Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    138s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    03/03/2025, 03:15

General

  • Target

    JaffaCakes118_4458a62397398a4e9e1ee6ff1dbcff15.html

  • Size

    229KB

  • MD5

    4458a62397398a4e9e1ee6ff1dbcff15

  • SHA1

    a998300a0fd4611fbac1e36b64f896a8fb3ec7dc

  • SHA256

    c499dcb67994bc8aa083862a0b8424d298af1b1027cf7f09e92b996daaef9b66

  • SHA512

    c101b9eb1057ef921a1c48417c2063ea430057299550f3322d9aba450812ad31cdbfdd6afadf32cab551c7b58b364bc5ffe37c43ca27cfe2af6f8329c10e17cf

  • SSDEEP

    3072:qnw5lKseu3S2odChAhmLmwqARwlq11MOnv8sF6OZ7+3Vy+2ZrNSh/MxY+Kj0MyrX:qnwPKsXSGn

Malware Config

Signatures

  • SocGholish

    SocGholish is a JavaScript payload that downloads other malware.

  • Socgholish family
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4458a62397398a4e9e1ee6ff1dbcff15.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2564
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2564 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2520

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    71KB

    MD5

    83142242e97b8953c386f988aa694e4a

    SHA1

    833ed12fc15b356136dcdd27c61a50f59c5c7d50

    SHA256

    d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

    SHA512

    bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    8652aba4c15445ecff77964d0eca7f86

    SHA1

    3277e907edb2c95ef83fa14484e65f8efd8a9bfa

    SHA256

    e7a4e217d308effd32d5dfd046c320da18c0c7c270f894ad8729657e182819ae

    SHA512

    512672b107271f8d041278c2205448803d64613d9d782850cef58aed56132cea18b4b0d841f799718def73fa71675d1fba5c727e492928fb50bbc8d38cfddd33

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    336aaf598f8d2d87bcd2a73496ee745a

    SHA1

    aa5ee7a7a1158da9e32bbb70ed724dfcf464918c

    SHA256

    34b439ded3255833ca800657448fa59f624753a038f5eb1a613ea68ed72d3b38

    SHA512

    25cb04b9efee79ade72c111a67df6e212f2f1616108cf58303428314ab69dd1bfad4df181029451c9efae7ae8c6036802cac83961eab75b164bc275861f72d8c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    8f0294a3ff548112b7a84b22f5398df6

    SHA1

    01ac75822d996b4511d7c9d28cd8b72906e2febe

    SHA256

    2d94e4049e5dccafd9f46969c004278f57fa10b517e90977677b32dfa9189465

    SHA512

    d19fc33d5f5aed6e1df6ac09e2272264d1ffafddf633429797612efdd740a92af11ee5156dce3da1b2dc2c0de29e2bf800c6db9fc50dc6e63852ef2a937f7189

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    feeee762be7dca1f714f991895040c78

    SHA1

    b35d3104f0ba65bbb8cade8995524b4f217f56f6

    SHA256

    15be1448d9acadcf1f176718cab8429066d0ba4c4409e7893d1abfc1e5708ec0

    SHA512

    cfc65cf3b8a36489e657872693b91bb32b8e0dbc371b5b3abb5bc805a43d4fc9b654822de785004dad22a5d7808266da00262f1d344a2c311a1414d03dcfb4e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    336b1602a52c202f1859392547be9298

    SHA1

    28b10931e9656ba223bfcb2167ef41b6bb60735f

    SHA256

    3e25175644a923e50cb3ac92c592c831fb22bb73bf6732ab6231f661cbed8e64

    SHA512

    042a89d866f744df07fafa676a777d9b345b312b5b7a8035e0faf89dd27fa3f1fc318891535d51efe67e8a0e76ea0449d8ccdf8f92a8d0a03df21a2c4ab3c907

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6a6223db62cc9915f19ca88be0cd5d90

    SHA1

    e2e604d6609026b74f4b9ee7105f8117ce20e435

    SHA256

    9ae81102055aec620992615034ca8f9fb7e7bb614f03d294362f1b3eed97f6b9

    SHA512

    be097ffc36a95ccacebeeae47c1c1086636b2b7a2fcf4fba29fd53ee13fdcaa3cc09d612f23204ec410cf53bcf471d9a577697a15fdddb38c0cda674b083d33a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    39f336a526e95dca83d3154d40762ac5

    SHA1

    4c36716c8a94f0ea5d91bb04ffe3ed753bf6466d

    SHA256

    e0c72579de045e12a269b5422357aef80c2725816e17fbc6288aaecbdaede36f

    SHA512

    3343fd7a4147359c8a9fb7e143739f4c603495a8c05a0dade8fff79c6091a87ffacd29fe1a1131234a7178a6afc686ec145dd9e39b65449fd3aab19ce4e91d92

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6cf13e747e7a14526958de5834f53f97

    SHA1

    5e62264b6d4af62835c39423db26eb5c67faea1e

    SHA256

    6cba360156bc9c56e7228734f5627a42fdb8eefc0827d95fb79e5f7a41ce037a

    SHA512

    5fdfd972443c4640dd41586bf9f2dd6ab399891f6254026e62c0b6e06affa3da219fae2ef8dc3aebbb20aa681462fe6a2902467f2acf21794060f9968af0a375

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ef7af173f36005cf6e631c752b7f8b0a

    SHA1

    c6d47b4c29082c9836fe4b7822f48c50109afa7c

    SHA256

    ae6b63871225a9c3ec4f30ec2ff0ba97ed82acd87c4cf3b96a9cc415f6d3b76d

    SHA512

    7e84f6f923f86665b9d76db0f6ff26748a7a0a7cce51c16e8a3d2ca075917acd5132e63508be095ba650c2fdfa1b29ef4c9ade10c91e45c3a48c1288ddb1de65

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0313dd3c8f437ba5f7b371e1a650b183

    SHA1

    8dc79ccb3dd484464768374dd6a9ff2fdb96882d

    SHA256

    ac896f276cf65f45eb1f612a4dabc93ebffa1979c77c0dc460dced9a7d7fcc0a

    SHA512

    d844b739868a84a3a392c8e5f52dc2887369b7b122014a1979ea8b5fa3954a6719fbe7df9eb01f62921026c828aa0235e2fcc93765cb9f46a03ad4589906c3b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8a878659d5ca83d61078a374e3301045

    SHA1

    2be73699b3f93ea3faae08056f5f714f1ae583f1

    SHA256

    2d6564ef46ee46e9302d2817a092b0babf4513621760bc4b14c11591829984be

    SHA512

    4851698807afe61d49a12b75d98a05adab1591a04c16c364e9db1bfbf550f434c7ec7ffbb8bb1c528ed655df26b5c9bfb978189aa6e7c5ddbb051e223c5ee0ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b7742acedeb6a2438e256f60daad902a

    SHA1

    d6222cc67e8c9c07cf83e7cd5ad84cd49875f055

    SHA256

    625dbee95197eabd1fd9484255e2df1e1a914ce4f289a057dcd5a6f3c896ea74

    SHA512

    3836f632b79065147c4ec1138507577cce96c2918fdf68947397c234b88a3c909ae6a600614b846ff229c26f4d397feb1ec29bb958536474be8134c35faf8843

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    18d5425144833e85648270081ed3e0bc

    SHA1

    21e419b2d5098c978cad746a8e982562c2996ff5

    SHA256

    44d4c91666aeeda3029758391e0574e0b7f3c71871689587d05377e5346f7eec

    SHA512

    8d4e4f05e7c9475a162ceaee50421857b05041a335f19760bf0fa01c1a1881fdd4bd9006d64da87974ee301bd11490a7f4fe1d52404cf6f5753568d471a608c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f4a163e5dfd3badaa3ab6de8f5297950

    SHA1

    63bfef729a375d3c7b6fe397c33677b69f7ac195

    SHA256

    25ac1d6f788de74e01feda1bf60464cdfe82ba6f3ec8c7e9debd53ffa6eda65e

    SHA512

    eb6d78bd89708c325e4de83abe8bcedb39d147b9728e22fcbf6e01c434cb4e6a6b85b6447be598e4201e96f059e60a2cc887772d6ad870687c8d5b1fe2c64596

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a92949e68255284d4449f650ec7a0561

    SHA1

    e542460edfdd99ed6af6763bca16ddb73b6eb9c7

    SHA256

    0274896788a9e01bb2a6c5fe9c3babc39ff268e8aa1677b3019b6d2939470e8c

    SHA512

    2713255e7ff79a14db2e9a5fc24cf5a38dd25573bcc5daf5cbffe27e3f01ae6ab7953f68b39215793b337b7dbd1bad504b1b29bb1a8d534d6e7073fe923e04f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dc691542f5d82a8002885b483fbabf48

    SHA1

    5b9f014404948800e9e66490e8b373f2f88f6777

    SHA256

    9446fbbdf9860818fda5bf2494b166d4a24ba61c33b4f1336f856d5e5a473fdd

    SHA512

    a27c063439d8b33c11f9a7919f0ed0cfcd594b6f46f85c3756dbd1e3aae5fe85940a95c46e312cbde512b5b5e418fceab83c61d926e517380de91eea837231e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8ed6afefe12519853d831d67fc032b7d

    SHA1

    96930586e95ed70e8d6659e9601365e5a5fd5472

    SHA256

    bd35760e4b6b1f927e25087c9ee43ccddd04d3678b923ed5039cdc12680f951b

    SHA512

    88307eeb9b7be403b9ac7c0b6d5bccbd73801af1679e36c9ea40bee251490ecadfd01f4258bbd440ecd46f984f00c7635423ed6d4ee93f3cf3e457fb2e5ab541

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    138e27707a8f432b29e4af8f2610e05b

    SHA1

    a0aa7533f05b678bde6c8e6f2190237d57ad0dbb

    SHA256

    f48a48c83df8036191602cba9e0ac1683b0c3d9c6d2dfd4e3079ef7122c50f09

    SHA512

    3ea9b07b81680ecef0f06853a5b154fb791905b2f41bd005a2273d8610ee1d7451a15ac70a14cda40dcc417e3f8f9ffdb5106aa847e6eb21875cd31aa099af84

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8B420DKQ\3987138876-postmessagerelay[1].js

    Filesize

    10KB

    MD5

    ec8b302065565466dbf8af95165a491c

    SHA1

    3573398ae291f8e3904227c6cea99b61988b22b9

    SHA256

    fb0994f96c5d8c60b6f8a3c1adb0ff7bb07f4250db121bda3c397fd02f614682

    SHA512

    1164205d9767509f928e0c205c7a6b2cf52eb407ce0a1a0c1b62f3d586b8bfe073047f008d04ee8d6258f76953068a5bb159584a9abc2c6eb0295a693df6a9e4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BDDDRHWK\cb=gapi[1].js

    Filesize

    58KB

    MD5

    2073e164f36fe71026c0efb49400e354

    SHA1

    a9ecb2d6654e2eb3b54c874de506461f92ec21b1

    SHA256

    444431685839e07706af385503418594c7da6bd417d6a80ce4095c07ac1a2dda

    SHA512

    4be3ef84d44fb0c2173b20476ae08494cad14738470eaeb01ba15119acafdae766c6e07b2caa445cfb5e2d3251cb19188f8bb5cea94384e042fc4e420c068f9c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LW44N8OS\rpc_shindig_random[1].js

    Filesize

    14KB

    MD5

    a9ae47b839cbeffe4b23711e64135db0

    SHA1

    e3ddb76450192d05f04b1c3f3b47697caba4afaa

    SHA256

    bb283683fa10d1c6448ea3d73e2986ea9e76b63e6cb858f659f3200ff69e5e4e

    SHA512

    a29afb9ecd4f9a57cd4b890a38c5c0d534670765dc76f37d09c7e5edfabb7abe39bf946ace8ce7950033120e30c1143bf7aaa2107aa5cbbb33e62a4bd120519e

  • C:\Users\Admin\AppData\Local\Temp\CabCCC1.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarCDF0.tmp

    Filesize

    183KB

    MD5

    109cab5505f5e065b63d01361467a83b

    SHA1

    4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

    SHA256

    ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

    SHA512

    753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc