Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    17/10/2024, 23:03

General

  • Target

    54281b69f91fd98377002df544b5ff3a_JaffaCakes118.html

  • Size

    8KB

  • MD5

    54281b69f91fd98377002df544b5ff3a

  • SHA1

    560784f6f12bee14796c3a57b4f6cd34e9b9ef69

  • SHA256

    b40560f73cfe28c840e2e7e3f706a21c4a41d878fdcfe9c8c322e537b2b1af3d

  • SHA512

    ec4d9a03f2ccf60246cd4d9f84f18a2ab76a5d0b47bc14ce78d04a7a80a6fbe6278d3ff981b113ee019b12c0202a1c762925e8f7c8639e12ad01f80cd65394b4

  • SSDEEP

    96:ByzVs+ux7bpLLY1k9o84d12ef7CSTU7BkIIwvzR4CIp7ncbZ7ru7f:Ksz7bpAYS/vvOJgnq76f

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\54281b69f91fd98377002df544b5ff3a_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:2
      2⤵
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    765e1c9844beb53bcc5257096d519a90

    SHA1

    12c899b967cc47e27768290c936d2b3800ac7fb7

    SHA256

    8d81df840e84b49a27a4d5f71a2dcd0f377314960269356f77cf016ce45a1551

    SHA512

    7f254202cfb630a861f01a4a1fe09a6c4faeda48f66019ccc0cb2263fd744284a85207798ea4d5a4ccddfcfa067bddf16e2d541f1787fb2e0a5db0a5f16bf0f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    47d661184c45678c7d1fd95674fc618d

    SHA1

    cf7df608fbd49ca652432e7e9fb90b3cc009f822

    SHA256

    dd49c3f5d91b56e09b9de9dc8eb57ef4919f8322bffc2e9eeb46a682a941f8d7

    SHA512

    259f63aab3c08724e94d3c40047f724d4fc0e50646e9386df653bb06f17d2dc1d8ad4bbb9e041f0e19d4f77ae05779859780ab1fb3014eb810f90b6793042eef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f963ffd1d5aae48937826751bb356a69

    SHA1

    9f6178f4ab15fe3023ee92c2c2f07db6c7504c55

    SHA256

    789b4ffe8aa61de5838fe2e4e48b20480cd7220484d60097538d2a2b7ab9216a

    SHA512

    c4360829b77dede30b8d0304051bb45eebdeb79a652d5c50bb3e293d18a5ffd9234d543f3e3025b6324a67d7256bf1632ffa4b701fbb1e660bfd93128a02693b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0187c03d17c4dae49ebbb1da05ab61b4

    SHA1

    520badd22a1369083ae301bd44a056b57a900061

    SHA256

    5a730554a1deb663096d56353474ff25a96b60ea1e62ad888cae0b4c04c6a2f7

    SHA512

    40a7ebbf6504d0bdf9ee377dde63cc32c895dd43c8bc4d47be1821f70577ae7286d0e11f5318498b8af70aadd6368914f973009c46a64cd85aaaa8c500688f34

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0088c8d48265c9a78a7ec51fe6b2a685

    SHA1

    07807576370befe9316bedd75fe0f61a2a659e5f

    SHA256

    1505fdefee42795369988d1b868847b1d1653ba28ccbee4dc9ac0bfa9bd22c8e

    SHA512

    4eb4ed6859138cb5dd6968926ed11320910bddfad5a2c8696275fcecd9e8d3c7e58a092ef358889fe4f5a39990095517148ab5e7723abc4d962024d5ba392c03

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    695070f99ffa940fe2fc1797315add9b

    SHA1

    3cbaaeb93af34c141ea1412b1f0511750f12a132

    SHA256

    9daf28266a5646ab696a0f3d0679c0d44f4a7c6fe557b1ca39c867e5e4153a2a

    SHA512

    975db1a6a27e8375188b59453d81b20fd3b09213c70fdd85d3a1697db9151e0b017c815a3a6ca9cb162d14160ab3f4276480df3f3cb15ecab78920abaa8e23b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    40bde3eaa4765e67cc5fc918d31ce32f

    SHA1

    84c0212b7e34787e4d24bf286c1b4f71e571089b

    SHA256

    82011749c47e50407978cb25f40354b823f691fbc408bfce73afdbda1e9dc89e

    SHA512

    329644c2ac09700491e34c6a5b1cb858331f7cb2d90afb32ff6f5935e9416af1917a9792dec7e675c7b1336b702f9fe2a5682b1777012c68c42aa2eac6cbe7b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9d6849a1b3c50ce2f2d42286e0f496c8

    SHA1

    9b65049cc9efb7a773febe5e6c48808554d2bbb4

    SHA256

    0cec52590518d30c7128c9c785ab22431957edc9c446546a2be75475f73bdbcd

    SHA512

    36641e44ae001c9425b1616574153c405903ab19324d7b13fa5dc92180325264c123637e42ca4e78b1eeb877385e0f2fc8d0dd6da16e71ca5aa862e23cce89a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4331fdff62b8e30788316ab10788cba0

    SHA1

    704fe2e17e3b897b547bc64fc7fd2fda02605612

    SHA256

    6f9aa8694ca70e34ffe2d9e591bbefa8def3d34e39022a693dd4bbd8059fb5e8

    SHA512

    a754ed2759a47f0ced427cb041af84c8772067d153150b6944bf37d23bb3ea9a36d01d6b46e7a4625bd73f97cf528a3a500ffb64e762da17db1e488813895144

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    85f077420d2fd412401831c2ab8a52cb

    SHA1

    defb5367a1bbd2db136d8d5d4f29a5d0d8b57179

    SHA256

    3e33d82f03ec57c6b077d1766a80bc1e745a6f60f0befd7fecdcea38e19541b0

    SHA512

    7378a092cfb62f687d7d4e59aa6c78cf3410096c6f330fdbfc75d93c6479ffcbf38279d684e99e94ff1df8d78306c76efe37e9e12687849a4c2625abae1488c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8badf32382efa752bc0c69af79920a32

    SHA1

    2b15d7298e3519c6ff75eacca932a3c3cb45c7fe

    SHA256

    a561a278ad255f08ff394f01fbed5a29b10f608a2ae6e3b4754d3f654b22c7e5

    SHA512

    ab5c3372f7a1dcf40287b8a97f4bb70a16446eda2d783a6c86170c52b72a270be71c70b34824b6d80300f8ff59fef01bd6972aed46661c98204639ba8344fc5d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fd05187d295393cf720128c6b00cdc17

    SHA1

    b0b7b884cdf07aa7519f93d8c91f8137b49b4d8e

    SHA256

    a7771f4dfbd5d248aee709123e70f7b9b16fbe9df1f20a81a472f065dc107211

    SHA512

    1c68982508976fa95cae1f73db1da2a5d5e3f623e0e7f319ad21978147b02927e7f5a5edfc7f096f4c56d46456f61ac38abbd18561e29893ec4ab09efc8014f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    08eeb7cd9ebabd30f10ba3aed598f1dd

    SHA1

    c180857da2f5ab8f811ab061140d2daa2c64eca6

    SHA256

    b3632a59b9f21acdcc48151fe648131cff4db11a2f1e7ddbb1eae1e019f53c22

    SHA512

    f75379f9c550d341a26bb196b389a67abed08df8ef2579ff3c1f58f4b9667a42748ee02b7a185a3b37cb1f55c94a584c0582e661ee5ac3fdef8edc322000f186

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2f00c0cf384d4b7d6a5e6aa2ca1eabb5

    SHA1

    90ccee0575512491d322fd3c991866709ca457fd

    SHA256

    7f9cc842aa36794a299ffd95aff6c638c3e68aac272e27a29759b41e48745a6d

    SHA512

    3225f5c3550910b54707d88c0d83e244754ad2d95adfa31efbd7147e6bd395a1d139cdfa03f6faad4d32a1f5e11bbb01609e6d45b4e4487f00da27653137b911

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    db1cbbe651df15f9cfafe76fbc821bf3

    SHA1

    75ca3f533b7fb6820840e860bd6334470086a7ce

    SHA256

    08120a604d81a0b8037833eb556c92fad0a23228293bfc98268214ff920f8f30

    SHA512

    8a8126eaff2c2e60c9c2e3ba99517630faa32c7325bbc2db86b465ab729278c52fc93f43fcb8b3d655b512b9552ee32c5d20f316e920bb2af7ea9b31715d394b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f3fadf4283954eb09327247d94fd7bce

    SHA1

    7193ec9e441bfde0cce7bd5dfdf8c183ab49a3d1

    SHA256

    b4340e5dae1e751e32a37c2a204ba20859928df3efec6d13d0bfcf3a450491ba

    SHA512

    fd0dc8456ef75830eb4acaa67521fb0821532566f847ff4ddc4426b0cd7b54c43a68c875a356aec22fb51af1f2c446304133542868f3a18f1d075dd401e3536b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6014c157bf17403f26dbe7833f7658fa

    SHA1

    16a642ba0c9d43fc80b0c446adf36ce6e9190518

    SHA256

    e1f7bcb9819a139a8cc752674d95c11cc0fcd5a8b1b2d7417f6c537a03d740ad

    SHA512

    f7917a5852a76132283189376dc0e58cd8b266f464304a317c086a00f52d7574e446ff951f973d32b9a7d88a615f9d459047c25e30ae3a2f1e84abfd8d58a939

  • C:\Users\Admin\AppData\Local\Temp\CabAE5C.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarAF0A.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b