e5e0be6d1dd4c

    SHA1

    1c90f59ea1b51c7267e7bc5cae301f1dfdc7a6d3

    SHA256

    4a1e5964eff5f8665f3f8c13e015c523e83dd531c41e501bef9974a10c3d5c0a

    SHA512

    36c12d85219662cc8c4b97a79efa9d521573cac6dd8edd310f99fde76b57bfe0eefd8bad3313528dfb807c0280039ed008aabfea00039fadcadb233b3df869a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    06863c2ec2946cbbe9450d3e429c2355

    SHA1

    0ef4fbe8d8836fc55b536421ade01809ec2168af

    SHA256

    4a43374e69a0d2b01c71dd09646d76061e5aeccc0ec54a162e3100aa02908ed8

    SHA512

    05e6ec098643db06469536e62f88a9f658431056a552ebd2620094193d5c3c0043492b3cd50a223dd1c3ba12100af277cf48aeca4c1936c789df8161268d5c64

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3c238d735531ba6d03ad3b91681b7e5d

    SHA1

    54ff56260d99fd571b20474b68eefddf1220cfd4

    SHA256

    054a803370cb3adb2b19b4c1df1c3cd166dfdca97cb8d88a19f217965821e14d

    SHA512

    d04310328cf70771c5c56dfdc06b451b98223b111664dcae8e6926356756ebb583a99e6a3190eb5635ec87bf2dc545519c075f603d7b2b08327339f19f8887bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2e711ea7181864505cbd9e2f3a878362

    SHA1

    9c10c2a0da3ffe06b776238a44472aca05b194f5

    SHA256

    382881397e04e76f8a1a915b2788a8c0b8b9b3fbe43679899bb4d606f694cf3b

    SHA512

    cd33dea9de64080e6f5c9d693b922592e575b0ba62912303ee660927c553895b3323b00e14479508595ed594ca17f5441b307239fd31e24443dec40022b19e94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3848803e9572b7aa0309cc9feb5c3e90

    SHA1

    94c888a47c8d430c3731177e7f202ae1c6c6b695

    SHA256

    e724df48476dc5c465631dc5c4751e76019173ac2218e13e899d9f16e25284b3

    SHA512

    43f8247cfac2ca44a5591178cb1132e6f6667df5854796f276b789d3dfca358f61f07f8e8260af10a149678bafca25b0b62d778dbcde619561c95b861279c01a

  • C:\Users\Admin\AppData\Local\Temp\CabE083.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE0E3.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b