Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2024, 22:48

General

  • Target

    448e29624f56364b7eedf44ce6f8d850_JaffaCakes118.html

  • Size

    19KB

  • MD5

    448e29624f56364b7eedf44ce6f8d850

  • SHA1

    d4208a098ef27dea517a10ba3466a71193ed3e73

  • SHA256

    96c70afb0fc6b146e7cee25366c95b4b5cc4e64b2fc635bda5a775dacd99124a

  • SHA512

    f37b128153c86fa8da3d4b88c5a7441b7fe5b8cc4f55bfc407f89df271adf360cf093f94822ae888d6702f6fab3646b00e84834674ecf95bb835ed9678e39c52

  • SSDEEP

    384:zidKhgESdTVBD8caQ3R8+bvzemLxXucfIk99heazVc9yT7:ziuSdTgct3i+2mQOIk9S8qyT7

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\448e29624f56364b7eedf44ce6f8d850_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2828
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2828 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1232

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eb67f50ed52a37fd994271a2ae5ae492

    SHA1

    82390923772e8372bd9f6b09fa9c725ad8fadb61

    SHA256

    de13f5360a23f26b849d0374f685efb1dc08fa4c9900fa7880089cdcd45fbfc7

    SHA512

    9dc8a63290f4956af28bf1862317bcd7b068d171546efdc8b64850a1206bc9c2588e36469b244c8ffc1f06b9baa9996b1039b431e6561c6c46f6b49793fec591

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0d37d467302497afeeb58486056245c2

    SHA1

    86d8969839bf73eb752718cd8d84edf9b5e5760e

    SHA256

    4904be0364b95ab553f0b9de6c6c169340df50c168a98298e3114b501df6fca6

    SHA512

    08b5536ee0e32e132a696135ae2d9681fe147b3a8741e7a86166beb4539510f1fbb685e6ee872a70f5faa10719e7db75055526a1e81b0dc7cf96d39e14f91234

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    44cb63be1735d9daaf079ae2fb1dd5b6

    SHA1

    100ab321f749e29ef38b731cf5d29ec1f7f89d5d

    SHA256

    1bb49a2020c176a840de84a7d39e1402091bf8fbcb58554ca89c8230c27a2ceb

    SHA512

    dd57e6c91b125e53a4faca34c3c7a5f4e7a67d2f22957db33b7f76c3ee67227c3e0321d434d98025d95341aaff652c0a7db3e7e642452ac6c17c8e76da38d27d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3ab3c1ca57e5c320fa3734b173e9f2c0

    SHA1

    bd9596e5ad63515b9a0fa7a5dc935911f639cd2d

    SHA256

    9edd3fb13cefe906a176cd01a81133f35b712b2faf57769a4af5d39d7219da6d

    SHA512

    61825963aa5ddc55d7812633e1a037e4398bf68fb93547304f10c3dbd789f11e77350c3f0598fc1c344388ed7a119d6ca8ca46fd14bad68bc0b5f0287ade1e35

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ca67dd71bcf238f5a2ca381ee3868b74

    SHA1

    d22046532ceee8140d5fc1d9b403157f5d91b2e1

    SHA256

    ca8e3ef9d828d3e5abc6adc63b9a8a123d09165803fc9d5b31a399fff8780a22

    SHA512

    de4d322bd66c9e5e3fb30f0f6fd0670b8449c0754b0246bb25575f1a6717fb6a18514a592cb58b6b7435c6f18bc601649064f2f2ebf16c6ae48a3c8f69d40d08

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0da4407e535c64be150c8c0b409c4cd8

    SHA1

    179e45105c9d7852e4c26b815784a3b2c430b574

    SHA256

    3e654e1cbc9d13f755444f2f17f336d697ae30ddd1f356393a34ef2773ebb983

    SHA512

    6a213771d2fffb270dd596d48b34a3758fdb7deac1bcc864fc4060a57578373bf29779e1e07069f678b13d9dda0be80c4ec7fc1c52bbef5149f9db95ed270d2c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    efcdcbe78e7df0dda92e63c919e84fc5

    SHA1

    325247c4ef32eedd1ecadb029b828a1078a4523f

    SHA256

    3d7d799e639bb5e9cf177463d996831020950a9a2c4c29db1e45bd69aeefc35a

    SHA512

    5ce27b66c434addd6736facd7af075953bf7ef6f96ae8c15ae938975cc3b024d4f194b6de3196393aa8265238fc2bb27923c9ed7e4b3cbacfa03307b275b7285

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    31090e60856010faebedcb9eceff2130

    SHA1

    0c6f8ec89fecbb1d7268d5b228841229d85d0acd

    SHA256

    aaa8530a2a428153d32c15bd029edeca97047a9a52003755fe0b76159d72f683

    SHA512

    9e9dc410637e8a03ef2dc0083994b1da2655a2c3bf6342c08a89ff1f3734476bf9ec25fbb24d25cbed9e9110dc2bcad43c08233a7d4de5104c757bfa3877a73b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2b096ed3af6e9756ba09bc30e4aed675

    SHA1

    a426701b9414536b455c943f720f0aebf6880bcc

    SHA256

    0666c6a4681194666d1f3989687f67e2af93a6f7050bf9902caacbc15306d878

    SHA512

    29d58ab04dd0012a002b4714263d5e2a6412670b3310abdfcf8d847f0a1388717eeb0b6f319085578fc40721267db5f10c6f7968c3c894e15bb29195cd355948

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f7e9cb101b8e8098cd571a4f7d89a7f2

    SHA1

    627778574e2dd1cd4c29f0becd45d096bfce87ff

    SHA256

    2d85c85e21474227fc809207d43709268f8214eacfd5e600c9df0e620106e131

    SHA512

    d5e572c8c40f6c66de9c3938129f0308fa334ac2219af8927fcbdb9a28ce774437415a7910dc8ea410b7386af9b9b73336b5e74e76f806c458b902443f5fcf2c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4e4aa001ccbbcd7273297af8a2a4e6b9

    SHA1

    f548285595e140875ebaff1f92ada0cef2dccd90

    SHA256

    5be47a12e41560a4f150167c0a22d2967b483a94556ae8f01dd9c2682fe16a10

    SHA512

    0757f42808db4d2f1d7becb6761a3007e2c7a33df8516485816d92cfa929e6f82a0a8114fd765321f77b776ce778fed9a6a6ec3855f2cb053b8a5ad859e64ab3

  • C:\Users\Admin\AppData\Local\Temp\CabA9C8.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarAA88.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b