Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    07/05/2024, 20:51

General

  • Target

    21ad6ce4b465abdbedc5e41684604c63_JaffaCakes118.exe

  • Size

    204KB

  • MD5

    21ad6ce4b465abdbedc5e41684604c63

  • SHA1

    0f7f566902fdac724db90b241b438a705308c589

  • SHA256

    dcbef672566b740d85d68b9b9e4db2effddc496ef15a655e186d2bacbca86942

  • SHA512

    1e7b7a87db9d00de18e76e113a4568751b5381831e46b9f1b15e93aa34ddb559e6c2f2df731f8c22d67802ae8ba72abe56343eab5eb5681061605fb6ae0ea718

  • SSDEEP

    3072:WLk395hYXJFdyfQIL4ELkl5W48/d7NQott7Dqa6w8OPg1iaBrWvD81u+zMm77j24:WQq/dIQIL4T5Gz5n7mHw1PCiedEc8ZU

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 14 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\21ad6ce4b465abdbedc5e41684604c63_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\21ad6ce4b465abdbedc5e41684604c63_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1028
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://f.shuianshanba.com/21ad6ce4b465abdbedc5e41684604c63_JaffaCakes118.exe/40.jpg
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2856
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2856 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    939a5415c28c68dd7afd9f4e004d6f86

    SHA1

    dc1a8e8501e2e68e46df3c99c01709e90532fc13

    SHA256

    5cf81580e536023162116de33dc6cbd5a1476399c973ba21951adb9e994bcdf9

    SHA512

    58fb0c29666827e3dea1fd22810c419f3f4ba14b4bad2b84c40c34b601098acc6704f0ca2a691dd1f838c2baf5aee80109606576ab24c38ea3b8f378992b9f95

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b8d00602097aafa2de12246df1256cd6

    SHA1

    ddcf78d891a3efbfd20603c6e3127975e6e04a14

    SHA256

    5f4d7aecf2c4fe7c83d018672ee19653100af6533db81414c3aec1e7a8fc64ee

    SHA512

    eb5a31a5de153bd9bd7ea22d37b41b0f0f8856cf3d3c438908ff1b9a388a283654c2fe9a342ce2e5d2724c6a5985b1e766010940a7e2b9712310e5f166d0e544

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    923eb3266819bf38106fceb7ded821e5

    SHA1

    1bfe4df453bf21bf2fb9cbad287319f8926c7e33

    SHA256

    a21d0e62f3e51057173a626503afea36e02393e0e33aa214a462e2c0a7ee115d

    SHA512

    38a33ffbaf62929f07bd885205ac0b913325b98f728060c5f9caa53328857e428753c7e70aed9518ea3ea5bc734d1c239cd76d32e6f9c8bd1760bb81f065fd3f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bc5c48577b893e30471fb849edd5dd39

    SHA1

    0f447fc929b6d33aaff01a9a65bfee9b732be6c0

    SHA256

    16daddea9fadaf3bc3337b3c8e86284629f35a62a4930f6eadf0b0192b5b4e4c

    SHA512

    4e313ea51b6380c95752b766a6f095964a9498eb176ead812d46e07b50e92391ecb076aaf95de5248824fcd95fc706fce4817ff8dce470d4cf83582d8f1d01d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e31b6d71197ecc72bfae1783b419cf90

    SHA1

    2901f4e542f164f4258689b3035bde13143affbb

    SHA256

    96855d1c1ff827fb9851f8abfcdbb56384b91821c9c143eef3a80160464ccd1f

    SHA512

    a96369abb26af1a353edd29bc86701636b0c47824f7ccfd0986835be7e251fc16721f11de7948d66e0b5d351672369272ebed24fb31a27b8aac958233dba0d1d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8d747a225ea5569ca915f9d8f9aa45b4

    SHA1

    590602e6c0467c80e49707194638411a32498a73

    SHA256

    93585b65f363bf0239322ef7089285fe7a2b69724d56e9b99674fa113cbf4aa5

    SHA512

    e08b5b84f11117148dc86b8f9bedcb1be5df4635277147a539342eb4e9b5db8bd0bc9fb4b9e0580d6fff10155e8fab094c4a0985129a773f01b6eb95f31ef985

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1eb649b3b5a53c62752df2fcd0bdb3da

    SHA1

    d818e69b7d01a43485e85beb62c26d404947926f

    SHA256

    10b8f06d0de4e174192579fcf3859a49878bd17cdbe9e2e87af4ca07264531d6

    SHA512

    5a117876e6b4e3d64ca93ee5435497e36c253f29db7b9d7e1f78406c0e69426763f526394c49617d22709c6d36fa8c721b1176022a7b2b9a618ff957a653d4db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9dfe337acb640788abb0d7ff11c4cb93

    SHA1

    c627c552398b5ace93555f62ad4adcfa6cead131

    SHA256

    cf86aa94c85a608da3c7a0bb9bf9049215ff98d926533536442b1ad46d8b34c4

    SHA512

    2b928b5db0d6a2e4f5c1857636d94b9a807066d5da1fbf8f9bbf98dd9a2537867b96165a27dcf45a694191df18dcc1eb610d64265fc012c3c7c5cdb058a22c02

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    701bf763001371220bd9804ec2473269

    SHA1

    85df354b149e0ffb93b85a9f87ae2212fd1ae900

    SHA256

    5b8df1c2399f4df80bba1af3e931cb281fd14e2ceb4513d074c2b52aa9b00219

    SHA512

    94eada6568eef4103e94114127c034de737f05e2f2ae873daef3e35920b1428af45a937b95370436a4650edcbb1953dfc0382975185f31d41780ceb239d041e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bc738fa407048caea593af99db36099d

    SHA1

    f80fd337e883092364ec7db1147b2422469b7608

    SHA256

    9110cb2f079c6d59d65b4cd932ab73bd161b19f3c15eccecda189beebc8af2ee

    SHA512

    a2b97e70edac981bc8ebd0b3eb63447d98647b23b282b9673e5ed1cdcb7743ee4c7278a7dd0996a33fe8715f5e2d0935baef6ef8993ce392aa9331cf3ece9c95

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    920b6e1d83254bf5f901b662f8fc3fc3

    SHA1

    1db03e098e6c3478195b1e2622a6fa01c001f607

    SHA256

    11e58c59555dbbf3d45702f7e0cbdbef30df25ceff55154056e5c2c3521a49cf

    SHA512

    af57d153c3fafd74b699ea4fcb4cb9bfaf70722af4ee2e804090f6524799147467f3c94879eab8a8d9043b1b336ea0c7032767fc0bce66e503175f9f4ad68b3c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cef479b892dc2f16c60ba927e766b3b6

    SHA1

    df07df55660322068b1060bad8b051854863ea51

    SHA256

    7a3dd1a5e613916fd407881506291477ad33253d3f67bb62f5093b08dc3ab636

    SHA512

    eef6eca16e1de7bf602f26ac35babc2e84f8b1e0a0de71ab8dd7dfbd9733461244ec65343629cfa70f70cf342181dc30123b0ec450f367a59ebf3db14cf8e888

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a5e8844c01b3440f452ad9b4c8e5789a

    SHA1

    9b6a4da8dd934e7fc2cbb65ed7151b9edba3224b

    SHA256

    db63423a7fa0571041e632b66f277db021fee0885f121fcef83a6f5634003174

    SHA512

    4870e50f1ed84be5724fe158ab66af140fe0441ea6fe46dc872ed7e4b1f403526cb62c3f41f9edd78ad51b758a58d33f068b376edaf63b20d1f65323fa02efaf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fdc16035b60a4f0b32d24816fcf23fcc

    SHA1

    fa6960f1914ba516bda301823f3f911e209fcbe6

    SHA256

    509d69e2bb79eab958ba98d0c51bf5d6ce5df0d9659ebef977db016821093b45

    SHA512

    d6c23f1bb41cd7ebaa2a9c4f0ac5e180f360b18181345f58328079a6dbb461a6afc112b97498dab63683f4ba35e01c52caec01922825381f28c06383b5bc4021

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a4ec9b3dfefccdf31d373e563ef0c884

    SHA1

    92d0f0b956c8c173055d72500398c357a1b84558

    SHA256

    f68fb28332c6c4e4b6daa8fa122d3c8d7d22910c35af0c0d5a827670ab1438b1

    SHA512

    0b972fed49564221fc38b15cfa9b5d6ea1b0cb6fa6ecb6e0ba3f4739ae11dba2beb4f193fbeab4f34e0b83a3e50c3b8f3d0f32bd3e2c823cfe6d9b302f717d1d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    24062e55de93f63f39bcd7292b78bf81

    SHA1

    f99cb57e78872054682946e9bd9af8288e455710

    SHA256

    eba9bf4f15f690887f7c67985ea0aa760a519ec725f5aed367be3fdf1c52a2ac

    SHA512

    151c656519ee610a7b1ce8e27260b21f0ef07398db2665f0f93e758989ffc3b9e68c6331b1fce2e3a7b84ff0500a1dfa30fae6f80f32c8274859a99eb337fe9c

  • C:\Users\Admin\AppData\Local\Temp\CabA122.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\TarA164.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Local\Temp\nst21D4.tmp\2.jpg

    Filesize

    127KB

    MD5

    7967b3a0fc66386f8e662f50560d1964

    SHA1

    a54bd305709cf45beefc8b786d3601d1597f0ef1

    SHA256

    87d69bbea6ad5ac602072cbbfaeeb9c5ba456a4faba7b2d09420f4203d2b4dab

    SHA512

    3a0996aefc044bcf4118223a033810024ea1eca887fc7ba121c153ea5ea7e4579d762573b9d6a8c7cf76cc1881f66a966ecfaa3ce81b31ecf996a9f3b7442830

  • \Program Files (x86)\PlaySetup\uninst.exe

    Filesize

    204KB

    MD5

    21ad6ce4b465abdbedc5e41684604c63

    SHA1

    0f7f566902fdac724db90b241b438a705308c589

    SHA256

    dcbef672566b740d85d68b9b9e4db2effddc496ef15a655e186d2bacbca86942

    SHA512

    1e7b7a87db9d00de18e76e113a4568751b5381831e46b9f1b15e93aa34ddb559e6c2f2df731f8c22d67802ae8ba72abe56343eab5eb5681061605fb6ae0ea718

  • \Users\Admin\AppData\Local\Temp\nst21D4.tmp\Inetc.dll

    Filesize

    20KB

    MD5

    50fdadda3e993688401f6f1108fabdb4

    SHA1

    04a9ae55d0fb726be49809582cea41d75bf22a9a

    SHA256

    6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

    SHA512

    e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8

  • \Users\Admin\AppData\Local\Temp\nst21D4.tmp\System.dll

    Filesize

    11KB

    MD5

    00a0194c20ee912257df53bfe258ee4a

    SHA1

    d7b4e319bc5119024690dc8230b9cc919b1b86b2

    SHA256

    dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

    SHA512

    3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

  • \Users\Admin\AppData\Local\Temp\nst21D4.tmp\nsProcess.dll

    Filesize

    4KB

    MD5

    05450face243b3a7472407b999b03a72

    SHA1

    ffd88af2e338ae606c444390f7eaaf5f4aef2cd9

    SHA256

    95fe9d92512ff2318cc2520311ef9145b2cee01209ab0e1b6e45c7ce1d4d0e89

    SHA512

    f4cbe30166aff20a226a7150d93a876873ba699d80d7e9f46f32a9b4753fa7966c3113a3124340b39ca67a13205463a413e740e541e742903e3f89af5a53ad3b