Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    130s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10/03/2025, 16:37

General

  • Target

    JaffaCakes118_603ba4c4b5796dfaddbb5c7d71c7d018.html

  • Size

    227KB

  • MD5

    603ba4c4b5796dfaddbb5c7d71c7d018

  • SHA1

    2cb71b7c084ecced411bf8011a95f9dd1a7d512c

  • SHA256

    c6b4c2bd7da1ad1c239ce93dd601146fe13c49b655580c85185026894a7c302f

  • SHA512

    b122ae78e73326dca973969cbb4654a19deff472ddec05b1761019c5385136b8395de46157484b54e474f03e31646ef1b540d76c8b7b1c58f7550be4c652f62b

  • SSDEEP

    3072:Vnw5lKseu3SKod8hQnVbmwqARwlq11MOnv8sF6OZ7+3Vy+2ZrNSh/MxY+Kj0Myr3:VnwPKsiS/Vw

Malware Config

Signatures

  • Detected google phishing page 1 IoCs
  • SocGholish

    SocGholish is a JavaScript payload that downloads other malware.

  • Socgholish family
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_603ba4c4b5796dfaddbb5c7d71c7d018.html
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1820
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1820 CREDAT:275457 /prefetch:2
      2⤵
      • Detected google phishing page
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    71KB

    MD5

    83142242e97b8953c386f988aa694e4a

    SHA1

    833ed12fc15b356136dcdd27c61a50f59c5c7d50

    SHA256

    d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

    SHA512

    bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    8a984f6ae27366d8d74f154d2330a19c

    SHA1

    f4af2bb71fbe1df6f41a2548d1ec0673d89fb9fd

    SHA256

    2bb5fc46d0803c8705c3a184f2a8d39f25a2ba311153dc816632ae582ace0f1f

    SHA512

    ff26578e2f9e09be49a023842413864c4b107a482bdf5c54ac24badc037a7663e6a77bbb1666d10f463da43903ed71769949c64d68bde232642ce5dc9645415a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    5de7ea16a80d1938f5aa13d797e48f07

    SHA1

    f38aaa21301bd0835e1018411d0fb8fb6ae32083

    SHA256

    41128f1db146b3dd8c4907113cf101e554befd8e58d1a1b13087ee07efc47401

    SHA512

    876eae9c3613c9f3eb1a5241e2efd855e2023f85fe6cff46ce2a27baa0f180c681a199474774eda11ebcaa50d7120ad2dd5f2f7513ba08fc22b9604c57803404

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2969ca508a5bf841b6c6af472341b597

    SHA1

    4332e38de876c0d6bae7fc81e168837cc249736d

    SHA256

    3dbd0139f0d7c5179a4e34379b1a831f6129e73ae383a85a2c082afa2084caeb

    SHA512

    1e7c38da6e0ab6e3da496731b69795b0638d236bca1a1c504f0afc1b9ddd66119fae7e41f4941e88d1712167d220e4186949653006dc178faf229850744e715f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    95051020384c1a553549676f0e660ff2

    SHA1

    eadb76960ff037202b7574682b4e06ed1a5a0ff1

    SHA256

    3ef505297e7799f64a6f587e4a9476391d97b182174e691b1b7ead03bb434091

    SHA512

    95d669fe632196d467ab1a7608ad2e0a699939682201043c5c8f398256d39a98803fdcae42f152877826250231daa6908563d6e28cbffd3440691e9593a53c7d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3fa8f40b214ca3c437a066738ec74ab6

    SHA1

    556e30e47569dd324d86bf8cf7008e7122dea947

    SHA256

    3cddcdd6418ddfeadcffe61567d8ff8923902cb6599137f6b89213c46d26ad85

    SHA512

    5916e2b8da4579f18466e77a1c29535580881f4d65464b0aaa039936a48187a3fc7528754d974f5cda649451430ef6bb104eeee4200d33a5e9491ee0349481e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8d54864accddbead0dd7c5c904b56256

    SHA1

    b93939b4faa477b2bb30a104ab003be7a82c1ccc

    SHA256

    e83ed5f4785fbe3e285cb80276c6a3777ca136c65f678536b8ce1d2198a2cb0c

    SHA512

    d8944b889bd6df2768b4676dc633ab0e03fedbda929d5ed08a6f3ef3ccfb2a3e06440bf0edb08ab91e34673ec4f836b529c34e71dbf42b95b4613bad480d9d97

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a78d2b0cf6eea4e0803ec093ce7b7b95

    SHA1

    5411af65d7fd7becbfb1157438b0fea82b68d1d3

    SHA256

    06e68f2dacac5ad52211cd0ac67f32e0fecd053a2fb26b1e68a10f8020bc4a6c

    SHA512

    d1425e152dfaae0ffd99e7e17607929cabd455cac88a2f5bfcdb8f7da001a5585764481a79be83b7140675280ba6faa84e2560bf38047ae6c7cd233648dfe54f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f00a4ba24bd6eb6f83098fa56276ae5f

    SHA1

    854eb2d66314a4723a52264d4d234a9c2b5792c2

    SHA256

    d4ef4fb2175bbf6020e61ee32205af44122783b439f1695e872849089295117f

    SHA512

    5c6bfec6a7488f05620dede4c6e0a3abf547ad58cc0ed166f832c3f300ac2230f3b6d1c77d9aafbeb557fde3a996bceca2b9ad285515b4cc53ed1734cf76276e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    62c8a829150deaf6c0fc65f5488e6ec5

    SHA1

    2183bf7419bcfb7f848349ec09126fa0172bb1a4

    SHA256

    d64a14a34dcc3c108f0f8f061a03ad5783f881b1be3034145d755f48f01ff19a

    SHA512

    b668e0deaa5b94eef107980b32c67b3b8fd7cffa4b48771d0b434d024ba63e5b6021e2b78e504d232656e66371d4334a50fe8425973fe3c23179694fdcb2c376

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    56e247f74da743934b97cc1f86b6ba5f

    SHA1

    79558c82de3fe7feff39c762931a7b536276e1c9

    SHA256

    396fe3d7a3013f70a86e33ffe6d9780021344cf7614a1250017b482ac2bc78a6

    SHA512

    3a66c18b18ab0ac51e4729f376fd5ac77a491e20a97908b98daaf130c371e5cf35837fa5dbb16ed80c9f21ec1575e99df1987872830c94807ff0ad1f002ef929

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c7bb5726e4bf2c2ddc6bf4ad0b569fc7

    SHA1

    b937a0b15c3e5e569c8054a193f1a36a906de4dc

    SHA256

    031043b93391054c7b2c46be924f89d81f7f6b1b90606c5a181941942395e23e

    SHA512

    5570b88425f462e2d1ca131d3b6ba903434d7f0f1bc1f2f45b60f3871c1c3dc02008a8def68dca42b22e651add00ac71fdfc7760efd7246426dcd4b17f73b312

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e39bb0f4ea8c49851be3fb833d1c1ac5

    SHA1

    857cc7bfd7def8665848b1a72136df7290ccd241

    SHA256

    74af3dc4d13bcea8c3eb33a441815bb56b19b6c6f050fc459a1e1d58e1478755

    SHA512

    67ced4d85bfb44eea85e2897bbaf784b680694840f15663f05ce24b6cb95307625e5b9ac67516be36f94454c87965923699882f3890c340f254de9c623deb18a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    4effa553a4750f98cfb647f7f5162da6

    SHA1

    6d14a5e3a7aecde1caeab542e1c82486e1e55bec

    SHA256

    d730ebdaeb2d5961462d14af693a9282c0e056a0aac583b8b3cdc6c327d382e5

    SHA512

    ca6708d27d04e9201b57b531f80ffa9a0e41d633f7a411670ed085bd085d942fa73adab9fc38456cdc40f116efcea5140292deadfc51914539d9ef6430d36bbe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    7e32ca15f0bd25678b8b5c873d73c4af

    SHA1

    197997fe686f16ed8e36e4fe2d8690e269ca4017

    SHA256

    8f623b17699bf58adbe493754e437b6783fdb51113aa5fa66a81453790c66b4b

    SHA512

    34496f40adfe26af75190231fb7b92272fba701dd5e64330d27e706ce5fdb090cf258b2ee418ed45edfef75ba9d649a14bbd55012d9d8f9e196f9e3a1f09f42f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EB0KZ1Y4\cb=gapi[2].js

    Filesize

    58KB

    MD5

    2073e164f36fe71026c0efb49400e354

    SHA1

    a9ecb2d6654e2eb3b54c874de506461f92ec21b1

    SHA256

    444431685839e07706af385503418594c7da6bd417d6a80ce4095c07ac1a2dda

    SHA512

    4be3ef84d44fb0c2173b20476ae08494cad14738470eaeb01ba15119acafdae766c6e07b2caa445cfb5e2d3251cb19188f8bb5cea94384e042fc4e420c068f9c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EB0KZ1Y4\dam[1].js

    Filesize

    150B

    MD5

    18a5ebbb9b9da1cff4de40fb1385d301

    SHA1

    f62e73aa5f9fb3a8c7c27230c98f8060ff4698f3

    SHA256

    693ffde224523a247b0d2290b8bfd7c8f35a41ed317bdc80c5ac1c26baf6ead1

    SHA512

    01f370dba0ad9a3e7eb81aaa326d6f63051f221799d3cc8672f60f587edb3b9eb265a79672b9e62b524aa8051307c892b09f5d8e13d2c5913b70e223c9c433cb

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WUBCGJ0A\rpc_shindig_random[1].js

    Filesize

    14KB

    MD5

    a9ae47b839cbeffe4b23711e64135db0

    SHA1

    e3ddb76450192d05f04b1c3f3b47697caba4afaa

    SHA256

    bb283683fa10d1c6448ea3d73e2986ea9e76b63e6cb858f659f3200ff69e5e4e

    SHA512

    a29afb9ecd4f9a57cd4b890a38c5c0d534670765dc76f37d09c7e5edfabb7abe39bf946ace8ce7950033120e30c1143bf7aaa2107aa5cbbb33e62a4bd120519e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZOGPI1N2\3987138876-postmessagerelay[1].js

    Filesize

    10KB

    MD5

    ec8b302065565466dbf8af95165a491c

    SHA1

    3573398ae291f8e3904227c6cea99b61988b22b9

    SHA256

    fb0994f96c5d8c60b6f8a3c1adb0ff7bb07f4250db121bda3c397fd02f614682

    SHA512

    1164205d9767509f928e0c205c7a6b2cf52eb407ce0a1a0c1b62f3d586b8bfe073047f008d04ee8d6258f76953068a5bb159584a9abc2c6eb0295a693df6a9e4

  • C:\Users\Admin\AppData\Local\Temp\Cab147C.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar147E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\Tar1530.tmp

    Filesize

    183KB

    MD5

    109cab5505f5e065b63d01361467a83b

    SHA1

    4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

    SHA256

    ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

    SHA512

    753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc