Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11/04/2024, 11:52

General

  • Target

    ed5bbfd65ff1597076be463666167655_JaffaCakes118.exe

  • Size

    112KB

  • MD5

    ed5bbfd65ff1597076be463666167655

  • SHA1

    1732894158bbcb188fa121722e0ec9bcbc8fc69c

  • SHA256

    b8ac790650f15126884482d3739a65423562d6c145a946896bcf3ccb1daa85a9

  • SHA512

    e0929d61f72769c63e4b500fd13ba604e686071012a1dc32f879e0667019fb196e699f26783d23cec4735766166f515320823c988e5c0474bfc5791b53007eae

  • SSDEEP

    1536:lQHBkybTa+cGLB+6QsxN6JP6NG4cZy6+aof8F6OIJGfK9ZSkUR8mgPxeNrtthVsN:lQhkD+cma0Gpw65km6OIGamg52tjw

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed5bbfd65ff1597076be463666167655_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ed5bbfd65ff1597076be463666167655_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1428
    • C:\Users\Admin\AppData\Local\Temp\ed5bbfd65ff1597076be463666167655_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\ed5bbfd65ff1597076be463666167655_JaffaCakes118.exe
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2192
      • C:\Users\Admin\AppData\Roaming\Omejex.exe
        "C:\Users\Admin\AppData\Roaming\Omejex.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:320
        • C:\Users\Admin\AppData\Roaming\Omejex.exe
          C:\Users\Admin\AppData\Roaming\Omejex.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2560
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2084
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2552
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2552 CREDAT:275457 /prefetch:2
                7⤵
                • Modifies Internet Explorer settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:1104

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1fe63c46de34aea82b12e5e9dc8cae72

    SHA1

    b596c8be72352d3304a85c82f6f72741f6352f39

    SHA256

    e050b1f202c66dbd6223653a58ac661d4242bde7efefe84c2f3b4acf4b764958

    SHA512

    2f8ba038d87868232133cfce0bd0a40a2e9e1f2ec7631e27c2837cf5504888b2b5a7cd752a160218572b7f7fe40de9505bd5ca017a33060626d785085818dd3d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    26e8c1c401d34574b46347480c6d64de

    SHA1

    980c662cf9e90bb5e4bd2d04796ee7f9a3318b22

    SHA256

    d6690b2e09d306319fc3b4055fb0a138bad8137acdcaf59b625dd987df09ebd2

    SHA512

    c8090aae07ea834e24ec11f4fa2891ce6f4e6def5371cf217a2b52e464f674cf8f5017c81f0dc50abd11066ffe67539d3232f3565efee44fa4272a98f3d81ecb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    53efd2e99e338c4f8f100abc75368def

    SHA1

    5072672e0ff5775bfa0971e88e0eb54bb035ac3b

    SHA256

    4c6fe8414ae22aee081368da85aa802c0ddffa0df1fc1366652e9bc7e7d1ec19

    SHA512

    9a925643cfd12ac2052d4854bda96a131d01bf428fb1f989e6a41fe631aa47b69c87989f601ebc00be75e4d9c89738970fdaecde5dd074d0610ed8a59a93da26

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8866a92c77b8b1b44d587e6996940a04

    SHA1

    502ec5d8cb3404c4c9de77d375aff2f702bac57d

    SHA256

    e6864b5636484532922238b7b8a3028ab827a6b94921002ad57827c5f1a2a017

    SHA512

    6cf94cbe0a3aae8211671048382af319e71c7a4d3bfb1127f08b2e82f4f6d4961aa4037ac484b279ac04a2d497614e2d86104df61f16602085bfa4226f4a0c65

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2281c2ab2bf275f97c56c61b4b22b477

    SHA1

    a1fe344b955a6e31aae352bbfd8a82b5f932a094

    SHA256

    effa5858e2a75f304b11cabf2caa055776efc6899e4f8a4ec74cbf3e9078c25b

    SHA512

    c431a743ed97a222787f009f62a28b7fd426b5a115f12cdc6c148d42678d45c71ea223ba1a97187819749426a2d3da54166649e51e3617db2ebfb454635752b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2395097fcd27720086e92f843cdf3e3f

    SHA1

    9922b2cf8b95d7eead042984027615c7216926be

    SHA256

    dbd2ec6ac4944b2e7d5fba8338aeb76b0325d2bd5a6a8acbce3d24fccc971047

    SHA512

    e93972b02e85d7dd089846203e82616e76473a422cdfba39e08001965b003956047bce3e94fdb684ad8ac16962d075755a22fd9a689356c2aa2771a27816bdba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1f52881bb43a364a21178eb7683c6ea5

    SHA1

    e8a4cfc56869e2968a7d334193d78a7ae59291ad

    SHA256

    0637c3cb75f9621c59d9ec36b83336ea03b3a06781e2289810f0a1d32e64bf5a

    SHA512

    e8f97f83bc2373058e949f3d03ee6b8a2137f1114ecb6565e854b4408c26d2404d0a883bcd5e7bb29d254057adaf48f1bc4530bf861346a9a7be65bd62ab71fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e9f333378f292b7f55d2aaf5b09a1055

    SHA1

    35afbbfa6698171d4201597953e8cdc4ede371f8

    SHA256

    c7196784c5eddda3ce2fd57b22837dafda0e518e0f98b9833c0c9243dd8eac0c

    SHA512

    68efdaaa7cf346de22e8dac5f0ad160f4a7dfde2484653417569b5107283f9270b2c993a5c9db35ab81e64a1ab1d737e6e348d9bd0a2cce5737d67fdeeb352e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f35c644225758b18e27682523f0bee78

    SHA1

    68ff3ab960672e9d3733266acc885919ca32e6e8

    SHA256

    4e3059bc15a9ca2dbfcd82682b715a5d3f3b9cdc43d11222481b60a6a1af2990

    SHA512

    bee14e7b640125fc5f022adf7ccd92e1a88f2788c363181af323a483b67169e37c7a0b4ef90b5499431aac915c90bf81fd6010041b9a8ea20bd1aafd153de768

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7f95be5d0ae96db14cf9699cc13606a6

    SHA1

    503d528966185e27f434b98e4704b4c183092cf2

    SHA256

    cec4d3d3f7e3a77255ce2bf00357241c432483942a8daa744ec64fcb3e2d7a6b

    SHA512

    6c65f7c5e70b23977620338860cb96b3f663cabe83f889a66fbf7e1cdf45ef0eacf532774c2f1dc4fe808ba8171695ae13c434165a0901871e64a458de0d53cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    81790bc736d2fdd86ff798a0a0069813

    SHA1

    59c3298764e38c3ea2df34fd1b77e7613885a714

    SHA256

    eb16a6727225fed1f395a8430c531b67fd84c894b839c6aa694a22ab65706383

    SHA512

    6025d8ca44b1425c2bcc71d00b39ba35dd77df4ecefd99820821efcc272e4aeb928fa51801008068fca52d014b7189a43b80d96524c05518c3a18eca13e17d3f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    43590510fcbd3f593cdbae3b273d9011

    SHA1

    3edbfd88b00e1d5942df80731c66b5a1825a0c40

    SHA256

    9dd6fd2e19c5017b615d5ede582118197ffde98dd7b98da60630d7566113eacb

    SHA512

    f29e4778c2f756533f8aceb6740faecd0ba57d6ab727ed8a055b6a339145dcbc6630144fdc92ce6712c014626660049bd0ef710dae2bd895474a1a1f68de9166

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ee131a91e65495e9eb54feb44b089476

    SHA1

    2baa7ddce03e7d3db5d5d13db9d4ad5697b1ecab

    SHA256

    b732d651b3d800d57f9290d892d00225bc08787219c5cb19d91faa4d0b2bb720

    SHA512

    8bec259f102a72c7b03ea77ef547933d28c2ed6a557c3c1b8741efa95e389ba73bc3e8bd9306262f7da4c094ca93c2c871c4f766afd358f4deceeabe4b87e768

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0e4cad884613592aa9c3f9e97cfb9af0

    SHA1

    01b3bb666a4a7a94e04549c0294ed531d3de74c4

    SHA256

    6fa5cd88612a3919d26009263a9fb9a2907a865da1807c19db75c51b0b0b3dbb

    SHA512

    1be1e7603c82ab381227a4c483f5d9d90c011f1ff0b3f8c9e3c26d280d8f6f3e8c6ca4c4b5e9c4a75d1f95f0f8f01b9209dbd59e2970706fd6c9bda08cd4d478

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    930a77d044899d0c2e6816bfef47e71f

    SHA1

    094cb0b420df2a6bb28ef23d31cef4b277619eb2

    SHA256

    afe3825cdac6c68f9f76ee84b8854dd1e9f1e44fe3e966a4173104cf3067a7d9

    SHA512

    41bd9e1e51a90764a295df16bf37232c4676d693e1320fed6be6b674f598e167f51cba5ec722136ac74e50bf6f45ecbb05cb865f5514b36381e1a6eb3154bafa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    158d8161a4f0d0e8178a6d83a4e0fc4c

    SHA1

    226fb7b5156b6287acbd937606db9b88bb86f66b

    SHA256

    8c12384be4b1ec6a538cc1a9744c6cea1966862c630369faff3f57e8afccc62e

    SHA512

    66d3539cfbd1eb156ed55ee9b3e674d0e44c153c97138a4c5b7b40d06021bcc5bcf28558a132cf86811deb556319ccbd99bfa197da6fd48dc62056e0355bce68

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6c0ae34a7c0fbad1c9f3bff44849940a

    SHA1

    828d06c5095690495c8ca143ffe59ad41c0ea112

    SHA256

    ebf24042f8c8493566c3fb5068e31e4cc2f6c7e77104bbc7895b4b6a30f30f67

    SHA512

    2cf1902337f044688a090455e5a1dc76baf950931b886a4568b0c3cda474f68e6894bc53042211b94d635b247225ecb2948a36e07560b1db63ba11b406b1a8b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0c95e6a84af57005bcb673743faa09ab

    SHA1

    d60c0cc3d0661a25a5288b6ff8d557beba823cc0

    SHA256

    0b72003532bd6a4dde57f1829d630fdba7503e168d491b9d2ce0dd11023e1313

    SHA512

    4a9e6ebc8d8f9c36da890ca563b51c334488dec627ac447228510c568d09cfdc6e4bdc5aa2967766a27cf9e750e01ff1746459575aa3b5e772e4e69008144290

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0d273880e297fd77d8ff462dc0916014

    SHA1

    9afb340cddb1d02d51d1e355f4f72c037d1d029f

    SHA256

    ae4c66bda373c68210487c820ca9f0e48107c37a3f8a77956c83716116e8888f

    SHA512

    8cb907c602e65b44a854fa4e9976aab3de0b929af734487116573b9b1ba9ec179bd76752dd112eb9a71aff28326105da4571a35c3d92fa7229619f056ce38a8c

  • C:\Users\Admin\AppData\Local\Temp\CabC331.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\CabC48E.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\TarC4DF.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Roaming\Omejex.exe

    Filesize

    112KB

    MD5

    ed5bbfd65ff1597076be463666167655

    SHA1

    1732894158bbcb188fa121722e0ec9bcbc8fc69c

    SHA256

    b8ac790650f15126884482d3739a65423562d6c145a946896bcf3ccb1daa85a9

    SHA512

    e0929d61f72769c63e4b500fd13ba604e686071012a1dc32f879e0667019fb196e699f26783d23cec4735766166f515320823c988e5c0474bfc5791b53007eae

  • memory/320-26-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/320-20-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1428-0-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1428-2-0x0000000000360000-0x0000000000388000-memory.dmp

    Filesize

    160KB

  • memory/1428-3-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2192-5-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2192-17-0x00000000003B0000-0x00000000003D8000-memory.dmp

    Filesize

    160KB

  • memory/2192-19-0x00000000003B0000-0x00000000003D8000-memory.dmp

    Filesize

    160KB

  • memory/2192-6-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2192-15-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2192-356-0x00000000003B0000-0x00000000003D8000-memory.dmp

    Filesize

    160KB

  • memory/2192-1-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2560-28-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2560-29-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2560-30-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB