Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2024, 07:36

General

  • Target

    2d519ba2bb315b44e56de23c18ae235a_JaffaCakes118.html

  • Size

    5KB

  • MD5

    2d519ba2bb315b44e56de23c18ae235a

  • SHA1

    988567a97366ebd8c900b5fb72c5f4edbc3402f9

  • SHA256

    cd0eadbb139977d53b9d6f64a488aa87d6ebfc3b3e0203f1a5ed9ceffb2d8ca3

  • SHA512

    0abd62b15201bbfc028bc17c07440dc8f0e00c3dd295c66d819c898fc469364c78c2f00a6ac93d52b2722c181da1439aecbf3908d5a33c5e04e069776ed64d69

  • SSDEEP

    96:/tUn37eI/XZX6UDTjUvkgvIUvTmUDTYZwV7mtP+ZtsSLpT9aM2xUx/KLEdcFqrco:1U379JhDMvtvHvxDCwV7GP+gos6Fdcan

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2d519ba2bb315b44e56de23c18ae235a_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2980 CREDAT:275457 /prefetch:2
      2⤵
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2104

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eca3abc189c9e71ca5d9fb7cb20e3595

    SHA1

    ffb02e628fcb1578710272ec541bd59cc062f859

    SHA256

    e36f4c39843b8b1c8584262b8592355fc5838a057fec97b140d783bd7b477251

    SHA512

    b0cdabf312cf93aba9563a742a1a4f910d049272aba33b0ce658d409b8b239f504aefc32ba68b96e6d53c6d959f588b6f528f9fde0b0d8c7c43813839111d945

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    375054046a0daa1aace7bbc31eacd13c

    SHA1

    9d99e6a5ea93affdad71d301d66cb8358398b68f

    SHA256

    a97c699a24953277645cddc01ac29bd3eb16c33cefbe9500517694d24b7719eb

    SHA512

    f22787eb7c449e39115c5229855b005f319aa68cd0d6d9340e175a488cbe58cac5ad8d184db7c52b8a5891d8aa6a0dc2e781b812f6e72a9d0d8c9806cd1131d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    930e7cfd7e3e191719f16d166db654f7

    SHA1

    f6cad36b3a2722fad0a5d3b3ebc7d192cef707d8

    SHA256

    5e0b9f26a227b3d427817f133fcc20d5566de60401538eb8f7ae7834bb0bf9e3

    SHA512

    10f9dea31e4ba22f8e578d6007dbb55c42e24ec050d3c38dc7603fa06fc891ed59490591ea4e29a4c39d6963e4443125a6455c41933bff68a075bcf8727e6b3d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5d5722af7f12fc5ae74051a0434e40d7

    SHA1

    ceb577bb4093a8ba23f4b3a2be5e2e437722266e

    SHA256

    ad96fdd3bbf66ee5e291064c7f49c9d6808d9ab992b08f3424c2644ee56a36e9

    SHA512

    846cbdd5efb373998e34405b9b7e151f5b62686d78c0249c371ae10a62e20d26add2217f594929d10a2b15a0db5f4b3f0102542ed26964eddcec7d2c2534f5d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2f112c23dccf3d030cb0823e01c995ca

    SHA1

    3e319b039bd177f11e03bbbd8f256cf0bcb701b2

    SHA256

    4837bf000d414628898b3e71cfd42239ab16547a00589988b48f9577fdc87de2

    SHA512

    2c6a949f9b513407860cc8401df3a880a4bc03fad39533044826eaf464d399d7064b47ed8e21cad9c35fd0b46994e053758938c80fe6230141965c7224531559

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    330f6d5554b296b1b61e733c1b46ab42

    SHA1

    9b61959b49e40c96ceadb0d16211ff5db736b415

    SHA256

    cae9f236bbd3e468e18169d6c42c334e2bb0da43139c1d02acf950f9dc536cf7

    SHA512

    f138aeaf50f1da00d0b84caa93d1abbeead3d785263491ece5e828b88107a0ad39fa2fa06b20f250819b0b6b736bd7eec7ca33e8c2800707d8647f97cad7fc03

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1f5e0de00663d4e99a3bc97dd91fefb4

    SHA1

    e47b51f7e698d7fd3b62c329135d473d49664e66

    SHA256

    31da53c2ebee8b0f5e4d69d63e212792ffb1f59a52a7b0687827b50df42a44cc

    SHA512

    b0f8b7c0d85413db674ace793d7c30d3d06f2cbae4dda0896f5eee3f8654e11429deeebc28145e876fdba5dd952e11263fd7f79d8da5bccc386328e1c3856130

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c4f1ce5606483b8460f2e13de237d121

    SHA1

    00e10e4fd11fe90528d29a32fd2416de650e6c3f

    SHA256

    c20b2ee639bd7afc1323488b4b8d826aa1c44fc18e46eb0849215adab8275166

    SHA512

    c2efed735260a0f6a88501614130be8f079ec48afdfeb51e4e8c90f3ef4a0b8975b2dd5a7c5ceb7ab51ef423a99d24bfe76f4a4261c268f7203e5abb03d64604

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    01f00ae93827ff73096b476a9ec0dcc9

    SHA1

    230bb3a2e8d294aeed9d03aa75e5ea0951f519a7

    SHA256

    b29c61b71859359138ec4c99249b63f4bb1b7864d24557ab59933dee3d20112f

    SHA512

    d68ee62c52cdf247ad6ab8d5e4b9080a5584993d5382f2f5ba6a34a53a000d1f3085fb33f8b3ca9710e6a4769d104efcab42c9a3d967093c1309fa5d783b8cc7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    276c8a22b22981573e803f90b11a3cfd

    SHA1

    c26c3c568bf42655c1b558c7e91d7e5c14299e8f

    SHA256

    ed2d20b1a94f6d60e6c8fab8dab274dbf1c0aaee6b0f6d0bcac5bf45708520e9

    SHA512

    6ed46dfdeb8bac001dec3230f03e7b6d938050dc2becb72101cf89479d1310fec11868c51fc8b29b6cc9c4400079bf5dee2f4bd732bb64e8502932ba456e364f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bf6c3ef31e31e548165a5d23fa12173b

    SHA1

    a15e89da606a1369ef9b9411c812d13bae10a03b

    SHA256

    28c03390d406b15c88068a00f8436d110d21823595f152f1b98d0e7859fd9238

    SHA512

    42958d932ecfdd5969275590688122dad724d60b3068c01ab607e74c3825cedb444bc4be5f18e108de2b7a388c05adde9129cfe44ecc138aa9feb808b8674143

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8efe2d425cea6ccf652a2d6a8b765cdd

    SHA1

    238265c145e9bde0ca630c19a65736f6dcb42f5c

    SHA256

    26e81baabacbf4ef5200410538fa405f347e1d3418c57d0af4cfde45c37556f6

    SHA512

    91b5dbfa937a2d60cdcd8332189b3959b366cbc8760adfc4269b4299482179bf7be4e2395ef266ca301bd4d3be4114c03b005bec8f8a1a63a3ecdc1a1645352c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c7174191f43c5d1be6f35a475ec0a6d6

    SHA1

    8d05ef8105097dbe09c027a676adff12db2222cb

    SHA256

    fc7ff59223eb68196308b526c413d3618830d36a2ffcfb8e479e386355b3b641

    SHA512

    e789310eaecfa7b2800b25e223bf8f9303730e72274d34cc93a0cec73610394ce1b7257a6e45fbfee3146d678d7951642199b5e1a8a0facdc5c23ef146dbd311

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1aaf38c5567c315ecf40aeb23e6a5681

    SHA1

    89568cae98978a31707a36bfccb8b9ef6f8acc73

    SHA256

    125c85932ab1d7501ab620d89c52330e2af99ad4319f4e7e7f7c68ccef1c4acd

    SHA512

    377f4f6c7368154eb6b1615ed8e09a9ffe7d5ace5322450bb412da245d69ef403dc1a2a4907c5a498eab5e91817cdb0fc0ac255752c3fb34f3540f27307994c1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a2df0a17014723608138bf352bfaa02a

    SHA1

    2cc4e70fe6a56738f85e7676974507ae7686593b

    SHA256

    df53ef1282a327f015c54785067807fe90751dbdf1d7c416e647db4d8006dd09

    SHA512

    45f1dd48a46a5df50160685026e7270cb9d593d47c0a91f6a07e2ad6ce72dbe0a0d4fd539dbdf35276cae804aefa6c3b0b21e2ce21226194a25aaaa510d55c1b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a2bfba6a5ebfb1b84c4930f5c4010e3a

    SHA1

    0d74dd133b15be5a6d1f4377610e1df0d35f211b

    SHA256

    280451d57213ce1d14dbe6906601a6ddb59090c17a83a8fa9ff15fbe064cd641

    SHA512

    252d32f334d095692e036eed43ec04ff8d549d7b272df20391320bd62de4ffad961f3bb4c52d51216b2f177f6b479d937234c10a6d081e9fbd1020cf310093e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9097244a07f8c9e703b530577b9205d6

    SHA1

    607c7809ad2d8aaf25543d2ecdf70a8f4c2fb145

    SHA256

    340e3459f852f4c11328118d7664ddd336377bab189435bd9abb9fb25c5c4e95

    SHA512

    8b34cef1b36e8284de1afceb76fe5d5414acc2e328b4e49c7216fd1553347b3b2d2e27c97a318dc9f6fcc6047aa43bb4dde75cec8b0c05a8617b34565e71ec90

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    402d0afc0355e2cb7b835025a5ac21f3

    SHA1

    3a82ce13a1fec80fb921df153b564ab61f9d1c09

    SHA256

    dfc1f0f1de839cb25e5a53c24c5d724e199eab1ad008c3c3d387763f67854d27

    SHA512

    cb55ecca8b8bdae4419ca7f88922cf291ddfb156a82d1ea7717c2cfd425516cf9da00f1b3b0e39b8faf70dfdc594108777c54cdf3f2cbc616a89fd9085dcbeda

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fef586126b73828623bcf2d57c6ef23c

    SHA1

    8be37395a54c6c480326fe5b9bd4dedd96ee50e5

    SHA256

    8ce8497955b32877e5790983fc670b17508e5228e2cf62b368729f81f0e131b8

    SHA512

    ae99bc2fcd22f1222543db1d086ef9a5b1821d19a0965c3c3dca3b89921068ce20a1929817a2311262f1bd28daf8a76488fc66e17b81c8c683bcab4e1cb66496

  • C:\Users\Admin\AppData\Local\Temp\Cab64DC.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar65BB.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b