Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24/11/2024, 18:43

General

  • Target

    968577348f5c3ee70428f850f8d3bce3_JaffaCakes118.html

  • Size

    53KB

  • MD5

    968577348f5c3ee70428f850f8d3bce3

  • SHA1

    4d71932f2d0464680107f061f100509faa1396c0

  • SHA256

    9a7f3c59e2e76e15b912b6ab5f0e12209f788da6f6229b4ef2273f6ae5c091ee

  • SHA512

    2c880a892dd6b99b73e665442d9db891f9853697281cefbff6f6836b0144e1517f7c3ae8512a21cd653b947166367f4f6d63476f0ff9f2610e794d88a329bb60

  • SSDEEP

    768:dVS+jdlKiZ5dYhXWE+upjWm0mKcNrxRQnhbQM4qkkUnUa2Tb0bQpBfbHuvBA2fw0:jbI9vZRQ0HnT8pBfKvBA+PS3wt8w5

Malware Config

Signatures

  • SocGholish

    SocGholish is a JavaScript payload that downloads other malware.

  • Socgholish family
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\968577348f5c3ee70428f850f8d3bce3_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2160
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2160 CREDAT:275457 /prefetch:2
      2⤵
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    f23177c13b8a9cb0859d36fdf6f84e10

    SHA1

    e11a025dea6837107fe668d6431d9f6a262bb17f

    SHA256

    1990c40b610e3dd1d1f4bac2a82d7364ec102e49bb26745b4856f3dfc2c500b1

    SHA512

    4b9e365941c8b7a04dab45829257fddd1d92636fc8a90479d91b074ee18e9bd47ea9e30ac2d3ab58b89cd5f6144062dc8b001ce8a8817068db41f7172ee79319

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cce3916040e3b9e2cacc978889f01c4d

    SHA1

    f001b2f106d4eed528ef101e3f6b3e8d4dff3342

    SHA256

    1a48bddd880f4420d8130106979633860ddcadf6b69d7c59175c965ccbf6cd20

    SHA512

    eef5777b54f0c8f26ee1f12aa4b6eb480d08ac1254b3f4c8f5b74c519463564c524b33887823b9ed7194097fd3c4ba8716a7e5dfd448809e2dc0f7dd3ff9ce9c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e7edbc0b6e14aead6dd63925c93a49da

    SHA1

    6b921e566decdc6cecbe974c86688d7a64dc1502

    SHA256

    280dad249361e2339fa91723e368d20d1fe731a1d2c24b0989d5b40250f0cc63

    SHA512

    24db20e01e333096ce69cafe7bcdf0edcb68e13a195cab4c85df2f0c448664ee598f25275354e7294eeaae208de2f926911bb7fb8bacc10e9d36e95ff9d03da2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0d6e9e5f805a56c6486934f0391dec29

    SHA1

    648fdd4b7827f0bc3adb15f5b80c86807fc5bf13

    SHA256

    991bed8567a716482ca77bc394c16759d0c5d2b0d477d78b678efb310300fe22

    SHA512

    b7ee276440ba16092f64d88708cf3c1bd46119290997f002deb9cc8b3860a87c7d781ae619f2cee077fd184870d5fc9e0aa6367d69c12e2cc09feb2d02cb12d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fb6be08e406b5cc0a200886de1333aa4

    SHA1

    9f324546dcb1056472cb4f2559b2bf02a978b2fb

    SHA256

    0c183ca3fd19958a37149484338e272c7eaa00fe34890faf8c8a1a7c30d2d9a7

    SHA512

    ab8023a38d4168a995d7a49f8322ed5aa3e43f669b40cebec37351491f7351e627f77b2ed84c356f709e0a63294dec04f486478ba0d4fb2dd1a63694e8a207cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cd40c72842929925c9160d340544ea67

    SHA1

    8f4b5ba693c781da086d950b5200f7cef2fa4ca3

    SHA256

    34fa3b12b4255ed2333b6497548dd6fe958197487bee42ff367b570137adde68

    SHA512

    d976a982bf30d32d610f6a63388b3263b8bda7534812b22798ec732e333ac74006d482cf73cf31ed58d302df00851ea90e236b06629a6f950bd3be49da713501

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aebcb6373b336310567cf23cc1964aba

    SHA1

    a9d3569b855b4ffad16a5cf916ed7c8ab17d15a6

    SHA256

    ada94d24fea67661b0df489d9df39bfad9bdfc2dc44a12f91b3933d8ea2fc110

    SHA512

    34e6ee1bb33ef298685af2aa74315f5a5b298268863c406b56c6cefcff227a242e381e67064fc9f8f9b9c262a2c2b2b26b22a686296ecfcc455911fe0a595943

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0611aa039ff41136d833bb05c4950749

    SHA1

    76a30522398bdac47dc0b9c4124a7cd685cab0a6

    SHA256

    27dccbfd458c2c43877b998cd62f740890862aa2cff29068b1ca7315371288c9

    SHA512

    f021b14316d2d571afdacee6de14fd32d456711f9bd9745a91dbf9d6c1bfa3d08166b86034e2f581c8825ddbbf3386290ebb1e4200571202ed9e73baba9c92fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d1a535b813d8f45c87e883ced7e27910

    SHA1

    142ce2e69331abdea016252b5332ba7306ff1e3b

    SHA256

    96a0476b4de90e3693c3d883c6ffd04938b692a2e0fa54254176e7625ea17eb3

    SHA512

    b3f0a42cc71d8bb95d77f43150c7f5f5d67e6de5d593b360e4e022906a2d0668edb5f017d4dad2c3739fe1f9ff954177998efd91133fbb56bf5e42541ab90bcc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    33ff6c9ac2831eabccc6e5858add79e7

    SHA1

    d21519db19f43e833816ca33905dd8564807734b

    SHA256

    ace5841b0e97a633a6b951ed387d50ef9ea624ce231424953504629d9ebddbf9

    SHA512

    6c9cbf9bf7b2b5b5eaea9fdc9066b39382af129c700c6b9592b1eaeaa1ac8e4bfefd6cec8e7b4e8a4ac1b4caf8534cff30c54d61afe5a9302c5dd85cc417dbde

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6c8554931dd880c91a65e45f0056634d

    SHA1

    1a9b213f611c4fba5d766481c1b7b8ca900490db

    SHA256

    005db7be3a0c9361e0da22211d9fa19b4b9d96af7660c9df389fc9e2b35ceaaf

    SHA512

    f2f777d564d579783e96407d66272bb3356507cd9ee0df3c13ddbd48d7d9552fa6e201fc03a19b5682bda22e8a2484b54210ca0273ceb5eb2eafe371124209a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5809266368c3450a05b6fe12e04396f1

    SHA1

    54cdf59c4d98701186d37d46413a26bca5210a91

    SHA256

    6560b664e71ad1a9a02d1f2639d4a29906c295a095f17e44b409b795fa0057fa

    SHA512

    7e223b8fd8fd3e721a8206761db3763adfe45d4f277a4630c832df88cb8d6807ccb9455d08a867c0409fd819b2650283f24812edefa9cb8a27d4eeb36040ebdb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    20015241a4a0afeda61fa1e69927d07e

    SHA1

    0a242705b1884a6282fd0d2776a54c3d1f649038

    SHA256

    38a56cfa06f00eab7970f92a04411cb42c8e2e9ebedd5a75f368a4613a7c76f2

    SHA512

    24332b79e7418939f2faedbf63245369d265e76cb90469c7132db0b77d2bddcbc2ef7260be142fb56c44e24aa07ab19f22bda52ddf04234e25d16b301b3e4d84

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    49e89e29f88df5413e4d4b72649c84a1

    SHA1

    d01be54e1aa8a51aca665b15026325ecfeb97a1b

    SHA256

    e017f15a2588d93f557ede55b5af58d6f35c9b0fb1e0cda1b5c80fb89fef8b38

    SHA512

    5e9cd1551ed1a85bab41f886556836b303e8e095a2d9ce4a85f940914d0bf45c6685dbe8039a862d7552b35445fd654855353e343ad80caedc1e428d8740605e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aa8c7369a0cc5e2eb16fbde4a6f20d91

    SHA1

    e8bb006c7f4e053b1fec153c014f503aec7954fe

    SHA256

    38029743c542beed58087cdecdfbd480cac4ea2034ba6a4cc18f9666d2b347ea

    SHA512

    b4aeedb4bc3def310c9ff6fb2ab4fef55b54eef5e15f40e869142966b9904dff0452fccd2951942f0da2962c7b07204bd8ebbab4cecdb6dca944774fb85cc6d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1d2a1cbb2db704977a45013a1d8821f8

    SHA1

    10ccab5ab33afd7015de04f103a515dd4ae353ad

    SHA256

    d10f2de80bbe4d3a0430c1cb96f5bb6d0d619e9ec92fe3ceff231fbbd5df723b

    SHA512

    7a96983b5216f27180e869dc6799c316148cfa509e864a81ac05abe448f029a06a9b7529d200af18a412a77a5f9a289ec76cb415be9a811504e344f38c8772eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3aa4d810af0c2a8af06343e7e652ca34

    SHA1

    f596fe5a3ab66df1f833541d93d1e65cb8c8ecf1

    SHA256

    3daff9c1d3af9be9ae5da06dd18a50a248caa0c58efb7206ae33f62a91e9499f

    SHA512

    5b9033ea2bfe0d7409aed9c0eec772e0a0a85809b889904d6dcb3bce1a081bcf37340d1cc8e4361c892903d877ae164f2f1debd71c123087288d3c821fce2e30

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    913f8ad57f80bf827f161a53779c4f31

    SHA1

    cfe5ea77f9d73c2e339f4c6c15a950783d398d81

    SHA256

    9460011cec6b346311865f176e17efd831ab8ddeffbb69a77264bb69a466bd40

    SHA512

    c01bbad87a355c6701424e349bdcaba76824c55a81fa888dd920255500997a5b76c0d7897af3ff71247707bf056ec6e4f9dacf07881ebf29f4fa7329e5f3ff2d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    63b8bae1fd362757c1c89c9ff857a6ab

    SHA1

    3bc89efb7755e59ad16cccb9dbc59d42cabc369f

    SHA256

    43e70149134aa384159651f24ee24ff0cb7712f008f789a04c1d3a2cd53bd654

    SHA512

    649c04059d59f9c01369260cecf88b4a93162e930d4ee162ac0d62f0b035297b3a4fa2d79d73d5cd2addcbc092e125518e9be0770a5c50fd4a03165a8f186872

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bb9f01a23447ff31cba4a9441bb544f0

    SHA1

    9f327caf9fe648d18d2eb860851fb6317b1d8203

    SHA256

    a0b4e8377060cf20b345abfc6335a47006ff818b2ee35571672912d221dc2967

    SHA512

    69208bd6fae7596a11da56654418104a8332e8682d2c6a3d10e14f316b24f7e15e84347709c9a688c0a91d054b5f42786c7366027ded81f71839cb2c27b97161

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    20fc37ceecb43a18668574677cc86010

    SHA1

    cd1bd328b63ea6a32a18204e56766f9d628abaf5

    SHA256

    b19f5e72c4ac4e4a5450e3a5054fecf0e88e71017864414fc9c9fab24c64a4e4

    SHA512

    03d83b6c18444ecdcb46173389acbab72782520948c98288462bbbaf22ebbb19590a38943319d66549953ff1157780e99090c3b1dd846d116481d50638b76838

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    d3f18b0a253a94c211a2dd45d1c76a68

    SHA1

    3ab0ba5ccc59430c95350005119110a9252c2bb5

    SHA256

    ff8e96a2a4e9862933a8f3b2822ff9308c840c52976562330a05fc8ea143f9cd

    SHA512

    54f8047350ec994aed4f960ac50c57f600a6d922e4fe3243ee0aee9850fb01265ab8aa0be4f1593be944c1ccb9bb50efdf58d2dd80b2673d51c00026e48f97b4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1LNUKNV0\cookienotice[2].js

    Filesize

    6KB

    MD5

    a705132a2174f88e196ec3610d68faa8

    SHA1

    3bad57a48d973a678fec600d45933010f6edc659

    SHA256

    068ffe90977f2b5b2dc2ef18572166e85281bd0ecb31c4902464b23db54d2568

    SHA512

    e947d33e0e9c5e6516f05e0ea696406e4e09b458f85021bc3a217071ae14879b2251e65aec5d1935ca9af2433d023356298321564e1a41119d41be7c2b2d36d5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K3VL8XEP\984859869-widgets[1].js

    Filesize

    143KB

    MD5

    2a951b80caf40287497ddd3b99022a4d

    SHA1

    26d08691f48183d1a82c99cbc6b33e51f4e6d1fc

    SHA256

    57359a92f0b1c5eefc5e43e18844dd515d8402c9e8294b54b756fef1e98d9859

    SHA512

    6f5ae6b7ca747f9fb7ccdfa34df548bcc7a80072c29a9f25f4ceff2a77e3e97391257c9b8a4effffe6e269d3650cf7a7094a4fc3e9a03a403e9ad1d4e7006a23

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K3VL8XEP\sale_form[1].js

    Filesize

    761B

    MD5

    64f809e06446647e192fce8d1ec34e09

    SHA1

    5b7ced07da42e205067afa88615317a277a4a82c

    SHA256

    f52cbd664986ad7ed6e71c448e2d31d1a16463e4d9b7bca0c6be278649ccc4f3

    SHA512

    5f61bbe241f6b8636a487e6601f08a48bffd62549291db83c1f05f90d26751841db43357d7fe500ffba1bc19a8ab63c6d4767ba901c7eded5d65a1b443b1dd78

  • C:\Users\Admin\AppData\Local\Temp\CabB51E.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarB5AE.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b