Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/09/2024, 23:59

General

  • Target

    fd67799bb116a18a0ff2da099aa2b5dc_JaffaCakes118.html

  • Size

    78KB

  • MD5

    fd67799bb116a18a0ff2da099aa2b5dc

  • SHA1

    7e17679a104419afd291febe51e5236754e59835

  • SHA256

    f64e495bd0633b786f39dcd0fdb6cf0325ef2285d2029023c6102c035e5935f1

  • SHA512

    60a30f0a6dbee8179633f0cc82b70f9b1cbb875d1efc1fca84f74831e0919d5a6784f0ae93ceb160a5818af9c3676242793b9ba83cd5faa1a6b5afb45c7e87d0

  • SSDEEP

    768:Crh7ye2sH/MXgyjCKoBfuS/7FxIuKzNyGsaMWxS+uOS+V:CrhxbFCSa

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fd67799bb116a18a0ff2da099aa2b5dc_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2332
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2332 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1c88817538d4ec0fc18e7a8cb4a49689

    SHA1

    c1c051e7a1e0fb97903165e102384c03a6f50ff7

    SHA256

    7f9284f64c56b6731071b5abb7b4da2eb39395bc214e15068fd9c07cbb13644b

    SHA512

    f26a1b54c1819df9ceedff81f9cb972b6d485550f140fb8749fba9f89c90a7debd56a85acbd22695d75b3a5498341966c3a332bf096925b3d43f079d26f28046

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    171caa3008492ad7e4f1fe1a191b5bf7

    SHA1

    975c86a44d9fe11ab71170408f915fa1b93cff9e

    SHA256

    e901327ddc3e7c395f23c7bef2f2d126b83a62c1fe8c7b72f55bc0ca8f595360

    SHA512

    4429cea2b4766eb6ad9e13e09cb14fe07195af3f54dff985aac9d84e39a8d5111b6e527f2ac8f470dbd543b92d2feb20b03f91b399e398533950e83bed2ad561

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6159267954044827e40902668898eefd

    SHA1

    8673a17ac14c2ac734b9a2321d7121d0bccca537

    SHA256

    dd6f21a1120d76b5e4ccfcdd6f8142f4512c943052cc52cd3f0e1213d35f3c5e

    SHA512

    2eccaea7f135c0678cfb57707e81e403c3d04d273dd31c28d40f7e281b7f460008a53609d65076f573373dcd7cbff47af36157c2c6145a873758104d37accfc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    248b275fd55903e41317be0e0c6180cb

    SHA1

    f7b73fd019d27c3688073087479f2df53189323f

    SHA256

    710658d24645edc7a0a171d2c89db2a43a01f00aae07ee4c13e4289370108b93

    SHA512

    b94962b00fd7e298ee82fcdf5a150402e0785b2a090e79b626b05868d9af4f8d4bbb9e1cc63b1e8a8fddc73b22c7ae5d47c8d35ad496460a4d6596b9996a0535

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6636b6619fbbc6e87723649836bceac3

    SHA1

    ac82aa4c351ae8596856754206159d53ea485490

    SHA256

    7f1de11e0a36bda19d34b833efea1d82b78845e5279bd2483faccacbb17dcb87

    SHA512

    250aab3426fb6cc1e38c0fd92ecb6b4c464512bb72c7f860457884b4854588d06a11a478986fcf075e255ec64b22f52801998cb11808104b421957b0e0444b5c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ca575b8772d2413e06878663e2aad2f3

    SHA1

    aaeed87e35d941e9def11e82e5bdca29792c8fb7

    SHA256

    9a0380a45d9c257aa9e7e4b2400235ee41d76814a5acf5f47774fa7ce9a20980

    SHA512

    a8489e55bab78439e6c97b86963bf6199e47a5a10bc853250579da976e4faf777e8091c52c828d04c25d78b50b2e5691f13a364757704b5fe7cbf1e24d6dbf69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    35b832e570d2faaccf33f70cc365d850

    SHA1

    daf14b74ee33f3fbba9ce57fbb25023552cf9684

    SHA256

    1fa029cb0686873edca4e556027cd1bd0a50f8990318e65f6091d8d0e9132e71

    SHA512

    6a6166338d4b7881731d140e7428171884d4f8e04d67d005d057f8647db826ff6396c664fd7d5778037c84bf00060437f3e1b36ac07faec18e9980df01055117

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    de1f2fc03b7520d8ad92e7cdcf97660c

    SHA1

    df0fabf5036bc544564dc4b342f7c7402b6ded81

    SHA256

    3ad6421778a65f332baeb8ab37f5a293c18735fd4e722a13e298a12946b9b457

    SHA512

    68f8e564676ad1f4da9de4cab715dafa3497948cf9111d706c9beaca34d82f9ad118685391760e7126c3d120d5a10938c89f043ce0ed315e97bdbc08229bf207

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    86c1f3f8fd2b3b9d23cd6d284fb08645

    SHA1

    afa21ec143780c9519b385996af34f071c1879d0

    SHA256

    0156be0d99d5a872ba6756a4aaeb18e335a5be277357f27a708fe67c86c5c05d

    SHA512

    923ae40429ba08315d29ae3a999c80108637ae106de3a49c62c4bc84a3ba521e088255ff99707d0e87a787578985a1967c363d9c6b29a75b4ca461313719c3f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f551fdf3105813e6c0d0c36a6040452b

    SHA1

    c3d34e9d545863bfe47956036080570f46044162

    SHA256

    7ff8c770c666b704dd457942a272c32fe0e8dcac4a9796786283df499bb1104a

    SHA512

    2ac4020e6dff33903fe2656d341a48765bec488bb083f2f6da5b941af0c44f94c6e039c86d0c16a88c2489f559cd226b68ea5c3b4750243c31a2b75b4101a349

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    30da0a89d1c3df9a53bd4a9fbf36201a

    SHA1

    36586544ca4b23313cb741177c3e0beac886e1dd

    SHA256

    0f6883225c7199dbe3da7d0b1ed25f160a39b2d81baf1d05355d56f28a7f0849

    SHA512

    49af3288bd13f58dcffaad8fb03e5ba16a7466b90ea7999f07a11c087409b809ebf6ab0299f400364e4f7b16f9578f4aa7283849bea8bd7427f219998a649070

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ee74a61728407e60e22ed81c6a3cfb5d

    SHA1

    174abf72c239730603ad4f275559f0fcaa97ec01

    SHA256

    140e44623b70e7ca8031997462e6d0e5d8687e1582779f88aab6591279190366

    SHA512

    3056d9c275a038972db3bab26e963e2c12c0066f06636cac157ada38a299954f8a6cce36d2a7a686bedbc3cab7a61a378d0665359d60a9a2a95be6d8bb2a3fbb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    610b7504622bac1d14480d4d2cf9da86

    SHA1

    23c30425748b3f749d37c3d27d9644abcdaad08a

    SHA256

    1de28918b7a82f2decb98972a8063c1e19a9a81700ae67cf8e2874464125a984

    SHA512

    fc5010876c09cea438bfdac73059e27564761efafaafa26bc6eb264714573aaf0cc94a90c39c8759554d9b717690e888ce02852d3b1dde9a251ca6f223b6a946

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    44f4d075056ca34b889ea41cf8c99c95

    SHA1

    d715cee48b32dad5f63e2c9b08457a2355b2e7dd

    SHA256

    08ff53730a6e5a38edad9a0a7140b0bf847e55d88f1965d31b2962178663796c

    SHA512

    febf4305413068e95ae43c891fb1f5e20dd5fcc5cfdce37e19d97ce361ab4e73c6618cefe89a62fc4444de5069302da62bdd7914938f92047fb561f5555def13

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0ced1ee6c9f13a08085957f6a891a323

    SHA1

    23a1074be78a61f2076a3c6c1450e35dcf9e785a

    SHA256

    d8d4b2f85b877e9969554ba5dc1264084bdb5aab2ca16e1e3329603ac4792300

    SHA512

    e06ea9b3aa6b2cf0250a713fa235b30dfa540c421aad604bb577bf889dff86163f6d731c55312846adee981ccf87709f8e546a32bbd4ca863cf6ccd7e405ba9a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6df8b6d54cf51a75334853deaed323ae

    SHA1

    c0c4cf48308644ef7b64f99ed9082333de95e609

    SHA256

    75f7271955d507a2f49bf727fb5cbd54a8b1b5ceb4e01440aa8107376dca880f

    SHA512

    5f5d98b210bb3c1ed2ea688ce2a4d5f61f6b4d7a195ee60343415ef9281335e3e1d6696fff940c32a8314b6af0c9894f72e5e416f19f3741a442a2fb2578b588

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b6a18cc705c7c6b467ca8c6517f8d459

    SHA1

    2c357d814b8506906bedfcd1ae1052e4529efae4

    SHA256

    d8ef6d074ed0c5752a59f70bcb385d510f66322bafa382e79ec59ad217a04d00

    SHA512

    05bc0d2e87914157cb8a531826887a449f0889b1526fc2572620d437d7323e02f3ea6a4a04cc470c950a69bb3badf8c56a64c9265bc23cdbaa625f7724137b23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2147ad2c3af953bc0716376752e0e6c2

    SHA1

    40e329a4aa8ce0a5b4b16d28ca11744c2957ca4b

    SHA256

    b25ab1bc80d89062c11a6d5c6941d47dff6cd383ef6f0312ff6b909432f49a7f

    SHA512

    dc3ab5bfa168468a47931c80037621b289487a351f2ec159421d3aed503a20ec3fc185e7f620cb74b15846e47ac74b556e26fd040dc6abc9131f0816b7e64c22

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    215d8389064000954df302f608a1eb90

    SHA1

    9d8fedf42b74ab17fd41ea028a49b00f571426f4

    SHA256

    d2cd69fd6d8ce2b6ee476898db730b626074bace772c3163b749bc6f8479c5fe

    SHA512

    b59ae3d28e71786080c6ae0c70cd1362434147a847e489bcb1f788a6a4d25019e1904ecc3e8fd57923706e9a10b3ca0500ea6bf9c077c341b3f7023a481d35d8

  • C:\Users\Admin\AppData\Local\Temp\CabDC4D.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarDC6F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b