Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/12/2024, 23:05

General

  • Target

    e39e44b21d469e0562f9343dd45282dc_JaffaCakes118.html

  • Size

    173KB

  • MD5

    e39e44b21d469e0562f9343dd45282dc

  • SHA1

    8c7e0b6231d6e2681a02647f990595caca8dc35d

  • SHA256

    949df089691caf1c8cf94ef3b388266582910228de8a2bbd1cc7fcb399109b77

  • SHA512

    5d3be8f121051a5affaccb1c57d32e7f5f3650ff2e60c7a925a58a0d3d515ecf094f2f23b6a1f90db3e0e3b80a12bf7ea82b096923d61458af5046d504397edd

  • SSDEEP

    3072:SqRcVhIVs2LQegU0Dzvj40MZEPjLpUxAfYxslxNcl8CLcXmNRS/HDYlY983Sq7ht:LcjJ/jXmNRiy

Malware Config

Signatures

  • SocGholish

    SocGholish is a JavaScript payload that downloads other malware.

  • Socgholish family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e39e44b21d469e0562f9343dd45282dc_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2396
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2396 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199

    Filesize

    854B

    MD5

    e935bc5762068caf3e24a2683b1b8a88

    SHA1

    82b70eb774c0756837fe8d7acbfeec05ecbf5463

    SHA256

    a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d

    SHA512

    bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    84525ac2c52cedf67aa38131b3f41efb

    SHA1

    080afd23b33aabd0285594d580d21acde7229173

    SHA256

    ae524d9d757bed48d552b059f951ffd25a7d963ae44a554cb1f3a9641e524080

    SHA512

    d898b0913b4005bbbf22a5457ad1e86345860868bc2e53187ad8267c07824d592160a27d850978ebfe78392db784fffb80b73e27418d3a71708383d738ea1d57

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\DDE8B1B7E253A9758EC380BD648952AF_86F2A83F54EA52E2D59C5D2EE00149B8

    Filesize

    471B

    MD5

    6de2c4c3e13177b9ba7ebbdf6cb70f78

    SHA1

    7f7e4b09c380785d2a8232d1437ebd0a5902feb2

    SHA256

    e47982a989d10b7db6fc39bc47e02d0ee6a56ce82b07223246d0eb15ec5b8587

    SHA512

    c1b08e2a2f8d6a9625e3148f73aefe6b5bfbc35d968d57158b178607ab0267b733888ae9e559bfb0217ac10339f772bb9d2f193b075eb184fcc5385b0ed8785e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

    Filesize

    170B

    MD5

    907952b1f797853c54a8897b4e125a94

    SHA1

    b0c832ac7010a243aa76715c650303ef1924131b

    SHA256

    0787251a11355d549205eec5301da4fc461123326c3d8afec5031ce0d3775270

    SHA512

    ac1a8923ab3f6f512d1414e2a3694ce6f7bf70c9e3c57a9bd3da2b7204cacbe7ff45ff5428b6f488b2fc26d63c253dc60f02ea3e13377354a38a51d155035d54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199

    Filesize

    170B

    MD5

    24456ca458c74063e0a59f51b88bb0e4

    SHA1

    11b4ea16fc2b8d8d80d3e68e221ffb0ec7a78f94

    SHA256

    ecc4dc1191c060f18d9baf09ad443df2948ff704b11e37c08c73a046bfd3fdd5

    SHA512

    f26ac6695ba8b644f05d33d3fdd4d0f62f232cb374952a9c5ae929b05251feff2883ab55d5cb0ae7fee09977f925a7caa47472e47ba2a61e150abb398b6ebfd7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    396b2da2791b00a29673c52ce2175fd7

    SHA1

    ed2f82110a8f271fead1e6b0b466e91416ec4aca

    SHA256

    a1d26808df4dca71431a1ca494423e507508537a8fd8c138410271665a879f3d

    SHA512

    ecc939b14423b44b269833cefea73be9d890e845fc4772609d476fcf87433d065765135d3d663db3b7c500d98711672af955d9534a3ee5d3d3a0e0e7494b7dfe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    d2cfff9747360496eb65d9052973b57f

    SHA1

    bd298d5d21fdc21167adcb50bf0d13d1ce5d6dd6

    SHA256

    4c289397846de71c6fe1cec7e56483961dbaa49fc6a230ce078c12af2896678a

    SHA512

    ca4c143dfaef5e9cc9efa8dc9eeab2cae52213dd3206a28fe4752698595b802f7e7958fe973b2394cc434ae1d891ccd654696c05820328bf3671ba12a7fb80d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    fc8ebb5cb211470a8f56b572ac8cb045

    SHA1

    89bad1aa1d9ffd2bd7864e6b974c0b8f47ee640d

    SHA256

    b45d0af95491a9a83cf81ed106e3dda9c761ee47cf75f62310d4b5bcc8280dff

    SHA512

    9825ec578a4d46858124cd51908da164c638d488561e291d3a6eb118e224dcc06261f78c38875e0c5e37b348ab73e229d53b1b1a5efc5b54fbc979a9a300d7a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    ec3f04554258d50228f69f65109fdaf3

    SHA1

    4f9177cea08a6817f794b6f70841c55f3a90fbc3

    SHA256

    8df49d159007d3699008ba37bbe7b6e2ba09511a3c5a8bef6e3b50e30826a382

    SHA512

    1034e8194a2e9c61e93c425197c73d70e28a5cedd7b17f027215fd767c50e5bc53b1938c459d1f198ba06fad9a9ae7347dddf9bdc2027d9769d5d3ff44df379c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    caa03396911ad2c14167e4562897bc0b

    SHA1

    aa47c08e54fe2f01e3f610cb238aeb4137538c0e

    SHA256

    ed4d99e6201e90976e98866142fff326a380d112e1b62606b5fa577764b15475

    SHA512

    0b1ed39179dd35e66924ace96b1fdfd7ffb38106e298b81d01af751dff0fdf23ba9e1df406484f2ceb61558e0a43b2277f474a3159766caa6859b896f9bcc4c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e672921aa1f56638f81f775cd73a4a14

    SHA1

    b7c1efa34bd04f0b9fd56c9e753ab43174bf02b1

    SHA256

    aa5d2efb8d4b7041ccba99dfff43e21967aea3c467b56d98e09e75bea6dbe57c

    SHA512

    184600c0ebad415b48c6384bab5cb7b471bbcccc077bb4b6d35c9002f4ee42a42658700274f0fcd22791617365faf82d716df4d598906a10c7ef0604d3377a61

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fa8f7010cbaa01dd6e4f2d41754670e5

    SHA1

    011624c4c44dd0f773373333f6f3f66a7e8f59f0

    SHA256

    355bab442cf8030049e0550da5605c5ae315bafdef8212b01ebb3c136e58a21b

    SHA512

    3f04f73204eb08873083dc147c5808901cc1071581ae3aed9fbdfbcc26be486117d8fd73d74d70bf026ebe513127c182c00998bd6e9d42453b5406a963d47636

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fe767c6efc2f0f1749f608be23f73efe

    SHA1

    1ebaaac7dac29386d3eb5b24fc6abf1d394c8faf

    SHA256

    ede76502af7fca7ad32156fa90b420d7fe684a8050df4439e13bacae5718d2c6

    SHA512

    0ea365f1e7e400ed35245a1763d610da47a7f41cfd15f4e223fb1e5e9ac25903c5b92b2d59b35515c10e4dccb7863da9d5ffb5a30306ac2089f40a2b9d9f1b47

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    351378c69b64a98a52b1725a7e109cea

    SHA1

    25bec209326738ab63ceadf28053c831e3e23db4

    SHA256

    98624fb0632ff6f086fa8c167fb92c40a21c8a0f16aa436bf08db7881ab47751

    SHA512

    18772836e6259893a99d5f111b89911dcf70afa41335d85385aacfe53893bfb924b33709669306dfd1385a4c677726ced4cfd29b4bb38b69aeea1df98b25fbf7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    49c68b8b35b0303930cb8215357ff519

    SHA1

    5c4fa0eaf7107490bd390eead921bb662fb2878c

    SHA256

    d1b3eab80edcf60682e5b7fcf26ca39f4aa70dfee8e07a1724f692a073246908

    SHA512

    24db86818e521305080f75bb06cfbba2cd042c9d4cdcbf1c8498fc1565556acc592a018f9f64c687194e69d7c23d2d1619cf8cbf35edd7cb67e98b669d18f37d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    da43c7b2ce23fd5cb989212412a6214a

    SHA1

    a6997b9b415ff2eeb9b354078f88e2492201aa9d

    SHA256

    6d4d0726075d1bcc8a95170b11d1801aad74a11e7e34e23106cb541f7f068125

    SHA512

    0553bb81454c05be59bb53c7361b821b763f37908ea07a7f42232adaa3577716b33181f824b8235d9fbda9e518a2c54770215d7dea1b51e34b4f6401880511b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bb58cc1a37e213edb46a32bb85318da8

    SHA1

    b1678e08aad47e2ec93c42ff9329335d5ca289ab

    SHA256

    f4c7ef4f983bc3ceb0729d23b0091ccbdee8cbaee59dc4a830d72f5dbb5689c8

    SHA512

    aa1e3ee6bfccbfc28c399c1a0c15b6b358e51166d4d881354a85a193897cc266695a566f3357603d6fc60f80e7d36afa1d3cadeaeeeb7a4e9f688ecdb834e067

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9eec01fd6264edd33d08441e0c5551d8

    SHA1

    4ae7e1192d374259a84591c1b6dd95c01bc02956

    SHA256

    cb756a019cc8fce7c0ca973272137a623f625e957006df2ce623c4b287e44278

    SHA512

    aa9df8a2835e0b08fc432ad23df5f3eb23a05f06c9ca8d0dfd6c0512e2c7fb88dedd4040a7a2d4b68f83e35d6eabf06d041896e15525efeeca6ecdfc81fdf869

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DDE8B1B7E253A9758EC380BD648952AF_86F2A83F54EA52E2D59C5D2EE00149B8

    Filesize

    406B

    MD5

    c5ae7527a32092bbceec593ac04f04b3

    SHA1

    863b3dcdaf2bd06625d91feda2e70d749813a6a6

    SHA256

    19ea9ed07395943ccbe6a35072c7c25218082d8e29500b8e51f56c08cacdfd84

    SHA512

    9ef191f95504ef675c7531d0f7d45fc4e2cfb9e253a61bf1ccfcc5060305d32e09561b068482b9279e042c08f74b554806b9a242c5464a20dc64b727c673398d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    a7fba4b0636d539e836344ea1dd55b68

    SHA1

    8958f88ed034a79d05f59b5afdcc67da2810a96d

    SHA256

    103fbc6b078f9c07dd448245283d1eddef099f769b2d3dadcbab1b4724ba65fc

    SHA512

    9cbab0d398b8b49b9e842925949ab24bf9fd0cee8dc567860de55f12b6cb97515b07c1432a75f7807e0c2e94f0dfc51d05a55605892569bf1e8a925c0b1b6f93

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7CNUR30T\f[1].txt

    Filesize

    40KB

    MD5

    3e5ea1226c67639a617b8a9ae944e0a4

    SHA1

    538ee10897610bb626f229ccfbcec10cede1e6b0

    SHA256

    86c4a60554fbc38319e679fd0feb93d76711f62485072b46e66cb29dd7b0013f

    SHA512

    e1943da2f21f3cfd46efbd86164f9e55350a6143613c46e1b99004488f96f574794471c5914b875a2026e8e256d2e8d1f3052243860587394f414f8b26586130

  • C:\Users\Admin\AppData\Local\Temp\CabA17F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarA180.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b