Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    134s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    16/04/2024, 15:56

General

  • Target

    f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe

  • Size

    34KB

  • MD5

    f3d1bb1b55971c3647bc279bd561161a

  • SHA1

    ed0d7508c88bd25d14fea9fa218b5d765d89891f

  • SHA256

    e3a4bd2bec9ab0ac245996a22783c32f921e9688b5f216d6996188d9103c0fd4

  • SHA512

    b520dd6b892705fee49b4304c19b0d87e1434d614953f74cc4b92ca8fd27d4dedb7985b8362c8823b7f375f545358f6df15b04188fb58b560c18cf64c9ec61dd

  • SSDEEP

    768:WdjrSskr3yKptT12XgeVtvEKJiGbKCp/5IHnELNl1j3DojRHcZW:CfSsc3yKp2XgeHEWiW//GHnMl5DojRx

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 25 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2936
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c start iexplore -embedding
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2928
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" -embedding
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2536
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2536 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2584
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c "C:\Users\Admin\AppData\Local\Temp\gos17A6.bat"
      2⤵
        PID:2596
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c "C:\Users\Admin\AppData\Local\Temp\f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.bat"
        2⤵
        • Deletes itself
        PID:2436

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

      Filesize

      914B

      MD5

      e4a68ac854ac5242460afd72481b2a44

      SHA1

      df3c24f9bfd666761b268073fe06d1cc8d4f82a4

      SHA256

      cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

      SHA512

      5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

      Filesize

      252B

      MD5

      ac1d26ff52635ac2a08f6ab864b33f07

      SHA1

      3da3715f84c5ccf263a66f1e0a4467d40f229632

      SHA256

      2ef0f2c1126327ab644875cf42810d02e69c9bdea6503166b1ee3ba1595c96dc

      SHA512

      2474536cee4b91b4bee35e821823578735cb3def3db0ef655a51a7d084932159422f1920d8060c1f38914506bec99c09baec85ba8949d4b7ce1718aee6d58118

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      3228a7a0d12b02a894fcadab5233c670

      SHA1

      67abad3102282730755a3bce118410a0db978d8a

      SHA256

      7053573077c8b7f8717f4c501824746cc8b16e455628e514a1e59ec6d9cd45ae

      SHA512

      b34779c2d372ecc90b30b3dae7d0fcc017d33c41e8a07e2d4d2d8ece4cc8e6381d437c8f3f707f425b2ba0e7f6f7ae9592cba5fcfda0e3ede2d88d556c12645a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c2a4b7e3f4720155fa697dde80ddc9ed

      SHA1

      5e660c5b6623dc793f99a994b445d3cdd7572e43

      SHA256

      fe5de10413d50394845585bf88c8aa473c9c1d0402a32a196ebe3bbcbc70fd51

      SHA512

      598e4a5be5d7d8620388aa1605423f6c7e16c148ccd28134cd61e0c688686d0e9f35196ad384b22ccd66ca803d206b04aab4a5ef475a346c5888163e98ab9308

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      229228dd43e11ef10893ca9a33b525af

      SHA1

      6293f663201df1182e3fa3225a26b1452f635b69

      SHA256

      33376990bf1179cbe38df1a1364ab36f8e4eac30402402270d9b77db3eef68a7

      SHA512

      fac2062f73b6ff0f2ef1a4747360a03e82ec63f2ca6b9686cbb2b5e2457fb9ea4450a71a2744115b1f41ea31009409ba2ca8257a0ac8deada86d6fbebad3e6b4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      bd5f7bd0e00af4e5937de7480d59beb7

      SHA1

      ddcb6786aae12a477490cd94049cb13e2db46ce0

      SHA256

      99570e0e57d24a4fab7508272b9603a481dafef14dbbb61037fb1a4f461f64b3

      SHA512

      99e178010eda53568391cf243edd6cd0701a4574e44d96e393a478c2059ec4bc1f795063dbceb5f33988269692546c652348fda43c77698ecb4b7d7b053056e9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      7bc4b957bab4ec9300f5e5ab5aaeeaab

      SHA1

      c2775046ce5042be5e4010a8c6e257002e57c2cf

      SHA256

      f6b60c7a65efc6a19f77484df1a9af0b8cc84ea2a84ae363759394baf59e69bb

      SHA512

      e4250487d9629f89bd4852a993b123a0de3c82289cdf96f944e6d0cc32687aaa0b998129bbdfcd30c995299797e7cd6df59fdec881d33d9db1288d950082820c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      9ce24cd5064fd983cc0fe119f0521374

      SHA1

      c34767e85bd58ca07d7840699368128a1655abea

      SHA256

      c0f7e7703142d1f01dcd62bd2fce678026c0873d6f410cec58140bd5156afb71

      SHA512

      07211d60b73a45ecb47fd8e19f11c269259ebc79c495686248c4f0513069c859b851659d729d66a0c408e38c04d41e4e9b3bcaebcf8711f6a945ce1fae38838b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      bdc0d0c50a9d89d64e8dc22cd0f323c5

      SHA1

      21805f7d82f3533d981187cba1f482c0ab768ac7

      SHA256

      795814ea706e525d7e42da01f8381f5c8925c1e41f3221361a74d81e1332a4bb

      SHA512

      93726059f31f7231db18918abaadcfc6a35e0193392f53244263f495b66e060d6901ad53662b41c6b3c7108494115910d2a337069e84561d4c573cee66146df5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      17583f87529b3425431a446d6fe53ecd

      SHA1

      8813283d070cee1ee0b235b5faafccc697d7d615

      SHA256

      72b32f25abca61198507405f3d4cdc5dab75e974dbeb8241306341002e2be4e2

      SHA512

      97a0513d1f943a50669a2285e302e167467f55274d3bcd5029d61094db2aa01600d4f8ffdd0ac0775c018c53d0965574c0a345c9044bc7b43858d7b658d4e703

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      73b505a90f41e7acb4f47f975199a660

      SHA1

      9ace34ca7b1b4bf45f219fd4738d6cec1ab311b9

      SHA256

      2ea40a5f4404b3cc1ae30faf82f031d75ab0cc76db82d46c445f4f153ec59206

      SHA512

      3fbd070f4e194be76d5b74b014327b2378c4f7da86ca0992514c00030af482e1fa6a753dceb98f54f831ca28becd0e046b6c7f67a9d4fe8cbc19dfc3b638d8bc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      a4c5365a2c6791976409bf6271f4bb53

      SHA1

      3aaf68e8281e12f65710eafec00c6e7d52b6aa15

      SHA256

      54ae4dbc0f113ee4e71497b58c3427349408ed470b2b962dc17d65953a511205

      SHA512

      9a3c695cfde80a80b93034d58f7cbe2800364dedf75d077072148a59a15204f0c7d75ad9920a9f115aab190eb6763b1722018138683fb56324309fc6272dc728

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      521152da584b93d0e1bc78c52aec2053

      SHA1

      225338b250e70b63852f324500fa3ac898add4a3

      SHA256

      adedce1485b370f46e31ae4f8fecfc52b0df74075a3bac52144c405d9e16cf86

      SHA512

      7413bec6df2f3848065c06808d1a6a082943075a4688095e311002af20b04196f32e9f40324e15d54b1d210eee072d7c9d55956ee79628b34e6bbcc9cd8f7867

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      242B

      MD5

      ff16a24371eac00fbf9cc9f731c115e3

      SHA1

      760f498285145b2aadd3e88cf7d83ec63e269ce2

      SHA256

      2b450fdfbb15299294b049f768932ac2921a384e3c6e24c95a8f5753c005f851

      SHA512

      87a5537c72e1d62baa162dd7452e108499e7338ac24a83bd212740bd9ba909b65530f7da6b05ad3d3f403a5cb3227fddab3b44b4d215707d9fd659f5e0ff48bb

    • C:\Users\Admin\AppData\Local\Temp\Tar1A49.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Users\Admin\AppData\Local\Temp\f3d1bb1b55971c3647bc279bd561161a_JaffaCakes118.bat

      Filesize

      307B

      MD5

      0fd4d534966c67300e09973b1bb6d52d

      SHA1

      3ef46ed3d77d748931e7ba89dfa99d4f21a957ea

      SHA256

      47627d7af0a1ee8cc137dbe1212fe1cc15258ac761c16530adc9e92b953631b7

      SHA512

      493ead11627bf5a7e81ebc62436427e5fcfb2b1ab0efc7a5e7b34a26902093a99ad5d4ba017130614ff6f40b3755a7b739aa376b97242c7bed455840124b3f03

    • C:\Users\Admin\AppData\Local\Temp\gos17A6.bat

      Filesize

      190B

      MD5

      f83931e630ef36d8987c346ff8f578bb

      SHA1

      1f02c22176fb2147809adc6a358ae8d7d5cfbba1

      SHA256

      e35cd80e285fb18e97c85272ccac4458f7d1b8ca82dc164f99901516c669476d

      SHA512

      132225d3125973c397ddead1bf75a60dfe75b8cd2fbed0201fa8800a4c62e923e835a61a553f64b4107bb9005b2765d72c80a03e231f9b74224968e0399ad505

    • \Users\Admin\AppData\Local\Temp\gos17A6.tmp

      Filesize

      24KB

      MD5

      5ecce9af16e14becfeb560dd03644b75

      SHA1

      71226ccdc066672c643a255ab45b52f5661a1dd7

      SHA256

      5b5ae28ae7623e3a1800f3488354b706d16981b8f772ccec4b92fa4edfe4e748

      SHA512

      c6e8d93b6060b5d9e0ba1842e937c8ac61d5f5390cf87db464ca3602106d590789c1fa1170cafc67d4a1451dcee4808271a2006bc412af6d3fd6609c5d4b1fbe

    • memory/2936-0-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/2936-42-0x0000000010000000-0x0000000010012000-memory.dmp

      Filesize

      72KB

    • memory/2936-43-0x0000000000020000-0x0000000000025000-memory.dmp

      Filesize

      20KB

    • memory/2936-41-0x0000000000400000-0x000000000040E000-memory.dmp

      Filesize

      56KB

    • memory/2936-10-0x00000000002C0000-0x00000000002C5000-memory.dmp

      Filesize

      20KB

    • memory/2936-6-0x0000000010000000-0x0000000010012000-memory.dmp

      Filesize

      72KB

    • memory/2936-1-0x0000000000020000-0x0000000000025000-memory.dmp

      Filesize

      20KB