Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    133s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/09/2024, 20:39

General

  • Target

    032e85e2fb848ea9e18fec458364a2ae_JaffaCakes118.html

  • Size

    85KB

  • MD5

    032e85e2fb848ea9e18fec458364a2ae

  • SHA1

    aadb793b90653748a5087dffb66ad976908538b2

  • SHA256

    b8f0efc86cf515e03ef3272c6ceb9798a4a12b846239a36dc628318a9d6e8459

  • SHA512

    ad3ee8a1aafcbc9ed937766af6e4ae1d15d4d3db1591a6de174920b1f16de84bd988a1a6446639f4662afc6881d43fce392c450889233afe4101b82a8e5a8dab

  • SSDEEP

    1536:L+ipVn1BUNqvLKvr7R/rnVeWCUMSo0mjiMpbqqvmznhKv++nPLB1VJ:LBvLKvr7RJmiyuznhKv++nTB1H

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\032e85e2fb848ea9e18fec458364a2ae_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3068 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2164

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    956aed5b398b1901bb9a6b3519c9dac7

    SHA1

    936870faf160c10f413588d76f9921b08b95b66f

    SHA256

    13e8f0f6f339dfb3e9d4cc04f36e1270bc7901074b22b1053a4bd7578629ae30

    SHA512

    7f38c10a3ac33dd338b4b40f99d500f24505e5787684b3c0d8c3b5eba1219dea3e50dc87d419dcc0bdd4b0f41b2da9de7a6b662c7a2e1ba3f6da19d9f2fc01cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    452f0009a54c4d8cb1f3215059a868ab

    SHA1

    0ce9a18be610995ca814e44138ea43c199c6d3e3

    SHA256

    01fe8dda0696078680304972fd055caf1211dbd01797b28d9f8d857c70675d9e

    SHA512

    e79309cd560969d3d1a3e73cc708111f1e88b719f2d15cad5d5de1bc1ad035b4944ee75990f7744d65d6e73262f50d57a1c8a8308e96bd209e68398b50e1f083

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b0f3714b84dd0253e666f8f24390828f

    SHA1

    172f21c90a0a681b7a9313b3689fd7e1114adc16

    SHA256

    b912b93f6c1ce279fc623184352e800d584bdbf5d70e0f1508d29cc0cd6112de

    SHA512

    aba6913682a03e0419d08ab4303073905cb819f7b2f74d9b8a26bebefbb1152b419930dbc3c781298657ab634abb7d370d9d16e168b7df115d1d42c2ec170fd5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e0a7db28f399280d92f25c71bf523ae4

    SHA1

    56434f90dfb012706312db86b2c8738d8b26c4ac

    SHA256

    30acdec71da5b78de168047fd22d82b43dfacd619af0b2ab64ea94768375a9a8

    SHA512

    59af95a2efe4460f92427fd1fbf15014dad7557c23423346d653fdc3c2e93519536b34a91589220a1e6c65ab4e689819f4fde7fde5d02c4c3bc56ee27981c77c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e237415981d08547f93b294d1145043c

    SHA1

    e88c210dcebd76031c964b2d272bd043fd0229ed

    SHA256

    dc8342059995ffcc43a1ad1b8938555bc85db6f3d4f5ee29cc718b01bb1886cc

    SHA512

    195f6dca13aa0760c45b84868a2ceeccea8c479e717f768ab1bab25989e9f1390bd64bbdd734634141d3fbb2df2839f94505db4c2c4fcbd3545945c032eee6d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f6edab3bf45a34569cfd9815e84a2d78

    SHA1

    dd0314853e27d5f9c4e978e005b14508b5485d11

    SHA256

    7d56da9d93437a36d524b35f0dd8b5fe621a3d25ad2809555a6450e69813b126

    SHA512

    10c1daee951b8aaa9f87161c127360e692cb052eb30544ec1f3da8705d67a86e8f548d13ed45c6e470987e03c0a1369f54f2807172cac3eb1b8c29ab2d9e996e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    47760fe8e01f59b39e2931f4f80f664a

    SHA1

    dec0e59b0d124f32ff430858b23008d67c01b2bd

    SHA256

    139db7803681a2fe57f5de3cebc0afa13972a7a9d8009593fe91411c323cbf4a

    SHA512

    41aaa737b467be3a8463cf0dff4751c4c9ada2fb08b87c1fb31b593cac1eefe64b282d9931c815938e98c014e5176f364b54deb36047ad9c728aa01b6846c8b0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6852a9e24eaa85454726fbc197aac8c8

    SHA1

    2e71ddaa7aa59dc12b192ef1a800cc485bf69c1f

    SHA256

    ec37387b490ba6a6a55a6c0c10cb03ca0af82fe26bc4630dec1f051ed8fab16e

    SHA512

    8789a31647519892da8aa4278edb2d2cfe271922734144506acfee00cbb76f651e2a4e6e0a3642854ee6a1c1807792d2ddaf8f6fcaa04bbf07b1f1b108322e6a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6c1d22c2c1a7418a7c3c8c48cfd63f24

    SHA1

    152c65702da3e8d0ea8bc95fea347644211227c6

    SHA256

    9fa318bc9eaea05c2d9b6bf750ec8edf9bb4f80d3aded82803aaeb800dc804cf

    SHA512

    e65ac7a2c77bdc046f7f0f5abe7502b85575e2bc3635fe914ac3b06d3108d3a8b40d0777f49b5853b74f75111223d02590b029b406af5b63728d4445303de0d4

  • C:\Users\Admin\AppData\Local\Temp\Cab9B67.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar9BC8.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b