Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    28/09/2024, 16:31

General

  • Target

    fcb2a62dfe8b6efae3df24fd6be00ba3_JaffaCakes118.html

  • Size

    18KB

  • MD5

    fcb2a62dfe8b6efae3df24fd6be00ba3

  • SHA1

    9bd274fffd5dcb4c220ddb13ca928160866f58ce

  • SHA256

    9ffd30deaf22f6b46d43cb25b104049ba7938baa6ed70d9c375f61228ad7369c

  • SHA512

    82dfe09a505a8e27dd8024797a97c5ed9a88eec24b65bf2a0c259d5a8995d76b05729c4bb067d20ba2479f9177b7e73771f80612fa89d063364cdf366343edd8

  • SSDEEP

    192:SIM3t0I5fo9cKivXQWxZxdkVSoAI+4WzUnjBhCE82qDB8:SIMd0I5nvH1svCHxDB8

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fcb2a62dfe8b6efae3df24fd6be00ba3_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2024 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    96cb98ccdcc87b529a1172d2075b1656

    SHA1

    0d42c9b173c453d7243ca7efe39f573d5de30665

    SHA256

    795b59a3390766b1b2e2670b416513183ba589f7737709ef04f35af1a62f4949

    SHA512

    008791aad0ef278109f76e485b21fb091e88e1acfc921dac3c56b49d1414c30da9552a46ac0582eb1f0933fa2165f2285bcc1af82715c885b4fea86ba92cd76b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c96fc898b8a25522688d661375aec3c4

    SHA1

    41fdbb4b253b1799370b06a3a2e7cf7d2df654a8

    SHA256

    bca81c4951e0f02529682c35e744ba02f3c4bfc217b7b6a3c238abc00466ea87

    SHA512

    56576b2ffc092225d6e0477d86cef3219e7e4acb4219bb3373dfdcdbb662c58e50b5f9e0666811dd69f0c5cfb8e822854121f926ab6be455928b4eb83a096d6a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a6cec63c7434307818cadae9d26da046

    SHA1

    97ba255e079ac3e08c50f064c0a38dcc31c0b2e5

    SHA256

    96cfc811f2ebe026da2872b9123614a3601fe5a308f365158b0e45b5fb0f861b

    SHA512

    79addcde19ff5ebd20e9d4dd7eeb19ace95c2e40ba3bc25189faba9e8e8289585203b2f5c98b1126834d8971602c881cebef9a84b2f387ecf9fce225309d9952

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6bdf3986d9d329c3b8d6ca3a1c7395d0

    SHA1

    529903588972e6663d972d58bc02077144185f3f

    SHA256

    2f2682188ce39f0b977ec15098456081c51f7a3af5bc9e5027b2d1bfbf370425

    SHA512

    a267a75dd002f6e3993aedc546804639a6898d8fce1b58363cc854a6000111dba2968e0f92ddfe0e102620425f0a3ca1dab8558fab192f4609e13242bd9d75e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2de605d8597142246f9358d8a0e76b55

    SHA1

    363e93668e81e339fd38168c479ef1370ad5faf3

    SHA256

    5dc780a40d3428298755e1b08fbdf61ea1d25f30c26ba6a333717c2d4f4096e3

    SHA512

    a0d2e28972050259f766b70c0f7639a9afb9e8adcb477542a3bf36041c42364c9a84ad8f82c444f0ceab9f256f5f2b9a35439c003a518b8df9c20b3471753385

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    34d7f088d74045f5fbc83a5461e04b2d

    SHA1

    01bab3b83863bbc85447c187ddf69e5ae4a5608d

    SHA256

    eaa7086c36c0548302206b0b9893f67ed582bc2b49b638db665b963b13673a14

    SHA512

    dafef2ad1c4913893b18f50501c94d385fc260c114eb2155599f4ededf190642fba6927efdf61b58c4398ea46de2a1944c5e07c50fc28a391f9c7933865e1835

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    36ab94d557cd7133db2ff496d900a43f

    SHA1

    da2f4838b5789feb8ee57f24117e49f6c9eb8c09

    SHA256

    8fa0a43004fff264248f2e5618b0d88636ef2c3450abb6741aac88ff63dbb882

    SHA512

    6dc993192dab4aed34557b354c9ef9f93c55c1988d49555433321d16653f73d7cc838b81c21963aba3ade212fab59e8ca0017e00e96fe4a0ac2cf840fef23abc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc59936f9d93a27a030e87f611bfe268

    SHA1

    b4f53fd91e731f7bdf9268ac5e9c1deacd76dead

    SHA256

    871e20e9ed926d31c3cd4ac1fd6f6143e0a4c9af8c12677a2e8f15aa35c48a13

    SHA512

    b5482ad42905742f86a2c91ba544f2f4c40dca45637ef218a1d68e48e1616ee769b1c4e937c5ab8f106a2cae821b1e86392caf8564ae0d5a194b4e49e2e6beba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    826e95d6d05bd09e387ba8a52880f4f9

    SHA1

    d590c8a92a5f138c24e3185a40d522f082c745f4

    SHA256

    d411d2db3ebc0a186a4de929fa81d77e2940fd8f91371f73fb864154ef11ddd8

    SHA512

    60a304f864c38bffaedffc15767ad1db044e60e0bbb6be1bafe02c5897df4482ae12605cbf7d584a1de5fa647e6043168aad3c33dc328d8f35ea478924794a0e

  • C:\Users\Admin\AppData\Local\Temp\CabCDFB.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarCE9A.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b