Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 19:01

General

  • Target

    f073b6ee2e00f45cd19756a38abb11c7_JaffaCakes118.html

  • Size

    158KB

  • MD5

    f073b6ee2e00f45cd19756a38abb11c7

  • SHA1

    867bd7d61ee651db0b981bf6dfe2417ecda14c5d

  • SHA256

    80413967e4851626cf1bae74045882e1b1c950ab6e765eac18f1aa56a3ef06da

  • SHA512

    3bf1ce3ebcd874e595d6c969637cca19f0935a4022d2b752b0e64df7647eaa0d6ae61057b5745c0f0c4815bc6099fbbcfde159d241829b03a0766e1b44fb3ca4

  • SSDEEP

    3072:MGsWV8GOCn2cuvONWu1WAzxSqztM1wB41bE7DO:UquvONV1WAzLIwBME+

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 9 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f073b6ee2e00f45cd19756a38abb11c7_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2480
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2480 CREDAT:275457 /prefetch:2
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1080
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2392
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 156
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0a94afa734c04c8ef47e850ccf625075

    SHA1

    b8bc5ca37fe452773f7d7995bf6fc4b172b7cec2

    SHA256

    05fe29c9abf776e641229b91325b6da1ac1d864a63afa932e96e6c9c20c8ff40

    SHA512

    f53aea13da9e09c31e62f7abd805cf67580f23c97bde3fe4ea82b5f4a8a8c636ccf9f0fb72694f2f01915527a7b6861306e5da9a01c47d78eab5613a3450bfcb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7f5560629b6d009468eaf8b9b0c7e035

    SHA1

    d182a2b1eff406c841d82ee4ab16d41ab632307a

    SHA256

    341cd3f71dc86b56c1ab0bd416c72e3b3010f99fdc42ff93e574e5c251c77a12

    SHA512

    6950094b4819af4aebf195e2c506bc9f6d15b3699c0822e2364fbf70d7c05ecc23410fd54771f05b0187742f3641e66a7760b1bbcd0ab73e6dc0bc6ecd4fbd9a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    54c4587f0cd64b126303fc465dba3898

    SHA1

    76ec1e201b39205ebb9ed828aece4d0fe64fd598

    SHA256

    11691177e943aadcc6ab3693c3e3bd05f0d9eb13b1549310e242ab3996c811ca

    SHA512

    0f2e8577a9eec54f097a88d9a8d33a4f43a483f32a2dc92fa230ca565b47db5bf76752ff536dc63d20ef9222c84059b5e0eb58dca056c709c2d30e4d98b9437e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b84e35db133fcfd353e12e2efc2e2e8a

    SHA1

    e9656d9d6c425ffee6bfee9b221ef7c48cca6076

    SHA256

    473ab16d3f16cfdad4cd7c49e8784a1461766fdc8114bbe2f164a906cafed027

    SHA512

    59276abe1f7000a7fed6a608a87d2cdf4f10f9e822ee65db43d1a8a1ed67571278b38ed35ab9b40fb04b2ee1399b77712311163ab3607c423768f51f25826602

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    62093210d0ebac1a530f420d3ba30235

    SHA1

    7367216fe37e2e667062d446d999e42bba27b34e

    SHA256

    d33927b296d0ecf45f65f5599b57fc8fbc95fdc3ba5cc8dab81e1dd592a252a7

    SHA512

    194493aa4fcaec206271faecad6ef9c7c3d99affb703b7ced229e002039078f78ad11d755ac4246738b8e51dd37d7d7298f0e931f3d22929eb5ae5ff5f77df77

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e32962d3232bb083d456165eb74b7722

    SHA1

    a7e9843f955359395c3bb37e9e8ec944eceb9188

    SHA256

    aad73b5eaf9345b35c54f5d6cbe60facfe887ae8253f58496a7ff2cb32b24d98

    SHA512

    34d63001a676e4cca2d8c47af346df857098bcc021d51af36aa16560cd7044f0f41f6cd25f87d60e43112a8cfd329a686d29de9aff1c10646f4b28c6c7189d8f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ca224f75641760ae7f18713b2d3a2d88

    SHA1

    64413144d0e2b90b1aa482d2d64786ac4ec657c1

    SHA256

    1f37b0f9ab2cb46b8be5a0474bf3d2e150fe7defb612fdf9e5e267524e549109

    SHA512

    08e92766c351c44376419c695525338451b9695afd210ed16a159f4fb45104718a13475153b1c4dcf9eee1144aacf971201efb1cea753204d40b0eb158b9ef2a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dbe60cf8189f0799f97f78ac13d365e0

    SHA1

    6d0c8f1c467e43bc3d11ea3dd0c9025f64e3b61c

    SHA256

    b4106b895b4a6e1542e9182c106a987e8766a40c67b6114ba0991a098d2e3a0e

    SHA512

    9b8fe12e736872b82ed816cf4e7b8dc54cabaeaa5772d4626a6193172868601043fd27b3a0c1ec4ad38330ae0fa825910fe65cbf146df239bd822b35e4dfaad1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    033701f6aa13f8c055bb096d6fbfe191

    SHA1

    54e79bed0cc61713644b38de200282056403a602

    SHA256

    738f2db70ae49a26f662095ba074afbae875cc93dc144cca135843add047340c

    SHA512

    96fb87be544e511f3bbbd8e0b7e8804efd63f30c6a5d9dc1fe71e3109bde39cab16798771c385f402e96a7ae26e8b830b31f8a63ff72804d4f5408f7d57f4951

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3b72abbaace76a138cbbbb813461e3d1

    SHA1

    1799f0335baad1b6c53e952af57aa980db53db0c

    SHA256

    4f5a1e7c7b2a4f11d4be29eaddb672ae099bddc24c8de399167dcbf8cfaf6da6

    SHA512

    a09a1a5442303f7100e6ba1e14ac35b71f6862c697d8cb297fac731041c658308629121b5f67184a07565c639b5c818120a30264bde34366fd2821b5420c3acf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3aaae14c9e66df0a8551690ecd899cd4

    SHA1

    f1ccfd8c2e91d11f54c71230214f5f5c8e0947b2

    SHA256

    08bc0993dea47d07531838663d7be0845aa9227cb5e74e7edd7949292de0c7f0

    SHA512

    9ee691422e8ce63e973f47f1e3564b12ef4b29e1ae114db3b3d7fc0a6d4d92338dce524906054c32354bbfa91da8c0e8dae74ebeb3adea38c4d4adb1fc6b51ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eb539f0040a63412410e3b444a549b07

    SHA1

    cb42a4923f582707a7b308440f55cca544d5014c

    SHA256

    503b1db4883dae8cbe70d5b511679ee2aa444561e2aa72f11f8522e9faeb1bf3

    SHA512

    0e89a3021130da38b473a4e5131dbb988e88b00d6d2c563fc5bc36c312fc0ffa4b09a3769e565864ac7518b5a8ecb1260c8250b0b62179841618a5f5220ddce0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f255237e861293c52d1c562eb3072428

    SHA1

    3444b9151a0d099e7bff1a375d7c71bf59ee5925

    SHA256

    87daed7f7d698a4f81f601ebcb75f827c05b075d1cc38d5bbb1844c738212e5a

    SHA512

    36ad7f782b736887bf4c736c6d7c090aeb70324d685c63c8b34b39a2e96ecc12c0053cd855bc99ef1efc0434ed3480201974788fb80c30e2ed788ecb2ed5a1fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    61a71227e978e22a53bd5f8a68a745d2

    SHA1

    3e014b019d179268f5716d876e57fb6d2d9e1f34

    SHA256

    c44370e6466cd5cb2b843e9febf11be27f306f62438468c8436cd702fa725c14

    SHA512

    62ea43f7990b8ee3a665b56e69c1845b71b3a25b74dbb7bbad04c293dabd159765d443f8aee99cda516e4a7400c5fe2da9d8ceec667f6fccc008a280706e5870

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6aa037b924a82faf5882524395d517ce

    SHA1

    941ead24568555c3c7ce242a325a0863e8afcb0c

    SHA256

    e391b0d0b2951f5317f623c0a289b310379527357d750950a70014506e67a3db

    SHA512

    0ef28bdabb216909d79f1808db406ee273e6bc8d14b6b13e951ce7ca3ca22ac31bfad0258c6afd9d2591a56acf0cf71422c4d1a1decc80f74bd5aeda58b35ff5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    347300c7752ccfc4fe95733b14d35ba9

    SHA1

    33b407e5f4a2cfe75a0bf6eb4b39288bd1b8e3b5

    SHA256

    9f76777323d3ee1f8ae5f51b1bf11d75934eada9fec9b8093a6ab8f4857381cf

    SHA512

    f20bd759db778c187537891722357d15f6d6a2926acb4694eab81434f3ab71c0ae65cee27fd0065b4f5de6a8b6772450990558fa70db0854cee637ccb27c2cbd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5dc3d72f2f12b2da8bda941e57a4404a

    SHA1

    6d224567b5342351983b4b02a3588f671c4cc83c

    SHA256

    30a2cada20d3d8d8ddc2b7e1c6da2a43cec4894cd4360da79f99bd3e7416c646

    SHA512

    b8c1132482391ab589c3798c3871d0b0de215fa35c539054d7ccb2dfe9f39fc1f0af919403c5472b474071f4fb2952363bbf94f62f7734c099062effcccb00eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b64843dbaf843bf5100847a1e3906ff9

    SHA1

    f7c0788da8365b0abe135ae9b9ff9b790b8b8238

    SHA256

    b11c8e41851816c520ea76dacba8ebb676843dfe85d586027ae8d874c31c1439

    SHA512

    dabcd7ef5b0281fb94a6f47b2a1b1045d203f362ecd5f45ecff2a865488f3819833c973803426c1f82f0692b403572211b0e96d6dceb46dfa025f929a74e2472

  • C:\Users\Admin\AppData\Local\Temp\CabACD.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarACE.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\svchost.exe

    Filesize

    59KB

    MD5

    0e0f0ae845d89c22bb6385f64a6b85fd

    SHA1

    0f3f1e7f18ab81572c5ce938d3880d4a5d7100ac

    SHA256

    5a5b85c582d5d4b3b912ee6789babebf8ae6d87330d0d33d87274841952899dd

    SHA512

    baec989a6329a2a60d954e83279fd57ba2000f8ed79e7a02d145bf44a5bffcd9a831c63f4b7d44e40c51e40b1dfbe72c5cebac04d0ce7b2295e3fd191b122350