Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29/04/2024, 00:02

General

  • Target

    065e4ffa2e57ce9fc2fe794ae999b84d_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    065e4ffa2e57ce9fc2fe794ae999b84d

  • SHA1

    ab7f872294bf2e53dc582b7ead88fa8a36932a56

  • SHA256

    0b61737cd2c780964fb24d185f4ef3d024c614f1099da5c34ae4960ab841e049

  • SHA512

    dbe0db1f808dac6a01ab2d0804f6ff5610f9b61d4e57a91c43d9e9809dbdedef7c43c6cb70610f4a96855a3e9841ef73b5e905ff35ade37057748188b1984dfd

  • SSDEEP

    24576:E379axq2gMaFYZczsxM9p+lUUja/Gbmh8oFYKYh6hFsciYqDtYg1Tq:FqlMHSUl4uK6oFYK+SHtqDvw

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 13 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\065e4ffa2e57ce9fc2fe794ae999b84d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\065e4ffa2e57ce9fc2fe794ae999b84d_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1464
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://k.deyiweixiu.cn/065e4ffa2e57ce9fc2fe794ae999b84d_JaffaCakes118.exe/40.jpg
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2120
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5e0cd9557b094e1ecd9c59dc6b63b45d

    SHA1

    94f9ed12253c6945ff75d4d801717161e70562b1

    SHA256

    cfe09558414602a5edd9a1e6de9fe826f3df97106128aacf4f1dbdf20ced1ded

    SHA512

    43df7d5f06e866a02ec90ff49dd8b54e190f19b3b836fb921724737c2cf77f5fb0b667d11092830c0ac453215932b510f8e9fe0f00236caa8fcca1e802513f05

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    25042345e95ee820aed4c4703cefb5e3

    SHA1

    adab5c92ff56316f26517ff8b25b01a5b0626b2a

    SHA256

    979aff00f9fa019312aa0df7b6d2ca3e19495ecea5d233c8a877177219b1e013

    SHA512

    19a802832150df1170b944f6e8957126909039febc1a34c8ac213e6a2e792975d5a8bd4157d0544e9d2f31932da89a150ca464e3642a695315b8f08f3ff3551b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bc5faa9fe601a3882a7794af6d6220a1

    SHA1

    84d415f8c6cc2b34015e45ef09932208fda3ae8b

    SHA256

    dd62c8f3780f3dd258cf7058cc102a0005420e1fc1b8e44f7780799a5d1b4ca1

    SHA512

    0b255ef7d59bd6a8155f75a15b37e56a4d02d4923175175ab5ec525853f4003e212edd26f702e0672bb1fbd7c6432422904b47f9d5d5a965285b97b549ec05db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0e1d2fc5f41330ceab3ea982068a992b

    SHA1

    8884e9d28a74372cad97701b1c31c074ba5a49a7

    SHA256

    885b6cb30e25862484487dd9947936dc1d17153db58ead20580451239eeb9ebf

    SHA512

    eebc87d594433c5457b2a6a1cbfc73841d6154372b6187e400321d7ebfdc8e87bc6ea29d3bfbf9c2070cf7f57330f61da803b134aaf2ccac60d3833ab1c26bfb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9f8d5df47aaf4aadb4b0b4965c1ee2f8

    SHA1

    6b4ce11170b71094bf469cf3dd281a619dd492ef

    SHA256

    5031ec61402000944a0658312baed81a7f19429154b7ffc15627a458e7ea552a

    SHA512

    af22bc43a9e2b4dbc0bf8a1eba3458dd42e5fcc285cacc53e071ae503f4e4347bde2063912e2ede401c9d3af880ea5711acd30e41024ab72a599fb3cdf86e33c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    20e7b2cbd90e55b574c4ebf4ddcfc0bf

    SHA1

    fd88bad877daa015a5975dbb88a90fe2f8b57c67

    SHA256

    dd73a6ca1f3fd338fcc77f5036b52ac1d5a413df1f4c6960e0234cd33c9d9071

    SHA512

    100db4952e69822b5115cf6b56e967fca970d2a19bc146adfecaf10e1106d33578a4d3879f7e139ecd1eaca0c794ffbb1d2cdcf345aa25da2a35ccbdc5045c86

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    10a9badd60882a5e5bfe7109d312b0e3

    SHA1

    9101463088da9481944e165d03633144b1ee5fff

    SHA256

    33b31c17d45b077669ebc74b308d2215b4647994b72ea192211c5134a7feb47e

    SHA512

    19475e58ae49c53b8d3afaf84b5262d990d7848a2861906dc37d78e06c01fe9bb64a9f4617214da1dd89e80daba191dfd01622e405490e2f32c2ca7c3e9ac9c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4a7ffb7a621299d1f4960146645a725c

    SHA1

    928be267524120f94abf3a1503f52bf6844dc9a1

    SHA256

    27c0d7e4840e719b40c59b82144bc24def06cae0236c9962ca4ace55f86ef00d

    SHA512

    792cf8f75ab99be544d36e0e92ad3ab82fa1c291df7d2d8156c7402b2cb95f98f161dda69f5c0f198583168606fac06dbe67c044bc2d415de7cac1660a3f0a53

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a70a7b6d647c4e71d02199827aa464da

    SHA1

    339998b3f8d814768bf567c5b3e544166f2f79c8

    SHA256

    de8004628428bfadf637702be65a2b09404681382fd81de1f915d8f722419d46

    SHA512

    475f1a3c3a7cd038283c961120b1e1bd933a6a128c3c56e53d6f45cd9ec9721a80430aa3c4b9ca683a19fb822caf3106cad59b066c38f94abe6ef64b3b770c37

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5d137555614e4dd4c1c93a11d4d827f5

    SHA1

    a5760a5f43527739246a1524e49184df2ce1eef6

    SHA256

    29439cdda68974ecf3f3d75ca9de4880b09377045835b164671939a3814def5c

    SHA512

    6f67bb8ed11f35d90753f247782300d96fdcbabcac5266eae5214577b11966c98364fc7875d7a32f55a15b4e5ac884a03ae82902fa0c69fe0f58fb8c6abbbbf4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    68bcac8579e00ea66244ac5df56ff7d5

    SHA1

    b0e0bb4354ce92524d447b0f86ad269af046cb2b

    SHA256

    e1d61c6a6eeed476d755454af30a01edbc7e24c9a4624aac23a1932db0daf088

    SHA512

    eb293e05634aa619380c1cc4928275f27289246c9d640c1b109066122e75e9c4a6f59c416bf727a49d0aa7046a45975296acd10ec822a237b37231311202a57a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6c2f3ab0fa0b24fa265454b5f8566b89

    SHA1

    ece76cc580557cced533dee6b167ff4a7a051160

    SHA256

    c6c4de17967533a4fb6eda9bf90614c977e07a82a2ccc9b7aa6617d3b4c90e33

    SHA512

    627b2e3b179d5102528ecf0ceded8c68e92ed149972e624cc0db6f39992ee5d35ea7a5bf197e0bec38cffe05f339a09ea9d6ef83ba67ada36f02e86e55abc2f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d42fac5484d0fcf23a2154abbff16e7b

    SHA1

    d59b0f8ca39254727267b987aea8330927a7d527

    SHA256

    c41ac1f6a904774b9f6426f725d80c21d9ab6484eee285f4a350e32bb89d0b7c

    SHA512

    606282ea69cc7518248110e54aa430c07bf232a999f007ba38bf565c51c79740cd211d22adfef258d7c9f3a68ce88a3914b261142d6645e2df8f08cf39f8a416

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    75768b7288e9c85cdc3c37881ac63a73

    SHA1

    7c61e3698011ee38e9517d6a14eb2ce7d326f029

    SHA256

    e1d0ef8210ba06aa69f153ca1496dd89862e1a8ac1e4da263b153294ad35f82e

    SHA512

    4961c31502e2b34ec5ebfc0a5fe15ec8593ebc917a6e55b135ec34438e8c79ee6747f3dcc61799c6ec09e1333e93ccb8902a5a2b04e3e59d1725dab504f48d10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3a0d5f67b67c1d0ab1c0873091c81949

    SHA1

    a030d20658ad11539d6b6cabb411f860cbfdb1e0

    SHA256

    ee86d11e3123fdb43d2b73ab2230472695363d67a39f0db266a96f67b5e9cff6

    SHA512

    0a7195e246578da9c3bd4e3845ae9830de9ddf01692ffd4112b7f4bf89ec4c98e771a0798c328d933167fa52df4fa2f09332db57b942e594e5b53934e5925139

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    144d23769a13b09569ea48b4763fbbe9

    SHA1

    7a578db9316727cb86617b07479a52a70552d45c

    SHA256

    a09f781a629115ce72ded17404702e734cfbe38ced7b327921f8d6080d2dc15d

    SHA512

    5594024bff7c1a246190f14958f7d0e4ac3eb8eed824141e423ae57458735b48aeebdd94e4a345efcfa40cce4a63269658c08e693eaee7b40b23c54ad22a8652

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ffcea2b219a86065b2ef65d99e7f0e50

    SHA1

    ddd8320822e1b4a596ad50fc7f413155eb77ba65

    SHA256

    0696e5598f284f0a30e5415c8942300051ef36fab2ecd24e758b4bcacca2c625

    SHA512

    1dfe1bd628d869c60c59ee94535b6d6d49708aaca2fd93ab299138d2dbce358f321ae0707098cd8e02923798761e40be2de1618fe3e9ae9d4ad9f660a7cebd1e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    13eaa2426920d965b3228dad24640f23

    SHA1

    2f0872a3340e63f49e2fc0b763ea1b30d2caab8f

    SHA256

    7fcd891be8e7f1c69b8d61af85c1d9447c71cd2fb715289a7ba9c786972c69f1

    SHA512

    9c00b764a428954673dd27302377096e4e281ffb27ed30e23d69e0f2e1b4cc2e71a17ea93550ab5ace4f64ca93f599484df3a8103aa4e96df50ed5431fd84fb5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8ff03f1a118d21909d88b6874c7caaba

    SHA1

    dc7465d68ac61dc266a9c662437b11d521d2268c

    SHA256

    7d4f64cda6f93edb5c6e2b55d51a4c05c52055acb0bee58fc13c9beac6621387

    SHA512

    b9b7fa5adc2649fd39b55f6250b9846af4a9ad98bd3da66efb2b0ac4afcfb3679d4d3584378248c893c87cb31fcc1ae2a307a3a2e200aaa311f2253769543d33

  • C:\Users\Admin\AppData\Local\Temp\CabBCFC.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\CabBDC8.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\TarBDEF.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Local\Temp\nsi2A1E.tmp\1.jpg

    Filesize

    125KB

    MD5

    350ce86012671cacb8bbc1ac77cfd5ba

    SHA1

    4ba498d751a3eb31ad7c2b128b57d0eec4515c77

    SHA256

    80c16d53d5204602116351173fe21ce11fc28cbb9c39d44543763edf828c5da9

    SHA512

    e5a2413b38e7c93b9f504b19bfcb1e430b45014ded42d1b1174d69c8d3c588bbf5922710b3f287d87b1fff2c0804142ec1c5dacf1cdceb5621b92651af54857b

  • \Users\Admin\AppData\Local\Temp\nsi2A1E.tmp\Inetc.dll

    Filesize

    20KB

    MD5

    50fdadda3e993688401f6f1108fabdb4

    SHA1

    04a9ae55d0fb726be49809582cea41d75bf22a9a

    SHA256

    6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

    SHA512

    e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

  • \Users\Admin\AppData\Local\Temp\nsi2A1E.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • \Users\Admin\AppData\Local\Temp\nsi2A1E.tmp\nsProcess.dll

    Filesize

    4KB

    MD5

    05450face243b3a7472407b999b03a72

    SHA1

    ffd88af2e338ae606c444390f7eaaf5f4aef2cd9

    SHA256

    95fe9d92512ff2318cc2520311ef9145b2cee01209ab0e1b6e45c7ce1d4d0e89

    SHA512

    f4cbe30166aff20a226a7150d93a876873ba699d80d7e9f46f32a9b4753fa7966c3113a3124340b39ca67a13205463a413e740e541e742903e3f89af5a53ad3b