Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11/05/2024, 13:14

General

  • Target

    34c1cc6b629a26f1f093b3924138c5c1_JaffaCakes118.exe

  • Size

    1.3MB

  • MD5

    34c1cc6b629a26f1f093b3924138c5c1

  • SHA1

    6a53267265142503e50cdfd17d7bd085dbbcbf85

  • SHA256

    d595dc6dda67b384760d21ff0a69be5c3a5c2c4ed7a3fa031ec3672fc40ba387

  • SHA512

    bbe228f6f4a9ceea5ff9c1f883a5d6e33c967557db40648bf241834829e88c11d118abeaa5a7e8e84193f265043cc199795a35bf18079aa114d282541882cfa2

  • SSDEEP

    12288:Ch/pCHxW4pbAOeeeZeeeeEhMEr6CX4zistf:U/eDNAuaE6tie

Score
6/10

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\34c1cc6b629a26f1f093b3924138c5c1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\34c1cc6b629a26f1f093b3924138c5c1_JaffaCakes118.exe"
    1⤵
    • Checks whether UAC is enabled
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2856
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.bigfishgames.com/download-games/1154/treasuresofthedeep/download.html?afcode=af628d3a27a2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1296
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1296 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    28a83c36043eb5919eb0654336e15482

    SHA1

    1b8fdeefa22d435bf3f3ae07d8b5d1fab7b759b2

    SHA256

    e34aab2b2a98a57454f99dd9f027794dc4f18111002feba7cfc416d8afa174fc

    SHA512

    301afd6f58c7e3dcec1b465a94be25ac645df6e7a7121e33f104996200cd3c03c69a164529c011f2c32e49095079049cc4227df4cc72ebd565810072a4abb5fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0f861354d0f0310f21648381672aff46

    SHA1

    5a2274fdaeefca3dfc8f29cc1dde72f5641db7b6

    SHA256

    3d90e7232b6945de97de2194d9b214b9c22501602f0e56f8b8baefa2749a4d18

    SHA512

    2681a8fa082af17c27d6407e9bff12278dc090076a5e2502c0bafc56e4bf88a0eff63aeca19292223d6863129b608770c76f45a2d5f587f6b9ac48e636f0554e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d74c3bd7e51159568e8d52914b0e90f8

    SHA1

    f4ce28a10cbdfc89e6f6d0550d1c4db649cf4000

    SHA256

    385235e977b6692c5f6f6a1cb8e0743f5bc0c27dcb16b0cb2e65357606848b75

    SHA512

    7b59e616776f764f60a6d444c8142b9113a7ff11747bf3411d31375857c9685728990abe7a92a9da0df118c9f7d5e41a9c61819323da4d8dc69a203a45c85308

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    93fb6d74084fa4f620c1350cffab6c3f

    SHA1

    9e2472f838aed458ce5f8f706b71610fc3f86030

    SHA256

    0d1be7656b0eb5e36ae2ffeee49bc53a52fa2f4990eb2de0e2aa4b401cf37436

    SHA512

    90fd83a3a3e537df28fae32410ac0d05c89d284cda6ef1199b1e6c3d08df2c5aaa2d92261ca5e34836a439ed32a3f22ccc1e6c3ceacf513eda958f1c0074e950

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    01f739d0a42c363c3724a4eec4f3173f

    SHA1

    f0f94a7334901d247571a1127490dc44ab3d4389

    SHA256

    1159ad0932ab66fddfb6d130bcdd8e718a26975f4fa1b1cf99561b88882a5a9d

    SHA512

    b1b4d15b39abbf3781375457ae1ea78d2b4b7aa7945d25efd777acc6e128dd614d067b3d52d6ddbc021f195da49a78948f8dcc2502512cb03286fb0ee679597d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    32bf7835eba88cf964900f662741a17f

    SHA1

    80d006c3fffb2220526e546e684d41b5e370f57f

    SHA256

    0595360d98d4aab557245b2b22d8cf35405b74112901426d26c8ec2584635cce

    SHA512

    020f17e354892bc2b5ca16209ce2f5dd313aec314edb70a92f53ebfc00d3b809fdd0b7b9b3080b07e8b63bb32237e2b2b839b73dba3a7a7acc8dbf333fa0b2a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d7d97eb57a622a6b4d9986abef5c95c6

    SHA1

    bcf0615369b6f4f45b31d02cfd7f1ca2f3171122

    SHA256

    6821d2b7ed06fa89141516f167e974a1533ac44a938fba6f584f3baab6894fb6

    SHA512

    2c934d1f1debb65f30f4d5f71574cb375df8518226253185731e8ea1eea07727c54a5682891a7e254e696de99d8dc7b17eb8fef26569a728ef928989d3bf0945

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0dec0a72be73c3c1b5ab2e81a625f982

    SHA1

    8d5d89119552a2c34cb4682cf7f7169863688caf

    SHA256

    46bdbc387739383b0a29471efe04b1fa6877fed357014a56210abeb6f6c5acb7

    SHA512

    8720288785a56d92a45a90db08f8798783fc3278517dc5e63da4658f6ccfc0d4fc40433b8a22a4bf7de409618bf24a47dd28851305947c6801a44e707b412474

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e6ef23bbb0c51c3aea3cb705d8a78cb3

    SHA1

    d9df7e3256f72e512fe4a4ab229370c023e001ee

    SHA256

    f557ac1d967937fca09284ffd678e0532eebad58aa78a4584d71348f8b1f4685

    SHA512

    e5be02d1ba760db5c0bf97c82cbc7d1852d926aea304a37025aaa7ae8170201101ea73a97565cbccab9a863aceddb36d7f623aef58a20ab6e1faeb7a28815edf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b4a02c0acff2623e54a62a116c18b274

    SHA1

    7e046048fe8f4655dd55451623587c46ae6db2ed

    SHA256

    7449410435a3201cf57fdf9c4fcadff21d4f5ba38348a4d0ac2c26b9f118dc36

    SHA512

    283a55a608136cf0cfce5eec8ae6e82809ff484ed71cf6ef5f69771b5189841a52c981ff4ec8f4cb1988dfb9188c006b4b6bd3fd5bd7957d8c108fefad1f0a5a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    da1ff9a56461a9338329083c4b58ca1e

    SHA1

    c1f80e790ae7ec86c0f64876e2ca765ee19d7547

    SHA256

    daa8c9aae73f58ecf0b414ba0dd69eef346249eec13e12187e5472b1b1c30893

    SHA512

    dad9c1e29d43a797dbe193799b1829742857cb80a2cf1ea80688ec710d39c65e6fd782ea72e5bcde96f7f239ab96703e8cfaf5635be5241f5c604843d0c01530

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4c8154951123f7e941f80cb052dce935

    SHA1

    e40ea3247ab67c6d34d9e5372f2f08335ecc0f3b

    SHA256

    55c28d0f2fa8f70a4420828344f496e8b6545de0adfb31fda5e23b96b6d00b2f

    SHA512

    416e35b747527e104b80ecd530e83a271bcdc912f26d541a02aa6c7b85ddc9c07e66b525efbda7b355aa7cb4f9c523f658a2aa64348f050b52ea2eb074ee1251

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4d8be60a92585190108a4e00827ec591

    SHA1

    95c792048f966bdba2b5fc845fb6411dac8f57a0

    SHA256

    47d45d3af38d611b59cd0b996a7aeaa3127faba630ac5138e691161038aac684

    SHA512

    e7bfec5eb60e27532b7e896ac65c75c9f66fd9c880b3d129a3dbbccab8d8bcdbf480c0795c9f8ba692b64f8ece376d151597e869987a7719010fba7efdcf53ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    52aad8e02075753e6ec4750e23860b86

    SHA1

    47452d894803db48b9160c7e941af59343947de2

    SHA256

    b5778b7a1d2bee8a13193274e9b0a247cd63970ccae6fb229ceeeb652c06de05

    SHA512

    078ea195efb98475ca487d8059bd99186077b167548716c86fdf8954c03325e16d0f9abdee648f804082a4e53b83d6994104371c708c5170f6b92704122d5fb5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c6e7b3b6f83966ea69aa93e807ad4ef8

    SHA1

    9da380ad0472b711e054cabe72fdd4344b7d8cbd

    SHA256

    3ab98e7b41696f85d451cf2d64a89a0106d6bc5a8ccdd981f6bdb7d9df5399de

    SHA512

    801812b7c0b44b72fb80bb5b30782085b4632aebc47247af09ae2feabd696dbc6195debb29be540b7617aefd29322c0ba18ddf45728267bb6a74415b05547fda

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1eca18454de8018d602e6ab6483a1c9e

    SHA1

    667a2f421aaf38be985d308b4f8c6f90bb18e35c

    SHA256

    7217dea4788aca0f79df6013bf80732af198e78b7c395e52732d28645248b89e

    SHA512

    1a18bca629b612fa138b29150bd5d756d32a0733015049e079e856353dcf610f572b01f5c0a6c02ea468c0d0a58ec66fdd29ac3383e66a76036f77a6ce0d72a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9b7fe09e411dcd20da038abff36e1223

    SHA1

    4c4909be6a2cbf68a3689463f7b29232cf3487c8

    SHA256

    60d3386c30315527e3b1837a340dfcc818a36bf8ab653c2cbd7c2105741c445e

    SHA512

    8fd2b526a6bf9569a4765f10c366d07420b655a74b0dbe85652402f4ea0f1d566d657b3df577ec4465be0dec0b8ad5d3d342b1c47af32440eb885005b30c58a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ed30ad518975d969b3ab5de7bd83a34b

    SHA1

    ad2706466d6eea91c70d8f23289ca6823d925ae6

    SHA256

    0f9451faa952d6ad3862447999ba94ad2c35c577b73e41bdeea5ebc76bf80eef

    SHA512

    a19023b8d64683723fbd560e6c0e2a4dab7259f28ab95715d650f88ce915656822102624f06a1b2e565aa1421f9653a16a62d11adcde6fcedeff4167c0f6b847

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    62cdaf7b83f3692c568e519a23e3c096

    SHA1

    c73bd3eb4747eb995a3cf358db549b6bbe7c693a

    SHA256

    2cf2b5753a722afda7e6228bb105af4de4e47cc3693740c6d36277ffd37164d4

    SHA512

    788dae76c8d3cf4c0be95d1c986ae340f211ecbf02c204d1046d3ebd46e9ba595ed5faca8752a9933b58f9b4e1ba0fa4efa39788815c306823876efcd84aa39f

  • C:\Users\Admin\AppData\Local\Temp\Cab207E.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\FG.url

    Filesize

    192B

    MD5

    0fcf82b5a915470e8a79d3516f582a36

    SHA1

    75f81b41607905b231521243129aff3554a58db0

    SHA256

    076264d4f165cef82f0cb07f6795f1d5ffa74741a943fca42cdeac65823bcae4

    SHA512

    adf69ec56756fe672677b039cb44bb13fc3adfac569f5ea4eda4e7b35de5ebe0229c5825ca8337aa2c623a773bdf775ddd3689e9fae03a7af1f694576d954293

  • C:\Users\Admin\AppData\Local\Temp\Tar2150.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • memory/2856-0-0x0000000000400000-0x000000000055F000-memory.dmp

    Filesize

    1.4MB