Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    133s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/09/2024, 12:19

General

  • Target

    0145e926549ead2cff1e276c1ff8d3c2_JaffaCakes118.html

  • Size

    85KB

  • MD5

    0145e926549ead2cff1e276c1ff8d3c2

  • SHA1

    937a78cc3a9cc61643c1b7cc3226c5435e1a67f6

  • SHA256

    c661fa4d8f6e261f0496c7ea1ec2b6540d4acbfec14ca696746947d1db8b68a9

  • SHA512

    962b6d755e7047221e5c803ce60ac5414a1a4afccb6543111ba8b801efd3fb18f92943cf3612c0923e878cb66316d0d38035a3a1344c85052ce5b2876687a681

  • SSDEEP

    1536:oEcsgC15RtTHPjPe9rCX7CesIgsA19rCX7CesI+smUuv6olnK:zjb5fHPjG9rCX7CeasM9rCX7CeQsmUuU

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0145e926549ead2cff1e276c1ff8d3c2_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2316 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    45d902928bd62d9aa5bc846b92a6386d

    SHA1

    ab47df5e107a6d69ba45771f2b71d02b5e35c251

    SHA256

    62236f84372d6f4f8e8b6b3b9fc77a5d9d58ddbd466e801c2e58d9c904d91c49

    SHA512

    b6e91773172aac49a46f6b730a8862db81ff17c520850e5967990424368a36a002a5cc55da071b7f27c9c656a05f83de30134fa80f6a379f6269f383e9b02daa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    918a07dd0eceddccddcd419bcbe346c6

    SHA1

    61fa4d349bf7353a8b4a2b1b473865e2866bff33

    SHA256

    0d1f1f9af75200f3488a0ec53a2ac29f3c1fbc53e53c44f1ee323cf78dcae095

    SHA512

    850d027bcc2952676b3ef74116730f9eaeee39d615a559f048789b3ee26e2512c282216fa438d4d6f5ad1443d80e29f4af56918834ba7ee28a2d912e15b05a61

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    59db4e664c54454663e2e7403a1b2b07

    SHA1

    29817ccfd85b034104412ad414884149f7324495

    SHA256

    c3b5a26a4b13f8aeb909aef41bd341ae42ac1d6605db40430819eeb1d2a55d2f

    SHA512

    2e4d18630bc1ff1af3f41e3dcdd2a6ed29ab3824b85fd262cda2cdef980911e5b15de0a3a4976721502cb03d86e7c3e15aef62d37a5b49d8dc2468abd6a5c634

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    291bfa57cdde194db50dbc1a64f1ee6b

    SHA1

    09922492a808b97aeb4633444a130aae616cc629

    SHA256

    4891a2d4efb74f5efb82aaba40d9103b181dfcf5b3aba1c7bc7730c6b63a7cb8

    SHA512

    449607899910bf86878bb4d06f103572dac81650589916c08e23ce44ef14e1ac2c34784527918b80d3c4ffce62c08a323a446dce55119ab48bbfc3fca314e600

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cea87410b8725743d3631fa360731bc3

    SHA1

    9f53b2fdf931d5998b34e94c3507d9070b290e67

    SHA256

    3f4fb56000794546d8d07ce5a87e05be8c3f5f057d55de7bc9df975ce19fd83a

    SHA512

    6f29aca8e4c92267ebf5e4b1169c5af1a4699433ded0343ac020ee1a31947555ce2531a16792249734657e1e51c3f8c7264437d5b9b2afbdb2ac6a6d69dd317c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f45c9c02e4efa10e93283d766d4e6979

    SHA1

    c1206fc01c290307ee3b8487ff15d46b13372fcd

    SHA256

    aa9f7f7526992dca3ada5d74431158024e76a4c2bcebedf7d00de3a244b90d1a

    SHA512

    f5c28e38ea0f6cc2f53230cb00d060d9cdc917935d014b4e1b8c7a52c783ccb4bd7fb4e8ccf4d880b4bbc38a159e96a9c4b9255ca86354d4526508c1af6b622b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    21dd552e9be360a218513faab4b6e3d2

    SHA1

    a2b95ca9e59d121c216591784a03eae20461aec5

    SHA256

    34c2acecf448cfe25447e5c07cb0d26c18de15268838562fb7fd37ac041e34a9

    SHA512

    2301134253ede4c54663e8c81b1539e7626e0d94bd7fe1c5c96e9b32b367bfd6a59c0a8e2bab856633f43084faee259787ed737520335fcfdb0b16ca3a4e527d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    750c830b6b18591e4eb144e683013ad6

    SHA1

    6e8c91245c3e1cc1ea0d7acb4946fa1a75791e97

    SHA256

    952099e021c5a39c0324f95eacfc10b2aa1dadad5eeaff2ae378682687a9057c

    SHA512

    7881d146b864b32cf5d5014628fb21d6c1866b1d9e64cc5eb601fd03c0105912e78de9d5e402eae925ac371754a3729c293012a1625a2c7a8dca299194e52607

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0d32cf08d4709e1ea576d7b4756a293c

    SHA1

    26bf59e6b502171742a6e2e39e29ccccb251cdac

    SHA256

    d73f799617bb24d7f4c2100b6a1786d2a962c7398e732c7a5c0b8c3cc664034f

    SHA512

    3066dc0bb8edefbdd26385d5fd54b32e2074a194f2acea875cb9fa82ae11bdb2d9b14f1b7a12fc42c098f44a8452cc82e54e0bc9bd5dc46d20fe7634747c825e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b8a9d0307003311464b98aa514362443

    SHA1

    6a3e7177f766ad614db82d875973ce503d612abf

    SHA256

    ff57f6b8d97e91374696dad84dac5d2883387c8548093a6068d212d3762e1ca7

    SHA512

    ff8fb621b57d11dfdbae36054a2d93183a9cc38a33fad64f7ddc4d32a573f9a8a41f993efd6e4db74a573580e45f292de5962503fa458bfe14838d656a138a45

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bc15ae660b1d6e7ba1b003bf8cdf9d9f

    SHA1

    c4cb819a44c118083b8a0c32f0c8a79afa561b1e

    SHA256

    2a928accaee19d0e5e9d77692afc248d5b53c81c5aeac0b9c1018d1438d8bab5

    SHA512

    2afc004af26cbdcde364687569634869c2cac7f895cf0d4e804e075e43ed53cd8fcd8307ee174b67c12d12d6a966306d85734d14cc677ce066a103a586fd0041

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a5f2f92b6d9276cf9cca8fe9775d1cbb

    SHA1

    b8f39d04e8aa7646e5b7649c1ebf63a42eca4a29

    SHA256

    c95d7f300aeb42202ae8169b4b73e681b1855809b747b4a7c157edb3c3095086

    SHA512

    669d33e44c65f8b2ec097ba39d45b48e69f9b3a0646c6837ba38b972c2464cad60421c4ada1f58a0c2e1e21904098228682df6e1e950cb38e4f368955d97237a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f7580451810a613af78b04eaf57601fd

    SHA1

    a848aa5d6cea41cdd0d313fad42727bc94ac09b0

    SHA256

    3eace4427db278250261ec71153099d68a87fd79e29337c87ad71f4ba77a1ae5

    SHA512

    8eee545d72c08600fabc8db809e97b1409f2ff78b3109e78f714de71b7d2706ee795423a21f777e9f26eee41026c2e35b95330b1a43e2d699b79baeafe1cb84f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aca5aac3874ce019337b0690589b9d31

    SHA1

    d3551c0de1fc13c68d049f97913c8dfe64d1c0c6

    SHA256

    f5acd63c605c768905b24fe2a8938cf7868ca860d8eb95f02a44bba26fd45a71

    SHA512

    a96f031cbf7cfe1cef4b7aa659924cb525faf7b06f13571139dee40c075b218506a7367b78abe33226cb42c6f861a53a14584d3101b2cccaa93d7c6ebb6e2625

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    19b379885af3b3021723be027ea6ebd9

    SHA1

    9dc202013a7e01818e8341b331a309b7c6073de3

    SHA256

    ba4f65455624db0121608056829b26ef6a9dfc82ae37e3b7f6e219883e201b32

    SHA512

    bcef4820058c977d8ff1ed7fc59a8c5f7ac360d209efb1023b84c3480dd4d4424c69b3928f50f97cb70da56adf380d93d1c56cac81cc6308773a965776b61f7e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1b5729909fc710f0ef78d783cf3c9092

    SHA1

    85fb3aa245cb9433f5efc92b976dc5a3e1e69e34

    SHA256

    34cc920257423ab35aaafd47c27997fff777566275cfc4acf16e93cbc2d27b97

    SHA512

    1d0ad0c58ac227b6968f8a8fd323c7fb0a322c56f93bb6bffbc0d861ed8f93dead1f710e7216425a5d4e8fb04fd2ab875e9cad127ea3ffd20cc886093ce8f71c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c80e6d9965db7b4b522bb4e6252154a6

    SHA1

    7e69f7aecd9a408a78dc5215b2a78b8984a6c9a5

    SHA256

    cec902691a5e2e8524b7f5ecc781c30c87c5ae4d35d7caa754eb1a5b7245f362

    SHA512

    71331a61c951ca6306e89dc390ba49204c64de1d076d6e1d7539ceee8b5bd799660d9a73096e63090c1c8c242a2f0a6a87cb2c93bed89f600f2776b0deced590

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3c0fd23cea438479592cb0cbaad7cebc

    SHA1

    80dbc19503cbc2c5a32fad12a9958e878eeb7ec4

    SHA256

    c61a0df2695d5e0a6a5ee50554e126c3c8e1d0282d9374aa2ffcad7b603662d5

    SHA512

    6d787f087d68bb376fd3f94987bafecf8ba4d4354e4216fb4e766656a9228932c28b571420756bb1ba41d3310f43a48af3b7f9dbcbefea1abd99d29a93ded713

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0552ec5511ef6f0815d89e97456072c3

    SHA1

    72806d52c497205f771002d4e15a9034fc8b67a8

    SHA256

    a60ffa1610dbb669e3a1e7f0093d2667c90af425605618b97580e19ad7d1b6ae

    SHA512

    9ebf31a16efceef05bc92cd4b7d1c6b66ed452f80785ba1cb2150cee1b4e008c48adcc87ce19f1b1b0982476850c928c21dc4a36a3fac5f5e790fbfd8ca572ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3a8d64fd40f9457a6112502d3aec3360

    SHA1

    8723980cd462e4dc71e80ee2be36f0c6f5ba6e85

    SHA256

    74d40d954d5fc05340d08cc4e39bdf67926e7f9238debe929c95cd7506f7ad5e

    SHA512

    a592e34e97be4fde96eaa46a34ea02e6366fdf6de078db8bd4ef7eb209f821eec1307748fbc800ad3a34521632ce4713598dac5c4dbc42e492f72db90f844500

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7CNUR30T\plusone[1].js

    Filesize

    62KB

    MD5

    2b72da5279576c62e6e3bcdadcfb86af

    SHA1

    93255909ac2892a54fcbb2a4445ec1aff46cac55

    SHA256

    4243c6d726cd3e7056a4ee7efe04d9eb84ee713bae54f0374d6f8d71d0822481

    SHA512

    51954e78603f08d4eadcfb58593624100eb8ecff1bf3f7cf4c6c43b5cdb317daec90e6919a71f12e850f424e8ec7e0bf51a9c782beb5a3b7ca6a8c604a522872

  • C:\Users\Admin\AppData\Local\Temp\CabF3F2.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF491.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b