Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    133s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 14:12

General

  • Target

    eff78c7a1b168ae71cfc64ba748a8bdc_JaffaCakes118.html

  • Size

    27KB

  • MD5

    eff78c7a1b168ae71cfc64ba748a8bdc

  • SHA1

    f3fa04b3dee410000a5b6130f8b9bd4f6910ed25

  • SHA256

    9ec98c125269b7cbdb52a6e404b6917c93d00e5871ff7d481c9dfa38e2e228a0

  • SHA512

    361d048a44953738e41a98fca9326685f3d3661f5fd0fb8737c1e2d3b05ba6ffc3fa441d1e3e8fbc537223bd5596659080ea9906a87c7e09b53410c282da24ca

  • SSDEEP

    192:uwHAb5nVmnQjxn5Q/snQievNnGnQOkEntcSnQTbnhnQ9eTvm6uvNHQl7MBPqnYnE:0Q/ECRWN2SpE

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eff78c7a1b168ae71cfc64ba748a8bdc_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ad21c688744140c49fd938649a1d24a2

    SHA1

    7613ab8a031d7a2f0f090c131e091ea16beea6cd

    SHA256

    a1d477473c1741399997e428411cc3a58b7509d7476469e3b29f85c93200b046

    SHA512

    15fe144588d8bd309df7af4aa80c49931e2498472acf4daf2c165839e226e70c7018c11dca07324716952eef3387b9d74bd6533119e1029095e029ee6feb11cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    686265834ce922997efde544149f2024

    SHA1

    6ad0ef851233f1b0ba2454f0c52b600723905135

    SHA256

    aca5b9d5b2021a795f83c91305241ce52742c03aadb02605296236f6fe7577c0

    SHA512

    560a996eb571779884da438416ca9c6a2fbc52f99b783eef3be5991e78e5f9aed1b7e78b6c966be7366edecd0873560fe6bd698eace90fead978d422a4b4b92d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b8b4589216399fda08ca19494eddf28d

    SHA1

    0c1846b1831232572fc8b90d78871baa5dbe7171

    SHA256

    b89eb8d71c692584ca328856811854549888b465e61efc9dce8f440d3bd06f20

    SHA512

    25dbb90582df758e0c972f8c2f2367939714a88beccdc98d5ca0cb05749039407289b846d8512815a0c72d13c50962f96563949df2d96a1f2ff1bb89ba6aada1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e75a9766ad8fa43e4767654f362ee201

    SHA1

    970a0760fa276f6fa47b4ae8da4376a64ed7680b

    SHA256

    70d3d468d5e959e876eb6c7206da26b5bb9ed80ef8cbd725c38dab64daa376c5

    SHA512

    ad4f0b35ce1263e1f00feca1d5423d682bceee0aa0453746032e3468c91bf0a52a8d5d5dadea15d01212af9d6f9195c1b1af534e564e5fcbb3ef5ff9b5448b11

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5f7d6deac9d8caf8ee8904caf55febaf

    SHA1

    a5503bd2214ff4d936012609e1821692b898dff2

    SHA256

    204811186ce37f4a72e53cb229b9399dfcee4a315c75ac50c85d507477917653

    SHA512

    c8b83d024b53860e638074d672bb818131735e73a01b19233576e2f62c48d5445c3b434ac4e59380d1d9b3dc99f474b6c4e86728ee5b3dd913257e60004fd097

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d36706810258f6f65f666711fd5ac06d

    SHA1

    58c2de7fbc386dcb37746dfb589c8bcb8ac069d5

    SHA256

    46908a2aaf2bbaf255309cef15ff41c4981ca3a868523ec138d2fd295786dadb

    SHA512

    3e0d68aa0c0d18504a815710bf70c910eae3ab84f3c7c1715cd7589d9db09910b24df7fe56afd47f2436e06eedd74b4cdaaabc19549b04343984d391a9063eef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8e0b82741a34ea95bb6e105c9f5a44a4

    SHA1

    b49afd3aaa9de783856d886a9a3faaf4afefc90d

    SHA256

    4150f242afa85e134fe345bbf2c60f64e97c510fa5a3cb35e6ee0a939dd1220b

    SHA512

    418b8ce30d1d759111b3377a6d2a15bc1f180870fb39e149dd0534c789135d4e345e6a0c13e1236e26564b293fda02aa9f770ef144031b1cf9d131b969b6e869

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc2213da8716d10c915c7ef7f944c1bf

    SHA1

    578f6c992d3c9ec7051a1dea99187edd9c434212

    SHA256

    0d5d50b098980950c8ee983453bf36cadd679dd7d7f9c1af1ff401b773140622

    SHA512

    7717ed8ab1c1072b2d0288c5efc7fa3c0626bff87cd647423d7ee1d1c92c177ad51bad6e88c41248e324346a50193971cbb015a488248da9007d7dbb43081aa6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    54972a1c61c0e22d7cf2918b7e0ba932

    SHA1

    f88d978613fa3f28b426666276ef6f57f63426f4

    SHA256

    4d517f7727f6122f87046b7b379bf12f64a34b37300a16e51337510e4afd9533

    SHA512

    2527bb667ae42b89433eb7491104eabf5b2272cf9b9fe88e04c5e436c4b343f880e1a2b566ee9ede709acd929b421709bd4cb15eca71e4982ddddaa72eabe288

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9cfeb2d9825df9f3f26efa883dc95de7

    SHA1

    ef6956b0d297509a1f5e7ecbfe56837b50d8ad91

    SHA256

    0b2d19fe945c40f3ced1c3530b269d6570def284ad9e9f768d1ac1a2109c120a

    SHA512

    0563d5019ea1d7de2f094e59cddcec0e9d5988aaaad7c8c7181b859a743c34bfcfd86828a58ec87ae213a8db956d52c4e56b7a7b7277c1cd9fb2d45d0ea5df95

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    54fcf40fa5f879f523fa13a8be0e3273

    SHA1

    73186dabec5fcb692c48ef177397310ad73679ec

    SHA256

    d4b5db0b302029940925bef438c33b45f1afcb634513ec1f9d527060681e3041

    SHA512

    0c04ea1e6748eb113402c620a2a80f47c75abb9f3d306c34f864bb9f949fe957c802092a9f75f61143b62b22355839f21594494c717a91a2dfc3786328b1fe87

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    63ff444d2c6075067523bbc7f29e6d4c

    SHA1

    c41b5d6815c45bc11a4844f9fcf26ad1d9a2d697

    SHA256

    b24d62dc2ad0811bc62709e824309065012bfa79b2f787f35ce00f7ae6a608b2

    SHA512

    ed0e30033f2c50a4fb8a626e90b824a6e1f4be95668613c59659ab6a7b70d0636eef9a3eb24a92c93bf81cec7170a1a9c5967de834fd0b4cbec9d4917bc5c4c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e850d1872d6ac392a02f49f4160379ed

    SHA1

    ff83a2f938557850807fd8a540cb8625d0b2e0ac

    SHA256

    de7190138c7517041004d832c8ba6a4e9acc7492d36e7e07d10f37a62e236ea3

    SHA512

    9bab3e9fb2d1b059c62762f60041f2ea76dc12f979c8a4fa4247e2b7127a061b905ed83393e767997ec86823231f67647a42799a15cc8dc7798a2abf808f4a5c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    949bc25bf58896b50505bba49b640e5b

    SHA1

    e67f4a88b3283f942708acbc475db1f7c4767258

    SHA256

    c8d12d9e116840f42850e72c6bb26b5f0840a35f4636fc99f02f5475678e574c

    SHA512

    5211e30523d01305a9fe26db0a1e2688849f37497face1c47766238e55fa2688314e089cb20b489370fd95e9d8366105185bf88b903089de5535e1a5b7228ea8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c9c9989fe93dfae3a161076e3e9c7f44

    SHA1

    271bfe7c6069d4d4db62f200d95d1e86b27e4120

    SHA256

    fcd88412af4f0e36615cdddc2168df937edf93db4427e7d424b059a14c03af9b

    SHA512

    65c2a5ca3400e4b90a387ac0e631e15eb592e5c28b68bb3f404291890c4407ada491b20f89991a5929ffc2bfe3ea8b01fb1a526012eb0235673fbf2ef47511e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0f1348ece7a88fb676ad375ce3183006

    SHA1

    92825fbbbc46d8496c7cc895fdf4d84c1f1d6d68

    SHA256

    1620f226875a5345ae750af9d98aed92d99fb74b46a99918d3446c0be565d629

    SHA512

    a49dc24b09d4e6161beaf7ac42fb023b979d07b0578563e2ecd9de1d553060778e101bbc7b97c5557b6e7d69e1dc62d6ff5536dd6ecc072c37aeab5a94e6a06f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    24d5e2511f4ac9f43d65161af302922e

    SHA1

    b94eca2656e5554f31c2e1126d67e59badcec59a

    SHA256

    c5f9a293b619d97dc9c40aafc6030f3128bb015dd9916a5241d80e8c32c9aeac

    SHA512

    40876a1a0c204bb430d98b23d81e5f0b6040f6f558fb1af21cb4a15e5b79ffadfbc3caa9e4e4cc2267c7c8e2fa3b7e5f6f10ce1ed48c439bee488f6fbfa29285

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aa30b568d2e6ea2ab3dbd89c4b9ce97b

    SHA1

    4aca6de02d221c961fb19ae8305ccea336fecb2f

    SHA256

    ff761caf7126daf42f2b06cff93b02f28df0026e9d1a31f9ffcee21574eefe15

    SHA512

    c99779842edc4fc7bbaf7bf7c83ae0063e6adf163e6127eaba40a6a3ed524c86e899a0339bd49b09c39fa522b7cb80b5aa6bef052664b6e05016d4ff487d241c

  • C:\Users\Admin\AppData\Local\Temp\CabF078.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF128.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b