Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    134s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27/09/2024, 22:01

General

  • Target

    fafac6d4a2601d61a605875f47a955e8_JaffaCakes118.html

  • Size

    63KB

  • MD5

    fafac6d4a2601d61a605875f47a955e8

  • SHA1

    ecbe7dcf11e2cf6b366484fe300f68db15b6e4cc

  • SHA256

    df9e4ce03073d0fe02a2a830ff3aaa017e72e8d8b402c814e2b264c50c6faef4

  • SHA512

    2d8696c0f640fb4fa7137e7654d1792c7ea2861cda1464575a87ac3e39ab136a2c250077796e020142cfcd3a652a07c921ace4bc5e21ec56f8661162e7ed1b4f

  • SSDEEP

    1536:1sc2i/juqQhtmEcJOvlanTK/5BSbIFe6WErUJ2EweXGMUgL43np1wSf:1p2iKxcJyg+/5BSZXGM0np1wSf

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 7 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fafac6d4a2601d61a605875f47a955e8_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2716
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2716 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7c2000d0b6bbcdc2865f331650a28514

    SHA1

    ada934127539681adb8cfe98e36ae577990617a3

    SHA256

    7f9d3818ae724b3056fe5724d66c8e0d7b212dd67251cb8e5391622025b27271

    SHA512

    3125a7dadb62547da778626682c8bbcbb8562527b5a17bbf5b2ab8a9e7faaea87ae65a3e4faf64605352f052c34899856f5176aa84e0f9d85e99e21999fb1792

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2be5dcadd507a044b983b1b85c414690

    SHA1

    e126df5cdaff06adea63ee424ae0950cf91155a4

    SHA256

    907d4f9c57075639ebd0eb5b13a7f43cc755898955b36f0541f1f0b3095f504c

    SHA512

    a9705554ae4d5223ff232a1cfeece71dbc41f11288187ca1a03fa827985e25499355c90c06c8ffc833044b134dcfddf6f2e8717311bd0dc5b9de514ecb886f17

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9f6d1da661f71b81329f1bd6a981fb49

    SHA1

    7495bb4a39c44d26336689228bc7d49440d26cba

    SHA256

    177dd95568f1026381fa5f25baa0bca51dd0de88e56d2d763ebce70d4679674e

    SHA512

    2a147d0766cd1c05e7c7fac614b71cd21e06e2d8e7171345329c63a21c37b4f44cdc2bfa4e5b7a806bd6719caf63c9bb0e5c4461449954510564a3c3f4409219

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    89524719c0173a2dcd44cbfa2b1186da

    SHA1

    da3f8d999436ab911cfd1c3b1f0114e05c9baaa5

    SHA256

    f6fbd48aabe1c953c67e56c0665eadd5d93975e04a74b31ea6e403f074c80b6e

    SHA512

    f8eb215a84070190397fbfa1a05b3630b2cb7d205d4b1f7110cc898a777aa3e1ed04d3e0653a52c185e80a0f0c56282a2fde54568154dd4759acdf7469de9c1a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c951734f4fa35ccb5131a897df45f0d5

    SHA1

    1717db6073f3e50deda1512f7c63556c41781ddd

    SHA256

    df670ea9d0ee6cf447f77b7727d36fa2c4fbb314afb0f3694a05ff1b71385564

    SHA512

    a89ced1af7fe66ffd781bb9ecd0cbc496932ca4ef3b2331c10d240f325b5b488fd9bb7c935738657849710ffe33ad90500cdd779672d80b6937ddb1839c18d43

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8b5cdbf9aef6f6f05227f9a75af4c482

    SHA1

    1286c26cd6152ce85f1dfb19f2c3b2d79951707f

    SHA256

    17bec34f6500bdba39ee50d10ff2fc4dc39cb4e484edd704eae49c8d284e462e

    SHA512

    176594d2ac20885df503600c0834115dd1c391ec95c1fce7f88d0327ff6882fb4f30cbe21f88efb9d9a2ee062697a391d5c7a67d52faf9e9bdcee00fa22b38b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fce1b19c419b55cd7c4c31fc177c0271

    SHA1

    2eb735d265daa4542bf7e89640026b4b0f1894d1

    SHA256

    14454f8f5d4cfc47d1314cb8bb5abb948daa87e92cd6c77b480625381e9e67a5

    SHA512

    93e54bb8f1067de44ff52faa5bb0980a7b140a81247cb0c65ea04e46abf36ca6e9ad9edc960c15440c8adba228137128b866633f4c3e95dfbd21b867ca403a3a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8ad0dfc8a2fd0dfb92192b3acb1e5ac5

    SHA1

    74a1aa48ef7a01b65ab2c2e03c8a82fee5e8bae6

    SHA256

    93cd3e2654f6b02ebd4700c9d7d174a7fd08fb76195e20ab3f1dcda8b02010a8

    SHA512

    560d6a6af73e1a13964e24adc3814ba3e04cbe33c596aeadfd9c05967ef32e07d8d096a53dfa7f670a6818bbff80a10ac0cfee46fae2340b9e272c2a8db6fb7d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6e374116dab8b0dd4edea41a8855db61

    SHA1

    4d1cf676c32520f729c47da90b9f9196811f61eb

    SHA256

    9e7a67e738894ef852b445c5dc50d9514b785c5d29cfa936bee0d06531a1d22a

    SHA512

    d8a340b8c0dc57da0d083503c3372a4481b37512c982d1816e8902e909853232d738275576f3d6787d6e69f3e00a425d209658756380d01534ffacfd918c21c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5a35553fcb81a98bcb816c6a0c98d824

    SHA1

    84c6aa3cc53c5c7f76671ad79e88f7f0ab868fd4

    SHA256

    90d1cffc13212da2ca33be12336495504b9019102253f3bc5f422305084a2370

    SHA512

    eec445a5710154e641aafd19b18c2febc522865718799739aa69cc9816cf5e09eef9903ed76441d4b141d943e36524f12a99bc9d402509a094cc85918a1e3acc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bca380a900e9efeb65477bf5e1bc4df4

    SHA1

    ef9d94ce4f8cd7821c14198cefe5d459c7953851

    SHA256

    3fccc5b1135ffc5a1e4e04c1a617f4b8d907ec3e43f186df3859b128693255bd

    SHA512

    4e03ddf86e48ffb5546fd63dbe20cbcdae93a071815be40d9175413e5711638f6c3320c6786eb827c3712efa2fd9dce0040ae7fba792b811c557ddd9b229d3bf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    18ee092484be11b2326d6c848e67e9ca

    SHA1

    547bfbf39c678339121af0e29d9f2bf013b11750

    SHA256

    6ce4d7f36a7f9c68d57ef44ccb030b26cd938822918ba4456e92373b008e94c5

    SHA512

    ec1abc602279bd577013679a0cb343e04c9fb376d6e0dc264b664d42555e6c3abae485b42578d3cf8b6062aaa1b8c6de756d39ec288adc9a91bb3674da01faa5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b8876dd74c464671dceda3faf2306577

    SHA1

    8b90967da7cb6e0db8e48d779c1aecc1d955e1b9

    SHA256

    60e142132778ab64ebb0f752522af1a2d108bb296cd72aef556c019168b8b2a9

    SHA512

    616913b11d178e38750a5d0ae1af6a6008348e8930d343c5c4c5ef2b0046783a9236739394dbfcdabebc3a605f7621771fd7b4aa2801bf1f726b831ac6fc9c94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    067fc0b1dcc4a304e59876856f84fc3b

    SHA1

    1a392fa8ef454a056b49effd0dc3bd74fc817e8a

    SHA256

    6e0e0eab1bc23a8242806462f940dfdcf8ad98edca609c813091d310a5ad4f12

    SHA512

    b31c43231fe3d7a63d6c73f212690c0fa60e1052fa1f7390035ecc0ecc8fd7587a714e0492862aeb6d799bf60401e6361512a99e4e714c7c1ce385801f9c2d83

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cbc13a8fd4c98e3586bad0637c0431a2

    SHA1

    9dfc5f384922cb6c9adce7d5d117fa885539b3ad

    SHA256

    081e8fc618cda1f3c33a7a42cbeb9f4f7f6c378615b4ebb63c3e2b0b560e7ab0

    SHA512

    013a0ba674c666112a0f9a3258d456e786f2fb214a14ba6ff63f947d6f3bbf691689d5959633f4f793fa1911a55e3815ba355819d22b16c91f40a2d45497b95b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c7d4180d9427363f650bd7f8107a2de6

    SHA1

    175df0b220e7af1f65677da0a96b99c207c63acf

    SHA256

    e622b99c9de84ab47ff562fa800d2cf5618406ca305df80936061d3744dc7f35

    SHA512

    4a48825f4442767e3276b17b68faad9873d56bf3cf8404a4c6ead8957f3860521c7b817d527381cffa93641a64eb46c681cd038555ca97da864ad79201936450

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8bec9c112724abed6fb186f8891c7859

    SHA1

    8c7b9e00543ca618e210b4840f899abe6b564d70

    SHA256

    acf7652c73fcad3c4183d44575e4018142910e2d6be71c389d642bfe40a249e4

    SHA512

    a9570ae0df482aac75bda45224a7fd5d275a3cab00df44a9eb02ad2120e4b84ca12373ce984ea32f3c33e24efd6e53c6cc40fb18d2e1da7642b8edf832a4aaab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5bffd1592bac7a663cbde2d2c9e35c91

    SHA1

    09a9518932094680886676b7242616b8773c69a3

    SHA256

    96e92a6866c18f71e0ccf3851fe619b86a343f37b10f362f4787159ae0b6bc95

    SHA512

    acf4c44b50a36d711816956f7eaba8478b1090004c8ca8c742dfcbd42c8d9ce82e3ded058f1472ee76df00564e11cadb558fdf2f866c5f56d9dba57d9332c3ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    44af19f3619941f9223aebacdbfc2230

    SHA1

    041b466d5aff8323e94ed0d9d5f6176e943d69ce

    SHA256

    ac65bcc56004d8f19e079b751ada9ec73c640bf05e2be57ae97c79fea3c0f3cc

    SHA512

    659684ed94a36c8c8a8dc2632fbfc1ece0042cee179e17de1c3e5657e3720faf88e6fe7d48dd28b0e98c3d6f78939fd2a95614b9a819fd6c27a3ee1ba8ad87ed

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\633SXO0D\2254111616-postmessagerelay[1].js

    Filesize

    10KB

    MD5

    c264799bac4a96a4cd63eb09f0476a74

    SHA1

    d8a1077bf625dac9611a37bfb4e6c0cd07978f4c

    SHA256

    17dce4003e6a3d958bb8307bffa9c195694881f549943a7bdb2769b082f9326d

    SHA512

    6acd83dfd3db93f1f999d524b8828b64c8c0731567c3c0b8a77c6ddcf03d0e74ee20d23171e6ceac0c9f099dce03f8e5d68e78c374da2c055973f6ac2db4e4f9

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PLSLTMYI\cb=gapi[2].js

    Filesize

    66KB

    MD5

    aa012028297a26c039c37ab25a4bd17a

    SHA1

    25f23d01b5f580c00778e1c010225e5b8c73b66c

    SHA256

    55cd2316edf7159b623e4ec2c9e3a334027c01e2d1cc386f833ebcd35ed87b38

    SHA512

    d346eb082674fc26d562da9a12f36ad2cc7db1f1b35c891a8734284cf1bd052a967137c1281982070688b2bb2e06c7f4967d1c9397311a31a11a8560b9c45fd5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QS2MOPHD\rpc_shindig_random[1].js

    Filesize

    14KB

    MD5

    e691b2e17de9ec018eca758518bf5dc8

    SHA1

    3238d543acf53b803dfbd260405fa558717daaff

    SHA256

    438d41bec769ff386a2c1555b6bf9105362f67dc3e711c81c6092ee7fbf6ad2e

    SHA512

    5589a5cb408ee8e0fd473de24224ba8fa1453eba5df6e591570810f992160d4f3e8f60f8ba74d9994861759321f5bfe0c4a608636913a8407b5184008457afc8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y1738IZL\plusone[1].js

    Filesize

    62KB

    MD5

    2b72da5279576c62e6e3bcdadcfb86af

    SHA1

    93255909ac2892a54fcbb2a4445ec1aff46cac55

    SHA256

    4243c6d726cd3e7056a4ee7efe04d9eb84ee713bae54f0374d6f8d71d0822481

    SHA512

    51954e78603f08d4eadcfb58593624100eb8ecff1bf3f7cf4c6c43b5cdb317daec90e6919a71f12e850f424e8ec7e0bf51a9c782beb5a3b7ca6a8c604a522872

  • C:\Users\Admin\AppData\Local\Temp\Cab1595.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar16B1.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b