Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/10/2024, 21:04

General

  • Target

    256d5929642e85e7af5c243795b4e170_JaffaCakes118.html

  • Size

    12KB

  • MD5

    256d5929642e85e7af5c243795b4e170

  • SHA1

    67b66e74b52650b728c7043a6c664d0438e4566d

  • SHA256

    9ecccfced6212fdc78262bb97758d36454a71cb739bf38ebb6c82139d7f791fd

  • SHA512

    15f826eb6124310c2ccf255a71e652aeeaf36ff06fd10b3ce9e63b891a3cb3201cfc533ec88b0496a4a6b15531bb172b02c8978159bc59a2ce964e2fc3fd0048

  • SSDEEP

    384:sClIcMVojoT/gu+B9Ztn7uUnw0TmzguLZ:MglT56xLZ

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\256d5929642e85e7af5c243795b4e170_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2280
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b903303ef3e4decb4c571eaf453ce1c8

    SHA1

    166d97379134824d9852598272e23737084d8212

    SHA256

    8e3730a4e7f14b964a535708345e682b6c7db6e909326f7ba9de57748cbf13d5

    SHA512

    1f00e4d831bcee3836aa99cc7efbdab0777da1c31929b5819074ffec644b1a4548dfacb50328a76011cc6f014a37ac37a81b4601ec35e9a966164a30bc930785

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    919a3c9f68d2d0f7e2eaca5f8cf44dcd

    SHA1

    61a41f1395076272d980f75967be3999ba7230f9

    SHA256

    73d6769cd94f02547f65df0987bfcde399948a036dee1942775c4d35a38cdb74

    SHA512

    1f5a92c6e5aee8b2e7c3f68e6334488e5d4485c09a1c1b1b251015363ad3d62b99b057c8476edb54ede18fce758479530166f33e37fcc052f058754b6bfd1d7d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    393393e7ab294371b3735e79d5ea575d

    SHA1

    ad4770b058e8afff6aebcf26a134c4fb44750f58

    SHA256

    5df77e40657c10646ba15d949abe17537df744322026bdee16a81553a615d73e

    SHA512

    98b163d3519562bc21e0fef4a5cd960bfdb17de9408203509df2e4a2bbd5df1df68b8e2ecd8525733d7ab517fe557ff904d8fc87de4b6447b19326fa117a8179

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    baeb2cc306041d2bbb0fe91a4ef59fec

    SHA1

    10c83069e961af36beca4fad5bba3b6052daa0fc

    SHA256

    19e48c9c9804835d35981b32283cd22b407439ea783af0a86a18720999cc274d

    SHA512

    c04e6ab87ff25a00106936283948215fd66911af7e7563e95f5b49ec44a504ef42f8669c0e54e866297edaddc551179f86d1243831bdf9391b5cf2212bfe842c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1a01f819309f31e75551c69dd1a2739b

    SHA1

    6a18d0518c0b4388bb379007f7b1bd2ae18256bb

    SHA256

    a2ba04b431fc898485f1e2ad9432e41f1ea907f4d62c7b026e55fe68e7d2f918

    SHA512

    91fb2e18a876ec14a55f6c788a76c8c359be846f8b53e2dd4b4a416ba037b396c99feca17fe4d4293308eccb3515e179ca861378ac0fa2ad8b1970db4fc38943

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    18e335aebb8ae64a0fbc8cc79066633a

    SHA1

    c5d0eb790b3b7d2a41dc1fdab25bf975f52c95ec

    SHA256

    344ae9396670564153448fb7024c33c54530c030d47de4d51316ab14680ab488

    SHA512

    6e234b07c1339db659280f639031adc4c3deb3891963cb62d11a93f75acf54c64bd070888368f60fe9e24451f2ccee24760a116173ada1e984b7bac1fabe80d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    16ec3299c9f61be8a80bd306db1fad66

    SHA1

    3075eceda6a256ad6bdcc52513405bbf46bdccc3

    SHA256

    2c008a4bbc8bf45cb21a0c83b2b0d9ccee9b5ac8365d7437a3e3dc5f0f138974

    SHA512

    f6776df9c5535024616f1b45713fc30f70e2e8cffb214e3729bf5f2b7c503f595b2daa8768f888c03ed9184587a66ddaf3bdf1746ac7dbd274a8819534ff81e4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a5d4c3b6d8eb1c4456832b945a88d919

    SHA1

    73baf5375d3c18c6d6c0952ad9288c6f5dc0936f

    SHA256

    0dbb298e4beabd267b3e26dd1f5ecdc06e91fd50e4226bdf6f4a2a72e2849816

    SHA512

    029d05bf4d8935e3003d6f66543870b60275194158d59693370a06096360afbfa48c70069cfc2aefad053cf8a2e2fc19978153e29d7287bf19ee6e28bd46a099

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    704e4ee8b398cb609f91b5305a52b34e

    SHA1

    dd2d3b0f594818d4932c1442332350d0656c9312

    SHA256

    ffa18c678b20dc93567b455a0f7f9a02101f706a3fe41922ad789fe54472d16e

    SHA512

    1d5aa626c81e49439c6687e41bab0d2a51f71b49dbeaa9c25be91a8a010b5b49e29a595f6cae5e0009faa46eaab4668aa3ad685471abd1511a28d6a49441c749

  • C:\Users\Admin\AppData\Local\Temp\CabEB3B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarEBAB.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b