Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    68s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2024, 17:47

General

  • Target

    06c9294a7e3f54f6d6b3cbde19d3c66f_JaffaCakes118.html

  • Size

    12KB

  • MD5

    06c9294a7e3f54f6d6b3cbde19d3c66f

  • SHA1

    95fba29693c5b32ec3ab72f5330abdd9b7ee533e

  • SHA256

    9e9dbcc5d6060cf5cbae892785b8ad732dc4df3cb67989e8d7d509b1548a229d

  • SHA512

    14df7e82fec8d1be17eeda2ecb8b6f429cb3494da67b8f175f09838d27b4a0fd2023e8e58475e6a8443a7424f084cf0fa1bd3cd47d8db6499175d16c2ebfac70

  • SSDEEP

    384:sElIcMVfjGt/guYB3Z/nNYeFy0Psw8guLZ:zg3dhkxLZ

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\06c9294a7e3f54f6d6b3cbde19d3c66f_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1140
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1140 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    39fef95a70817051b843bdcff81ccc0e

    SHA1

    3573b3e1d295d018444abd2f5a2a3093e70e0439

    SHA256

    662a1557fb6c943ca020c6696c2949c78bb82248958b5a28a60cf308ef483d90

    SHA512

    3ea8a0575a23ffdefc4a0bdb74d8bfa8c476f9adc0738944bc1b6fa42af2886c12ac80710ae27bbed579954212c6868f61ccd7683d7eba7e6fd20f0cf26de3eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b78f6447ea457bdeb23963cc8ec0d322

    SHA1

    e9b6594b4c5fceaa0a795db8239e71a0ef94abf0

    SHA256

    76b04084302e15cf2ad6fa8e00cfe011910bce6a8d9171f48227920db819bdbf

    SHA512

    7ba8bf8d1e5891410c1da3a60160cea77010ff621b8f78a42e3ff942b275de8360b3971d9018ba3b6d4fc7a0f612f6cc502d8ca258b87ca7d18c2167b2c6fef3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ef7d60f89a9b6500549dcef18b6da93e

    SHA1

    4ab7fb2da9e05eb74f6330410bf76fb934403af7

    SHA256

    4e6a401ebfd40fb7c7746a461b52ef472038bd016377d9a4e7214603894f9a66

    SHA512

    5d765aee59a29255722c8a5bb7c3ab019129af6a629102cf10ccc1dd9311f247d0950fc87200aef82822a97228ecde6f266c6523537de4eee39889dcef283006

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    50bf4418020585662dacaac15062fd34

    SHA1

    4eaf10ab505ffdc0a8df266fd358e6a9747a62f9

    SHA256

    25195f3dd121bf586d05c835b06d8f7f3b9e2b625e880f7b4cf018f3a9009c98

    SHA512

    e029961feee1bd4f797507f531d5ec3f4fb39c4a01ba339a50b198e75e11dc7eeb0a83c1eb97ca9e612b467f62c9fb5c8d54ff3d511c6ffd35e3544cc5b6b6d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2639984cd9b581531c2e9a6d1bb2a9d0

    SHA1

    853b8608909ae668f71a1c53e55b035c0a8449be

    SHA256

    efdf6398dd9df70ae1d4a784acc62ed7fe65640635f4dc4b77b2a0e502aa0a51

    SHA512

    771d841215222adbc83b692053d351ad69fbced1509d5fc198b8e4242d723d734b8ddcfa3f49b782440dc5d7c56d1958bb92169a98afef76a0d1cb11abdc2b8e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    281e9cd6c12f3abafcf63c610f94367f

    SHA1

    f035847186230362a9a5c2701d06dcda37cea1a6

    SHA256

    19caec9a24da9187fa2ce39dddfb882962810d75d90749b04f7b82c2a86960bd

    SHA512

    5b10e68b3879a704064c71d558fa3a73929aff3859d93dece399e82843d69bc108acf89340cfbfaf257075eb2a5ee727622e94216dfb6c27429334b121b43b0a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7a9a894eee899e137581417c396b0b82

    SHA1

    4b28024722d412cc652990e4148862d532959278

    SHA256

    d80bf1d494ba6049b4d02fecb0627514c4fdef8d84558243cc4f7ca90feae020

    SHA512

    9e9ad7d8461fa38a8902baa2bc4c7acffb292d1f39bf5aedf746144ef018fadd76b80dc4ff989915561dd21ce4b1f606ab9c0492b6d6e275ff34f44de4032c58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9fe748fb3aa4ec4dff309f958a3aa19c

    SHA1

    b5f923ffa2685e7ec22ae9460a4cae2202eb2f40

    SHA256

    7a4903896ce2b2dc6b46d0a114a147d9018e625e4ea58d426e27e71acfb34a67

    SHA512

    dd1d7218d00e20a0f5306dceb5c00ec71e1d14ab0f2582844f93a973a2fbf6dbebfae8dad061d03b7e72d3ae7a7e8ff754bdfb3ad693a71b002db0b9f62d7986

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f8f2b263f118434d8e67cacc33b6915f

    SHA1

    9735caf376947847ed448c547a73e1dfb829dcf6

    SHA256

    24e2a44dd81437c85690d7248426873df5fae438a9978f3d987dfedcfe06d896

    SHA512

    ea6db39373882f71d844bc57d98f1efe2d5433e8a86a6f41c51914e00b5bdb4f19aec5685cbb81d182a4a20a9a08f2bde7f7824c54468664e6e9256161d410f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    20df77e2d60a80b619bbc31aa3180c63

    SHA1

    a6ba561b89b0e1833bdcaedc9f286cba170a4ed2

    SHA256

    d3e185d3b6855f58270988bb34dd93e7ef5bfe246357cabbd2efce8b1954cbf9

    SHA512

    82e2d58255cbd05d04ea0354ab1c3ccee2fdb85abe3453c230fe5cfb69f7c0a74a55b20c840e5f11ff90b686f13b2deae7df3cd0057fbf6addab550826c264bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cda7e953540f2e938f12fd9839fd2398

    SHA1

    3a78d26252b273f2f6345b5977971a0add5cadd1

    SHA256

    6178f942a69a867aa8274e01af10daa31cdfa6eaaa48198b2f071c37b52f8b64

    SHA512

    2a3a5e258621d3ec6b16275f153ff8c2e7e0f864004724ba6c5d93d8ef8eb2e137a21730a4f9b3ae93907e4312f8751b323d7fc428210e32429893ffe2952c98

  • C:\Users\Admin\AppData\Local\Temp\CabA1EC.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarA28B.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b