Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/09/2024, 18:25

General

  • Target

    f69a1a22337a697477f5fea67960d914_JaffaCakes118.html

  • Size

    2KB

  • MD5

    f69a1a22337a697477f5fea67960d914

  • SHA1

    79726fc6826e377281b1126f18cc49dd97965c84

  • SHA256

    67cf32c76c117f7e79697007a637b5d6939f18d6743f07b1c9fd9161186f8198

  • SHA512

    89690711b79ec02ab46877e37a916603ca37b239f7497adce0e985b1bea3aa2d283133056fbb00ea9f3f15cfdebd0397d6667afcee8af1bd6bde8a71fff682d8

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f69a1a22337a697477f5fea67960d914_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2520 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2332

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aa7851bbaabce22044d1c911c6626fa5

    SHA1

    0b6e5cef718e86d2e1facf129453a270bc385018

    SHA256

    198340ad15dca8b7b897a07ceb5454aa67dbd1cf368ce2994e225cbfc017bc87

    SHA512

    8e13dd0d23b2fd69e98152b102ff6356fca3bff544acf6d3dd22c2f8c49694a6d9f501cedf8f5cc11899062d8023fca11f4d50612f2afb6999e3fe7fdbdcc4bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    10b9e1d4ab6c72375f371216b157bf44

    SHA1

    8eb8ea06d7be095e7034ae3b4f35aa07f1ba8aec

    SHA256

    a24e458a6edbadefab4125ea355351c65bc0074a82ed0d0543ecf78b5f3b582b

    SHA512

    aa98a9edfe8461459586a54251a1cb735b7fc3b6297c5ef7c79aef45764c865ecc27f5bc28102ea7e3a7f764fa92d9b3cd838c324d5e2e1a46cf8cdc488dc416

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1b923e318f08b5f4df95c13f51cc39c1

    SHA1

    688691e4e1a4b127673527ffe80befe032466c5e

    SHA256

    fda57e246e97df34a0e09b29789a552bcfd5a86c39bba60d3016f10b49a9fdcc

    SHA512

    93f7b11841c305e74545f4528168a1671bbcc8aab4f1dc0617d0fe6d232123dac2dbfef34234bdfbe93115a64a8d3b21eab024969aebf7ed41202effdf6cad0f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dbe96f9643738000eddf02b88772bc90

    SHA1

    4ae0505784e1e544631fcee129bebba29ec6671a

    SHA256

    137e0f6af956aa0f53470b93fbba83aaea3833ab017b1b1befc9d415e6470a11

    SHA512

    492feed5996e8a8a50362ebcf7b321e846beb7223b010629f6d7dab0273eace95a275ad9bf17dc3288c776a7d2be9eef63cf1edd5a1e567f70cec78ad1478f76

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4c349ae03e2d135bffd7488f56ea98f6

    SHA1

    313408023bc026a67a3c98ce5cb2db3db1881358

    SHA256

    566b3dd29a6f489e84af8a6362069f6f5ffe6b28a7b22d05504d93273f84b73c

    SHA512

    7efeef53dd40c92e11a9880601a1547d6c40b79e731a59686c77b15b14fb65164f4ff44dee0f1be41592a31cfec6bb815fa15cd2e6b3e6f70b52f58e870be3e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4dee467de963b27151bf7d6274bdeb43

    SHA1

    09cf76962bddd81c0124803f41c22b10309e55bb

    SHA256

    483d75e17f9415656fde03ae8fdc5b4d23cb7e6161571b194eef1ee02ae83bf5

    SHA512

    cd3f3ae92e13f6376fe3740207cb6e17a88885525519c1e89fc5bf80833b63249c13740df754a28f94ae99e90aefc2d0af92a8068c95f4adabdc790b23db39f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    02a1b5f509da666400ce2b3149836e6f

    SHA1

    a2bcf03cc1962f310e8b688e593b7ac97e15ea0f

    SHA256

    288228cee3b64b7a962df80ed96986e1fd39b83973c3cc2511fd3429307fbc93

    SHA512

    49ddb4cbf06fd709c4bcae12eb75826926d9602572d60eebebd7e256260cbdef38d3c06d86353e23f92c34151cc017ee27fc8aa37fa016fd7215c16d8db72b31

  • C:\Users\Admin\AppData\Local\Temp\Cab2B2.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar370.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b