Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    17/05/2024, 18:42

General

  • Target

    50ecc35a543a683d1c25ee62100b21c2_JaffaCakes118.exe

  • Size

    413KB

  • MD5

    50ecc35a543a683d1c25ee62100b21c2

  • SHA1

    04e369b119f881627ba89d3b453164b77051ee76

  • SHA256

    518601dff51642f794f17841a749a9de071f19e5752ce7e0c35cad84cd103e92

  • SHA512

    8c17a8ee05a298c4eb18ee4d914da35d12ffb7493300e2005f8c91ba81f886707b7eac8a12400cec058ca64bdf3a0a9bca4c5eacce490a06b7a8a0443419e203

  • SSDEEP

    6144:XOPjvGIQQSqNp0xM6IIx5mkETtTnL3cwSoDwsSHjjM9bwHJIX+0qdtN11:wyIQQfNpq7f0Hcw4MR2DHtNf

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 42 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\50ecc35a543a683d1c25ee62100b21c2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\50ecc35a543a683d1c25ee62100b21c2_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1824
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://120.55.138.124/NTBlY2MzNWE1NDNhNjgzZDFjMjVlZTYyMTAwYjIxYzJfSmFmZmFDYWtlczExOC5leGU=/40.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1412
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1412 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:996

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9085eae2d60c480882408caf1cb6299e

    SHA1

    1258f91cb0f1469e832a98c63f9b5e29f1d8b2fe

    SHA256

    f5988cef1b3cf437b6b00102ababc5d7f127f3dd51bc9147756fa0b84f5fb4aa

    SHA512

    2be2913ea839ffb6cbbaf299930227c00017bdb17155d496a0a95c7fdf5909d10796eceef7981f419c4d7f1ded46c47105f850e1c658969960e66024b03109e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3a562ac77885861835fa9ba6ef0163d8

    SHA1

    652ae309a04c33f1d2dc35c2bd5dbb8c7c924055

    SHA256

    ef16810f042d42945555b09dab6b1ab5d3af0cf89fa1344c1ad5211cb7fe4cf5

    SHA512

    0cd1ad51391009877fe919593e57aa464b2dbeecf0aa3f82134ad5dda5d88f9ed076bf974d29aacb45110b5e9818ca6747ed73a26ea842a74f41f58b510a23fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3ab2571a82d345f6d3023261b411b06f

    SHA1

    f074fc26526a3d5f80b755fc272b11db6ecdbf77

    SHA256

    f1900c2ed5f7d3feae17c2d1b2406579282c1ccd7dbd50fe34bedf02acb4c0d8

    SHA512

    110a1567cd3ee6c290d3ee3f7275bd5662aca8237debe12573d3d99df498926914a4b57047884112bab555fdf37c5e1b8e354b4d0a2cfd088af554e4e1aa9944

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a57916fae8bbdbd1b9a5a375846b743d

    SHA1

    6c11da627f18ad49803168c6b54e97fc04584ffd

    SHA256

    5e9eb95bdd4051eb403bf050e2c43bbe56e1ba5d06b46167ed8b6dc926fd8e82

    SHA512

    cbc7b4e0f2107109615ff1b61885ab6edcb701f831d5319ffc18f947c1de6abefdf5783ad12b6ec510fc3b3e2b3a5b88a0f620d92cc7a3574a1759b1c4e3373d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    97e6aca22ba78fcb43b4f7cb30b3e0c9

    SHA1

    b3e4697c8e982f04f33388405d44a9d93532b6f8

    SHA256

    845ed3b3b7561539c0ffe20d9e0013ec518ace2e8b2832b193686517bde9cb34

    SHA512

    68b6f235bc1e4591dafb7bda3ce8877f8a49aa8503dc7df7a4be04f2b02a881f5ecca7c96c45e8838067f1aadb6733bc0def7c506434ad10af103c566d0b4fa8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    96375a9d37786c1ee6c9a76a8f1cb8bb

    SHA1

    575955f07db597ba1ffe5d2364317039607b048c

    SHA256

    bd9009e9cc8611ac5d73039e09270c4dc00812993f1900d53db5e37afffabb86

    SHA512

    015f75f06a015c9eb98f93d812578bcdc64e5f6bc2a01bbc31b3359c1adc3ba7bf8e20700fe51a45a2c2d4c4efabaef539606fb033fda00f049007e74857b2e2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    50b2212bdab867e87a7cce14a488657a

    SHA1

    2e02e6605bed6ceb9198ca0cd4973fe2bf2f3740

    SHA256

    eb943c8595a4b4a80c9ca392d374528edcf6c9e7840455d643530cb79025e230

    SHA512

    707923ae9abdfb831c71ab4ebd43b9b3a72e37492fa338c8b43d38190f12c51288425b6a0231d63a0cde1474e7e6ff991797b8619bef2829f915b7d074c2e041

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    11f3d7bf4e3aa2f6dc363b44430470f4

    SHA1

    ba26a15b5345b4f4efde27c4e79ae4c5cb3fc140

    SHA256

    552d014675f5a7839a8b8f480807d7fb13e06a7a40f286f897dec3dc91c57aef

    SHA512

    2bad3d03d2f6aadce11ff08171f919a8ab14debb97158992f7b3a8230eccf2208d4b5b0cc80851a0a68f339530fca5a157651bb05e8da3aea8866a87ab59d0dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9c3710f997f7b9c64f7e39fbc1c6e4d0

    SHA1

    fe0c3e049eb75d59602a2337be58429793d63eee

    SHA256

    2c2462c57850b9415104b45959436aca0ff78b25ecc88a668360e96dfc0c99d6

    SHA512

    8867313ddfbc89b14f05997fc28341a8f383eacd26d27f7274bb9c4c96c5b447cdd0597f1f96abfb056b7335070d95937f4f87086d4d56d3979b62da076d7150

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0b1439469600f5d88f99459893d484f2

    SHA1

    2b871d66216af1121e41f40dda02406589a7d640

    SHA256

    113467567e49bb8d4a9273d65acb507b98dd2f6dddffd5184ff781cbedcf62ec

    SHA512

    715242269585c806a25121a1a78b6464f800fa562c19189b4c7a9d7b2238886b06c9e3ffa04d65aa2fe485afe0f4bc694b04394b1ab2f973b8d677ec3f57fe9c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4504a65b32b15539768005e886b258c1

    SHA1

    4d7db5917100e1bcd8f8c75e2535da48671b694f

    SHA256

    bb5f3d60e5a350e17864fb52f10b47efd19a4b3ea2c5b615400ec453b6a92183

    SHA512

    1d7b2816a61eb890d36fd5536cf02b703b522a62bcb169997b026cc586b62071a3e383ed118647ba77cbf0fdc4f111e19cd5f6c677c2b373b99dbb4028e25561

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bc5b33fc11e14528c4440451ba8da670

    SHA1

    06d0906fd16408f074b04927096f3a1de5144357

    SHA256

    4bf3929be439a56f17e07bd7af26709bab87c0a5113e23feb7f492ea63dbe76f

    SHA512

    018f15a3f7a5ee02a5165cc253a7208589963e350d708429fee9536acab9a3b1e787f93359e599edf2eba97befa13963d98983281f071d258b20edb5fb52d850

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3a6b613cf8e31f6326f79498ec2aeafa

    SHA1

    da3999ae3562579c201e93aebb7e6459ac1fe3c2

    SHA256

    e723a4b7f4187a14f051623254590f0b9a2a25d00563df2adb6c632e756963bf

    SHA512

    45f980b7a2212cdd8d656bbc4875dc3aee1ffce044b1e78d75e853e55a61f06694fb911bb51f2d0b99cbaae4ac7bcbbb4ae8b979e3aade77cac5c1ab127c3ee5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c249a38229d9739c8d08a7fae1c8cd1a

    SHA1

    8bb42bb086ca43ebc3ae125ed052156d752bb33f

    SHA256

    29af04c63f8bba4b4705c9aa1fa45d30c094da187954f4a9ca6f7c8f532fb867

    SHA512

    86642c4124f9d0ba10dbee058beec63a03e265c8e0e63b5ce062a11500dea0f7c74efc0e100ef65893074ae76ffa68ebff074334b37405594afd47e1dfbd7951

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cdf9360205ce785ff3160b2102a0e6df

    SHA1

    cb6915836cc6c7920dabc5a0a2fbaf3190749e58

    SHA256

    141778219947ba5616f6dd0cf79690aa8c902b53c5063f9cb7b878726b247aa0

    SHA512

    571db0f3bc27f5b4b4ecc3d25b8f458a9a6459889406e8b6eb01818ce7b204a02b1dbf55ed033a20efcc58c2861b088c1063e2ead7413aa8ceec1bb80e3f7481

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    abee96c4586343de3c2fc5a2d9ec1536

    SHA1

    7c903c039bb0d0081faccefc800e6e854b00bb76

    SHA256

    d75b0f71870b1defa2281e925037b6f72fd1e703ce7d2b76482218a31de5e9be

    SHA512

    c61e0bab566929afd9fcf0f73a5255f159ec2a06328dc479ae4676128f40a49e1b26716229d869ebb1562e920bab72ec92374015f039ebd3b378b4ed43166dfd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    65dc22a51082dba2b29f3e69ca1a8680

    SHA1

    b4d28dd79dcf389bdc9a62561c0f6b0157ebb9bf

    SHA256

    673d910d53e5d8b208511094e3e9e356ebdd928ad1d141568d58929989882dd8

    SHA512

    7ecc0da0c247f609be577f6144b0cc47367742a89ef504b8b597e76672106fed06db93d08c764f194fc2004f9bf83d13d30de01982954bd8054b1d27cdd83602

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b4acaf6adb7c01f1fb49f9805123411e

    SHA1

    a342b7d1367cde39c82fe74a327b7d8a2c3a4ef5

    SHA256

    c602814d55648940e69569aceb69346fb9358f94f87e2afd34654bae464d2a57

    SHA512

    46a71880f7bcd1b64c8207ae6119730fddee0ae05052345d7edd04620471d2fb8bfb93280efbcfdf1a98afbd77f5f4875c353dd7b7b72f23865ccf06c5589455

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9b858c00da5c277dcaa890659e499206

    SHA1

    85b4725fb153a6dfe8ca859ba1e628f3d106e58e

    SHA256

    7061b94a7be2937ba175b51c0bb87d4c34b0c29c2c495750300ebcabf5cfb8d0

    SHA512

    9ee0cc9359e63e30a2e6fcf1b656eb7bd493a070e12037d1d3de891c2b064829f0f04c17b0c93b5bddcadb609e8423d4e9ff7586b75d29724858ce513125fb9c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    189279f2498c5e1613bde93026ce0b1c

    SHA1

    0104bdb6de55f8b44a5078dc432f2441eabd975d

    SHA256

    e81a6c2de03bfb7a428a20c339ee30506905106048ddad89c204512cdf399769

    SHA512

    86a0308a3505e1930a88257c3a1f91f41722fde8b9d7b90e37c9c1c970c9aa66d098b8c6f565270a0e2225d05e8ef5b9b0d9f837a1c557942869bd66b3a99e17

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d6ba82ca330f22549b5cca5a5cb9c177

    SHA1

    a274ef457a254c504faacd9e311c4b47c2950984

    SHA256

    f1499589175dcddd1529de65c025a895b818a08518cf934d0d8b892736938e46

    SHA512

    8cf32e7134574a24acff2c97a38cbdb6fd70ce4e576d241c6248bdbb40c08e7156e45aebd2a94d940957ad2ecd40e4c5886c5727663363d62847badcdc6a61a1

  • C:\Users\Admin\AppData\Local\Temp\Cab2A00.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar2A70.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Local\Temp\nso5AE.tmp\2.gif

    Filesize

    135KB

    MD5

    e1f71a0a0c96a1b46e1bb8ccdbc7dcff

    SHA1

    36d11bad14a80944eaa61be8083d92cedde50c01

    SHA256

    8351f6b374d3c05958842d602c401b2b7eb4f08cfc0a952279eb9c88a0218ec7

    SHA512

    23f7dd6645cf0857dc612cd2dc0502f8d1beedd848d8f06dd8f94cd74e4730b7552c563d98d77d1e3308405bfc490d5c2b3c05ea42d185d583615f99f2640fc1

  • \Users\Admin\AppData\Local\Temp\nso5AE.tmp\Base64.dll

    Filesize

    4KB

    MD5

    f0e3845fefd227d7f1101850410ec849

    SHA1

    3067203fafd4237be0c186ddab7029dfcbdfb53e

    SHA256

    7c688940e73022bf526f07cc922a631a1b1db78a19439af6bafbff2a3b46d554

    SHA512

    584ae5a0d1c1639ba4e2187d0c8a0ac7e54c0be0a266029c4689d81c0c64a7f80e7d918da0df5c6344f9f7a114f30d8f2feda253b29e813bae086604731a3d8a

  • \Users\Admin\AppData\Local\Temp\nso5AE.tmp\NSISdl.dll

    Filesize

    14KB

    MD5

    254f13dfd61c5b7d2119eb2550491e1d

    SHA1

    5083f6804ee3475f3698ab9e68611b0128e22fd6

    SHA256

    fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28

    SHA512

    fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7

  • \Users\Admin\AppData\Local\Temp\nso5AE.tmp\System.dll

    Filesize

    11KB

    MD5

    00a0194c20ee912257df53bfe258ee4a

    SHA1

    d7b4e319bc5119024690dc8230b9cc919b1b86b2

    SHA256

    dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

    SHA512

    3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

  • \Users\Admin\AppData\Local\Temp\nso5AE.tmp\ZipDLL.dll

    Filesize

    163KB

    MD5

    2dc35ddcabcb2b24919b9afae4ec3091

    SHA1

    9eeed33c3abc656353a7ebd1c66af38cccadd939

    SHA256

    6bbeb39747f1526752980d4dbec2fe2c7347f3cc983a79c92561b92fe472e7a1

    SHA512

    0ccac336924f684da1f73db2dd230a0c932c5b4115ae1fa0e708b9db5e39d2a07dc54dac8d95881a42069cbb2c2886e880cdad715deda83c0de38757a0f6a901

  • memory/1824-22-0x00000000004A0000-0x00000000004CD000-memory.dmp

    Filesize

    180KB