Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    139s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/09/2024, 15:19

General

  • Target

    0206fd80df371cef56b5399f967f1310_JaffaCakes118.html

  • Size

    138KB

  • MD5

    0206fd80df371cef56b5399f967f1310

  • SHA1

    6cd599c442bafd02b1d26ed53fce958e50b1fe90

  • SHA256

    07f8e9858bbc47ad6f2ce85c06e0fd4dc344fa49d132070986d904330cab7972

  • SHA512

    4a612cbe22ef10b86a3d24e1c9ee3f3fda699ac8705f3c10b6ce12504df09996bc3cc882fda111bd4f861c3bd4e2288cbbd1ac9819d9753cabbe0926212c092b

  • SSDEEP

    1536:S1DqygRlO/yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTs:S16C/yfkMY+BES09JXAnyrZalI+YQ

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 41 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0206fd80df371cef56b5399f967f1310_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2104 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:1944

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bdc68014a2a94fdd95b080a2ad9f6ffa

    SHA1

    99b8649df006e562d7ce870f85c0f82cc38faa7c

    SHA256

    49d9d731e3279f642fcb36992ec280f8194636a4c605d63cc1267eaa75c2a6d8

    SHA512

    896960bbff065a67868f9444fc0da7a7863644c5dbf9780cd26d46bf2d78f3fc90ab74dd8c0727f7f5dfdcbd2f16fe391fb4fd478ba2d758132abadc5e52edb0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ff05f841b458a0e41345521b9729e94e

    SHA1

    ef10d4bd07372e36c452f8fa16d7e2157de6ae2d

    SHA256

    75a93816e1f354847d918845b84ffa495c5f08bf216e26fbfce19b05ce715f97

    SHA512

    54d05afda1855b5cfe820da4b8aa98b7674c401a32dad8e852007b50afb36296894c11cd8533e80baf4ca0a6dce78e047829dc4e01ba7a096f5387364c137718

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5ad592ebb0a894aa762dc8d2f6cdc731

    SHA1

    67f9ce6f90f5d1d4ae28572b310d02571e945733

    SHA256

    e01821142fc73e51cd42b7240f1b8df4ee43dfb7155925f80763db81c1a11cf8

    SHA512

    d4012dfc63cc19c9b23781ad2a855770cf8e025de566f203d87c2e12153b6af38bd463659fb2c32d1a887809d3c240b89353f6a132de2420593caa2b0a39fbab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3929ffcdc2ca684312069d4531e862b2

    SHA1

    1a64f2aa5cad4bdd5535cea190475d3f5b3bfe2b

    SHA256

    f0bef1bd6ca740847d7bbc4e6d50b9e6bcfea72883b40d3c2ec33ff6070624b1

    SHA512

    d080d7808dfb4b83381fb51367757a952cbbd22f00022c4537233e02a42b8087425558e095d9c0716ed7e2d59cc816dc6a48215b045c9ff115471ba70136c6bc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    56d695c6055946beb22cb5de7fdb5afb

    SHA1

    f17769ca5b4743aa477deb9f18eb9259b20c920b

    SHA256

    458e47728ffdb5e57f05c1813adf922bd3307b767c40b2a9361d25cae54c3329

    SHA512

    15b96e42bc3266aa58a89453a98dcb09b985ff3fc0462a48bc093caee627726a63f0983e795c723e84eb61ba3a34057aa636a5156cebe625db3757370133d3d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b826bede008d740b75098e0f79022d85

    SHA1

    5c9df8a01c43cd5120d55310802af9578a694dc9

    SHA256

    c6e8e19628e260e4cd97bab5816858df7be71c367af2587a42aaac9c316cbf3a

    SHA512

    704e3a31618202c55ae255302061f3c210f76ebacd024f55fcca39786f6a8378f8d9cc344b8835820280b36ff478ba4ecc4b812bf01a6914196c06b73587edba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b78440790e354540d4738019712dbf19

    SHA1

    0dd4ce2a370577f8b89602e28ff830ca12677ed7

    SHA256

    2938b82cc825927adfef2f9f002804c7197d4990d98bae9ad8808c903debff1d

    SHA512

    66d34f7e4bc00435987ecb3a8879cd85d21ab3457b1e30dfb62b394a8b2cf9d23601c8cf8c24b872b634b360eea0b1dd26b3d7b2f1588da1ef6b6d09c709870f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c047b4f718961e025e31cd716577fc55

    SHA1

    2b93cac572c6723e2e5e12efb254af94ca18bb10

    SHA256

    81cd98cc4c9030f4453e371a092e8666529586558aef2712efb062a16e7aed07

    SHA512

    2e61377daf6c5a8ab549b21a152b9d71f4af19bad4dc83d7534c1b351bf504120ed5dda2a74ea2d576e35f0337d8ee52a87a7d271ae52bde327ef6ff8f4b6d4d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b1b6d72fce58fa1607fc2a3146d1238a

    SHA1

    83361cf07870f7b4d1400f2a45315990204e9416

    SHA256

    e6341851f5e0689b3b4b56ec50e6f2274a4abeb31e253ccb1e825d360930eb84

    SHA512

    9f56f9fd1515a928cfc11956d26e8114ff598dae285871a163fe00f0e62e875db532df55eea3bfc92e3a6361855757cea9916002cdf5d733a89f02bc8777d97e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9175b711c25147924889da2c7e482c96

    SHA1

    643c175e5061f310fcfa83ab7fe0fc1cab4e6e7c

    SHA256

    7467140d3d5abba2aa766cc05c91f3d7d90858b7d3360f44c29b06f4ecce21c4

    SHA512

    183f4c739d62481930011ac9db39f7c9436d97d3ebf01fbea1570d1a960f8e3a6ace2f8558791af27814e0fcfa23831d3059a5be181cbb6a7225828fa73aa4e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    edd741bc221834eb6d891d8a43014d48

    SHA1

    705095936b10dba808626c0d6e92a8c714c72579

    SHA256

    8e0243c97f37630499e04b2534797cd3e5fde13773163a4afb9b87e5019f9752

    SHA512

    c6effddc9044df84dd24a9dfd015f607f83f96abce296a9b7ce36f616e6c0aea99428697afdafe86b7f7128b5e40fc8c43b0dca9f6d062934fb1a021fb5f0fe0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3dbb4485d0441744ec44508ff590c41a

    SHA1

    20d5cc03ac8b553b9c79d274c9f77b27434d90b4

    SHA256

    13135268de22b0e6358c1f7a940ec55aa0db1d7936bb3cc415caaf51eb20912d

    SHA512

    2c2894d607f209b3499db8d13e4fd03429532e4dbd4946f0c60b17a769ce8416ea96a493a0ab35eb7d1f498aaaf26c603a89d2227ee12d922bc992478164be34

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    90d7fd7afc5b88ff30921bc42670db23

    SHA1

    d96874e9ca3cf0c6ec324a1d73307a439abced6e

    SHA256

    4936d201d32f3d874bb6c47c0a99df3f0253e4c4c474a4cd03d7d4286091043b

    SHA512

    056dc070d6980df1ededd3d8aba0be301789d0f0f879c7d0b30759ffd4ec83c56d6d8fe5e33b9f369e6a4d868e06ce180291749c824e3c9b9b5ae75f983f9f5a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    63a15ba448b264e0b052a3d218bb647e

    SHA1

    e5c5ae186027dab73bbd233b20896bd9408b6914

    SHA256

    cbcd288f7dba01e9434b469ee4266670f8fd696896b600b4e01f59cfd6aa12fe

    SHA512

    7e4720add2662cf7e08ca50fc1af743993b9860a50dd2799fbbe9ebf867e3a1268a4040e677467bff05a8b7668aa98787105cfe94885e3f02c3025ba9511e974

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    23397387811bd4f656009043dcfebb5f

    SHA1

    1a34e98784486478c67105145adee267fefda726

    SHA256

    de42586bc2beb98deceff3b5ddcce5ce53b7102547f28159d1acdaf674b518dd

    SHA512

    555e624e860a2f531748c2ab17e2fdab5bd4f7d501ab9952ca8bd7ad76c0a453876adffb559f6c97e4f051798ed7ee30bcac6454e4fbd94a7fa7607e3186d57f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    efc69252d905037ca1e4e8bc70776025

    SHA1

    312c8ad21180bfa73dd429a25e22a6d383d795f7

    SHA256

    39ffec3482773aad21be5fde0e143d268f2137a4afa6470631b1770988639030

    SHA512

    c3aac073fea99acb16c7192b02037506ba249e3ba9f53815c89351e0972112b927fe09677bba0813350be3d30f4b1ace7880b46c442dd5e6bcc87c31641cc22d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    352235d368ba321c0699c1e202e0fceb

    SHA1

    88b9e782a1da3515aedb6ad1f15062f563c1d1fd

    SHA256

    d1171f5bb4c2126824eae94d4c058c7e7ce69cd33c4de77e06b00e9da5e09128

    SHA512

    aedcabfa8a68846b68c53fc241b314094a1165802ef404e849678a18b043404960eed7b7a18d515bfd38d2ca20d8c66ceb418ef34fde5731215f5e98ffe8adaf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4e665dc76917c1c796355f9ceccde27a

    SHA1

    b4b33168fe45b010e7a89b00756dbf5db2c25e69

    SHA256

    9c118a2599a40e2ea6c373b5afb00223c070f81526ca55340c484d6ebc8cd504

    SHA512

    40218b84a1d038a0de3545dc896daecc0320bbe13dfb733a71e0ef7a877d2a26561ea94f84b3f02a33c3bdb997bb106a6c01a9ff0476fc42fcf85567fabb7f23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2549100dca6a5ddb16be2e4e74dc9f45

    SHA1

    ff67026a624aabcc0709c5d33274aa7a1ff1b6bb

    SHA256

    aa6d35e1f3611e61b3f0680cb1643ac4a6e6702b8c171609fede55d3d3ee4e21

    SHA512

    7d899ede82f72b4e05f07d5fc7076b4d86aafb175e2f5ec49e54b74233ad6bd805731be764056407ee84ffb238bba2bb3bb2039774422eee821401f7165723d3

  • C:\Users\Admin\AppData\Local\Temp\Cab6B8.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar757.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b