Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21/04/2024, 10:50

General

  • Target

    ff1cd696412a5e986b9def2bfeac3521_JaffaCakes118.exe

  • Size

    57KB

  • MD5

    ff1cd696412a5e986b9def2bfeac3521

  • SHA1

    b4866cabf1968ae7acb5ef744f55bd63c04c4876

  • SHA256

    02d90a42e8cc6de5dea5ed2782f1e509b298773ca6384562f14794c1a26750cb

  • SHA512

    309d82538cf28b4b3d31f7f378ccbf6d38af8c29234b141e8ca21a7abb4ee30b811c0e77de9596c3e3b39091713a61ce74e5c6de832141eac4a7156e32140e0f

  • SSDEEP

    1536:Je53/KCY3L3RiAfLiZaK+QHegWmw6AHjDK0UBUc:s3/VefLib5et60c

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff1cd696412a5e986b9def2bfeac3521_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ff1cd696412a5e986b9def2bfeac3521_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2864
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.youtube.com/watch?v=_l2YuGAqNeg
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1724
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2548
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 /s svchosts.dll
      2⤵
        PID:2440

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

      Filesize

      1KB

      MD5

      9bf3a1941056959a5eba7360314bdcbc

      SHA1

      99344d4525cc7a159ab9cfd079b6dd0345df6851

      SHA256

      a5553e0213c248272671a9e9bd11ccff7656d1eb324f57ca50d1c2d97d166fa7

      SHA512

      6e210003c3b60dc929c7d825d4bae7eff3d4ace398cb8eea6e26fcfe11fa57c2d5c9fd224bff751e91a12860f96a0fc450ec07a820b8eb01b46ec855cf71a08c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

      Filesize

      914B

      MD5

      e4a68ac854ac5242460afd72481b2a44

      SHA1

      df3c24f9bfd666761b268073fe06d1cc8d4f82a4

      SHA256

      cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

      SHA512

      5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      1KB

      MD5

      a266bb7dcc38a562631361bbf61dd11b

      SHA1

      3b1efd3a66ea28b16697394703a72ca340a05bd5

      SHA256

      df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

      SHA512

      0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

      Filesize

      410B

      MD5

      5db20c6e4282756674b15f16c58e5b07

      SHA1

      14a2d03c367ee4d45c230c12aabdf92dd72f21be

      SHA256

      484e7c9be2192dc5d44fbb20713c803bdae61b8020102feb1f7df9ecb6977589

      SHA512

      3d92342f1df79ebe7a91917b1ce3ca83619a7448c9771a3fd86502a340deeb8667565738d42321dd8758a5fddfac673666c2212ea27e79b915c1a630326c9fdf

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

      Filesize

      252B

      MD5

      ded7554d3b4230af3120c3fdfe986d3f

      SHA1

      80bf3ec95d9fe9f740339b908dcd9bbd79304a53

      SHA256

      9319ebae472e14bbb9f6d3d76c0d63b4992bc290a04b8cc91e6f65a61d9825bc

      SHA512

      67d8cc7132c1bd8a24c03af757d3dd98c643a98113297d5ad39024bb3d013e3e98c586dc0f3d82967e6dde069a3b29433d4adeb7817dea1e93d8ab7701efa7b7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      2ba10c1c6f32b6e11f2a1bbb4ecc8f27

      SHA1

      6a214e7c9e62560647f8eca8c39653676f4edecf

      SHA256

      20254b32ff4aacc606d00f3b4a9915ef503482c9e43632909b7a72912498706b

      SHA512

      7f493bc4621032a9142700bd5c081dddd98789b6e769cdae5f55443ee43326535b0140f25082840c1c28f80b6d348e04cc7a848767d7f394480eea534df68184

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      52d097de6c458269747f1e1443699740

      SHA1

      275c47f89a8ede85ec2bc6af78e9c12f1f7e86b8

      SHA256

      84c97d0963e1fab499220c32faa1e0f8acb3f877c49b9a82da8fe79f35a239de

      SHA512

      5f5731a5f05fb684620b0c3517aa4c17c394b6f3e9ddd8f7fd1a8fe40b826291efc6472836e9fbde73a4418353e4d2940b0797ba8f5b3c9841e3747a29ea9c34

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      2fe017273d4f607092b6ee24d6de2226

      SHA1

      c0122a9e4e9920ab0f5f4fa1c022aef7e0637050

      SHA256

      8aa3303f7d73d6cc9cec0bcea650732897365c5eb135759789d5ce5361c57c79

      SHA512

      462712806d6fcb202f6fc26351170fa0682a541e3f1c0d7f39a16075e40f378927933e3f188ad129c1f59a5b68703bfcc4ee20085b4cda1143a6d2887b514889

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      cff91a7262dde93d58c27f7e4d0c4131

      SHA1

      601a0b980ed1442572bef2b6fb512893b4074442

      SHA256

      1f8f17e347901ecdb6eb382307563f6bc3a31dbbececf154f866efaff241b733

      SHA512

      4ec9d896dfd3467eb8bcfd74dad5522476946288462c9237335ff041528fcf44e276f183ab4da22acfb35c53f8bf8732e2e3839339f3f7f2c478ba18b716a9cb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      9637fb585f63667401721463f45096d2

      SHA1

      29983c27195ba983b722ece3f881e46439883c2b

      SHA256

      7c2d6762f09bdc9dbb3ef422a020cc3bd5b67b12f9e13c47a65ee306583db73d

      SHA512

      ed085281e7f41790ed58ef4027297437a70b45a59e8d9ebda610893a03e14882f9fcf01e40d78bde66f650f57a59852c30785419ceef667afee798460e7abef8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      8bde6e490dc51db74722629e8053f494

      SHA1

      d3f4049871becabcbabf808d5008d491c2333e86

      SHA256

      0605abb364d0de54b32ec0654468713596c239006bbf635c93d18173942a093c

      SHA512

      a777873ea8e6a87b3b541cfdd5b924701523c93887986a43742120a11ed209d01fe3ce7206423baaf198cec79e9e6458bb8f7494e225121ad9b6b0a688a0ca7e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      e433e0497ad8b4baab46de0321ba5616

      SHA1

      6acde34243100b3d5114b5788b77e4655a8b5661

      SHA256

      797a784b420f9934badae32d7ed90a0cf542b08c8dc1522d64155e93cb094577

      SHA512

      39d2fb9e6f38d6a3394f77718565e34cc8e01d908972cd44944f674d025ad9e67c60d6d61bf546092fac15d50a4d71f0dfb3ac0589236339b6dad1384227e7e7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      3c2da005fa9d3f7c661b57b294ef9d51

      SHA1

      f812a55a22b4b6bf16e6377074d11731b58ae9f8

      SHA256

      bfe5f6c5aedede207ee624f64cc8c85bc205bf65386bc847b33e5780a28f284c

      SHA512

      c77f3a4fbf1fdd153b3b03245a68bd2b850f160fd7ff85e4e766978ee12dd7e4024a1e63f6ef5a11b10d7f32609f0158a8ebd6d1304f80f64048968ef29df495

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      ca5b15862697db5966eb1bcf99472def

      SHA1

      96cc514fd5ccffa3f4017e3f3d9f2e37757aaf66

      SHA256

      60261bccbc347a951d28c0518993f786a2be75a969e61670564ef481b0e919ed

      SHA512

      2137e8eb9b038873e7a33b9027fd5636a7fd5dca8985a1407a0e78665da4d438fe02ac81c7a197048110a81f7b11c5bd53497c1b555d3a59dfc9af05e02345f7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      cba8a5fce35c5ffae471a332d42ca492

      SHA1

      6a0d628e1ab63255a2aa8ae7b515ecd29580cbcc

      SHA256

      12f55d3c5894241ebcaad7ec3d77b5a837972824a0bd83a6d38091c495d58d54

      SHA512

      ea15a85ac56451e867d2a8ad0a7a13795b1140d4e3d1e84a94265dc4b7842faf9b4dd369a2ac5de8a3e6f65258056e747c4ec5f7d4309983f94579993c62b361

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      242B

      MD5

      fc3d0c903f838e13d2856a88a34625c0

      SHA1

      f0f01ae2eeeb82a03fbd7684b632905b7990fc87

      SHA256

      d80e399669aa440ab79dee38b5b819bf5ac1a2f775accfb0968c18745a9da826

      SHA512

      0a57c5e093217737c643098e571634fa80a51aeb2cda9bc4c2ed78fd967571fa7b4eb861f645c55526fc936af76c7b6abff503ff4d0a2d01f6ad13d011c195ee

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

      Filesize

      242B

      MD5

      9655bde9735908a4f342e249a8cc24a7

      SHA1

      683818fb575688cdcc20c42646153365e44f4bb6

      SHA256

      1cfdae76141f018a76ff1001d65a261bb6d6ff6d91fbc946aad4c6ff9c607765

      SHA512

      d6a112458e19411af5a04711aae0803bc758eec048106f1933210692449efac720fa912d50277d2fccb0bb03ded61bd84b38c204b062f12784b79dc8898c5cca

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\re26ad0\imagestore.dat

      Filesize

      1KB

      MD5

      315fa398719825f62cc788b17594e64b

      SHA1

      ba8e034a61372a618ba4de3367186936f79c9f7f

      SHA256

      8feaa39b140b1f2eaf47ed6b21332027a17a96695e26e5842a179e47709ebcdd

      SHA512

      785186e8695b4f9463e0f048bdb0c657562a268a400f1afc822b0c1a55ca95c6a26823f38caa50d4ed3b61f12c3b1dbad04f94fcf0f94d6c6fac1ef106f544d9

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VIF0OH2A\favicon[1].ico

      Filesize

      1KB

      MD5

      f2a495d85735b9a0ac65deb19c129985

      SHA1

      f2e22853e5da3e1017d5e1e319eeefe4f622e8c8

      SHA256

      8bb1d0fa43a17436d59dd546f6f74c76dc44735def7522c22d8031166db8911d

      SHA512

      6ca6a89de3fa98ca1efcf0b19b8a80420e023f38ed00f4496dc0f821cea23d24fb0992cee58c6d089f093fdefca42b60bb3a0a0b16c97b9862d75b269ae8463b

    • C:\Users\Admin\AppData\Local\Temp\Cab31E9.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar4BE1.tmp

      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • C:\Users\Admin\AppData\Local\Temp\Tar4CF2.tmp

      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • memory/2864-555-0x0000000000400000-0x0000000000463000-memory.dmp

      Filesize

      396KB

    • memory/2864-0-0x0000000000400000-0x0000000000463000-memory.dmp

      Filesize

      396KB