Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2024, 00:57

General

  • Target

    0826ec132047314e73f194401fba1788_JaffaCakes118.html

  • Size

    10KB

  • MD5

    0826ec132047314e73f194401fba1788

  • SHA1

    ee7043af6d84ef7f79deda0ed54d88da34cf1611

  • SHA256

    a17bea2c66c3e8d0f8f020cf8a0e28e3f014c96077d33812275447c38a1d5589

  • SHA512

    70605be3ce0108a2269dd9a7bae37fa46091205ceea1b9a93b73410642f15e4872a10edf75df10940d1975ef5ff07be665b512ae3e6fbd2a4e64010c4dcba7bc

  • SSDEEP

    192:2V8lIsr03jA8k/w1wvqLkZDBNknwdrIat01/6uBuLbdU8d:s8lIcujA/guDBNknwdrIat0/6guLZ

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0826ec132047314e73f194401fba1788_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1792
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1792 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7cf960d7eb278db95f99ef43a0c9ac6d

    SHA1

    892c44fc1278956c6af554246a2cbdefb6c7334b

    SHA256

    cd93a8b9a1af36c3ecc2d41f821ce3267172426f5fb555789d03ad8bfa0e1d22

    SHA512

    f9f2a5505d6220e0689700295800633617050f3a603b9c1766883a8482ea5711443b1621845571994f7c826a90a23bf61396ee872a339029b491eb30fbbb84e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    967dcda5e56a74203c160b4e71a03c54

    SHA1

    a90004a126cb4bed6cccd77ab34e9b0fdf49c2a0

    SHA256

    76f2221c7f65c16ecdeb8a00c3979f5ca5d08a8720d5dec5b030de3e750bc46f

    SHA512

    8659648047488f1fa4117809d450e35810d87f9d957edf5e08c104bbde9aeedb8c533d61a63b46f1d7a438860b19e2d3f1f2395acceed1446ffcb00f2f6a2eeb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f6fd4efb4b5e09c40cfd877973e18829

    SHA1

    f678c174a5a606c591646d08aa17109d15275689

    SHA256

    88f49c97ec645cf17df759c369e6e896e4485982366fc6686a4cb9eb57c7ea6a

    SHA512

    1ab77a50a342a0f70a5059c61f988d36a9e2d2d9e53288dbf9cdec5f2e04f5b51c20e0b6f7a5c7856f87dbcdddfa6032a75c0c9e222adf27cebdb1d68b20d5d1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bfd756ce6ca3be43d2bb18763bfa087b

    SHA1

    5d1465b7d7c7f7b989024fdcc7361148c44302db

    SHA256

    aa768657ea2eac080283b7ba437f80bc3bd87ecbac15532f6178d85f23fb1312

    SHA512

    68214cd7e9bfa674cff4dfcf4fb69a3a90c1b02be51e78608782b786a7f3bc54c0d95f4ad95f4a43792163c58a2bb6871d86454e0013b8b944170b99b5cdfc23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aac87abb1f9be5fde422cd995787f3cb

    SHA1

    6d38ebe8bcb629c73fdf8df1a44e4e0009efce91

    SHA256

    5e5ba53ba1fbc0ebbf773502482f805d11c19c683066b0efb6c6d56b687271aa

    SHA512

    4fd7ae2d17d7cd6b8c927d846676811856869ae24d3ca938a198697c5e7e8f39ba535c6beb2af0edce3d4c3312b83e79192af9cbd2978b3f1934aaff7d89b4f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    910b07e5afec1afe1c4aba74ee7e6c2f

    SHA1

    a3bf99cd7ca2e9b65e602540e807f166572ea252

    SHA256

    f95dfa53cc2dcd76447d16ae0df41f57db7fcc480c4b9fc2b74cc1dfa9e1af7e

    SHA512

    5cbc0edea2fa9f1d0475ae06aaafb3e865a0d8d42e570219d93133115f82e197e386f1befd29bf8cd1ded2a93a24b973337c22367e0069ceaa1304d70bddda2d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    12063fe10a69253da5c76491e7e474bc

    SHA1

    7fbfb71084b35e4b9be9fcceb4053117f1fd1944

    SHA256

    14142807b5618a25df281b8f4bff51f8e9b474ebb55c7426d26e266826547aab

    SHA512

    9d838afb60084b41364e0b8a4fc7d3a2e630f747424e970e14ce580e02cbb2bf1fc0cd9204f26fde46d74003b7dd83a1a3ab0e1f585021342db353f5013ee47f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6af168cee0526120ea85e2b5dee156bd

    SHA1

    4eae770f3cc190c853b916c58602e9b39a31f51e

    SHA256

    c6023259dfc4a09f9e68a40604fa189aa1acfb5311a8b740aa3e8d80dac8cc06

    SHA512

    43bd755bad3228a29db93538bae22c498e5c8d80d9b51ba2a8d04de2084382a410e549027351d2048d84fd47c345b308b346ede5d6122e71224371c07ee795b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1eb61c798b9cdc8b3a36414ec9c39049

    SHA1

    d6449f4b323a5e74898061a48b59a7c756b5edc0

    SHA256

    3ff8b924a591b92bc555ae60ccb4b421823141802780ceb860ac8b6be2222e6d

    SHA512

    87144ed6ba0c32787ec3facf2d6235a2d862b805805e54f77a3c32464db6c7e1dbb3053ad6d9ca3baa1957a9f16660d3451d236a342279ee6ce0b422cb940e73

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a9826ef6ee04e138aeed5a20aac518f8

    SHA1

    4437a5434f484fa8ca487002d7d378e7aa0a1192

    SHA256

    30a31e5e198fc3e98542021cb856b8b95969a6055a7c89c0b5e0a849452598cf

    SHA512

    c2a5937a09a09fb002e6d78a29e4b39827fe4b878b9873847aeb9f3ceab402ac1b6abfeb401450e30e801792d8bef9f51d20ace229f2dbc913e010b3d1903cc4

  • C:\Users\Admin\AppData\Local\Temp\Cab3F81.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar3FE3.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b