Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2024, 04:13

General

  • Target

    0dddedb52db78939dc0fcc761517a61c_JaffaCakes118.html

  • Size

    85KB

  • MD5

    0dddedb52db78939dc0fcc761517a61c

  • SHA1

    cecdb5ec086e88e557c65b13fcc288ab7744e86f

  • SHA256

    da44238013eac737da8abc33f7b5280b076bc5016adc90a3618d11a206be454f

  • SHA512

    cb87c7b17a4dec5bf0c39134c13d15beb903501da9f73a81dd8f5c6fa739f37adf2d741492f2cd18e00bfb2cb1d50a89baf6e012fb5fb3708b54b908ad5299e2

  • SSDEEP

    1536:J+ipVn1BUNqvLKvr7R/rnVeWCUMSo0mjiMpbqqvmznhKv++nPLB1VX:JBvLKvr7RJmiyuznhKv++nTB1F

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0dddedb52db78939dc0fcc761517a61c_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2784
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2268

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4e8d47b20bd921661cdae38f59d5cd6b

    SHA1

    38bb17978e6056142600b321e56ffa8455c91c11

    SHA256

    5c2a997e4441f7f3820b5331024780012be686488200e4ae644b72990a3a4f6e

    SHA512

    5bf6cd79133607cddc57bf192cc6bd63b20c078ed3a52ea804160562bde289a2dc9db6c0259b9611095e04b62327370da558d015e26e259d3f9edb0c238b1868

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6b162d373a6317d82f1746ede4bf4c39

    SHA1

    ff46ebf02cb12df2503f421efb7829178e977788

    SHA256

    21dba9cf91f6eae84324958917703a8bdfa41767569050410a38881d624b8cd7

    SHA512

    7ac1382945f14baca1a3e75a8cb4e561d9511af62fc96732c6380017caffd39596f320bc37a6646d357ed0d941bbe3f105a0272ccdfe54779acb00236d7b868d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    73c5f40c1ba8dd270c63a249280eebe9

    SHA1

    4b099b6b3bd26b8989f4fbfb21dcf2dc9f68a37d

    SHA256

    43079f4304f899a568d5fb4810ae7dc0a6b2e6762507d76967cf80c5b6dd7dbf

    SHA512

    eb374a1db5b5dc6789c20473a75bea834e266d019961a1ace9d72d3abbf2f567abc7e1a6dd4490d9b33a5c71193decdfae754c81987fe4d9567e418b47d16a0d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e2c07a7143f017321ac90d5c603c74e9

    SHA1

    65627482f0ae168f09633384476bbd4000b509f1

    SHA256

    e6c8e4b9d1bf32f0903b385e07269d2658ed900da5d62055f128f324b95e6eb6

    SHA512

    ed9e742bb3c6019c30cb89c77a5493e62d9c281a53d41b1e895cadbd538118c6ffa520431be95ec32614ff1d459c275aabbb7b325f31167ab02b9bcde54a501d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    18e910eb64a54a934eb99ad58729f869

    SHA1

    2184f1be2f80bb7ee55bbf91ad337c3b8700b6c4

    SHA256

    9757e835102a75439a019fbc1cb16c4bf4365d3702b2480cb395b13e31f767ed

    SHA512

    c9c833736ebe3469d1f154b8d7311450ae625fc3abb704b4d6aeb747869244884d44b9be54c77b86f6bf746b4f2f4ffd06c2e73ab1cc9fdf9503daae5a5a08ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    17db2b41827d13eae38242f55d7bf522

    SHA1

    3aa9d4b870ef5e315ce76c3a87bc3a4b76265625

    SHA256

    175f739d8cc7efd6201c18403ac6a23d185cbc4903aaa7bb2b529646b02d3515

    SHA512

    195dda2ccc412fe1a259ab38294f8811a119557828f42d6f2fabb227bbb67b4943e6de72a145866b7265d392842eccac8e8d326ffaf74067562b3840aac9fae6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e44627eb4455fafea073eda5caad3fdf

    SHA1

    c14ba4f5d59304249156ad222c889a4bcce754b8

    SHA256

    2f3114b8327823c056c0fa83f81c9e62395f9fa495ae9b875961c43087a61d5b

    SHA512

    0619a5c92e73ed6bd311a192ba56091565bd59c737cdeaa14753efca7a66a049ad5ecae009d2128f488f03021e4be1bdef6c77700fc8759432a93f4da6e3889c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8f44aae1a2b35588b9d8c07f583daa05

    SHA1

    0d7230c80b7bb882288ebe65e1d9d5e6ce399a77

    SHA256

    574e7b97e1e0857e7a019798635c3ac47dcdc4df4a23ae939e95b66f671bad8c

    SHA512

    254913e444474c81bbbe12877d96c612b6495a9c2d0b4d11fe59dcb93ac9e3103dca556485d859197c0b318d57087db45abac1380f1b8bcd859cb808eb32badf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4e0be175da95211bebcfcd30bcf5d8f3

    SHA1

    0a74f602d646e4c88fd555ba3d13d7f973688742

    SHA256

    dffe1836cdf83b3df6e364c244f4c5137703ebad8e7aad6269eeaf5d98f3c452

    SHA512

    94c8cba3cd73bc2cd4a81f0a6dba77e232b4ff5b55284a8ef8ea2e0d0bd3f41446200cfdec39163bb7ff4c6942e01ad16d40b6363cb887d423c641b27f714679

  • C:\Users\Admin\AppData\Local\Temp\Cab6D75.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar6E14.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b