Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    138s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    05/06/2024, 12:45

General

  • Target

    983299702cf8040a62599a3941b8770f_JaffaCakes118.exe

  • Size

    3.0MB

  • MD5

    983299702cf8040a62599a3941b8770f

  • SHA1

    85a3d17b7599e7647d16db33972f356c84fc7ac1

  • SHA256

    1021a9bce2425cafad43435b174f0fab6f915e170cc08eb6abdb05af7c2d3c07

  • SHA512

    81f5f33c4f2e5d466473c0060f2efc6bcc102bd638de1d6300a2524c645d6fd80309acdea44866e5c6757fdd9795c7bfa3ae8bf65a7a8e66c5829c888561de02

  • SSDEEP

    98304:PaQ8XW1S2kZ1a+0dGCs7k3/cRLvOGZN209frmPdc8/Y:CQ8XiycdC7k3/8LOGZldmPdf/

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 31 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 27 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\983299702cf8040a62599a3941b8770f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\983299702cf8040a62599a3941b8770f_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1148
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.dxzt.net
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1084
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1084 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e951c611c9e79cc371402d836a52cab5

    SHA1

    c6625ab39d999a1a9d0cf9ef33cc464f98729521

    SHA256

    1b94da0e35e473f2444666716f44ff9f353ccaeeccc42fd2396f9d640f68b103

    SHA512

    8ffafa41baeb755d1dc9fa8fe2c67e476e2e685f8d27abe2dc008621590dca7bff3e2eff5026478f9337c77c238e59c96ae6c5c6211145c2432db4047e8d32da

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    295e3f295e6a677389a570461e73b29d

    SHA1

    c4b138cf041bb03b9ca991e9d12add72b9fec791

    SHA256

    8b85e3657e44fcc7aed7361fe353726cea96c3e5f99ec2e82628bbaf21c0d252

    SHA512

    02eb4d23730e2dce51222b4b7331888664774d4468651af4d0689f7c1113b07935858bed3f1a1081e4f964f5770c29fb132ecaa20bfbbd4cecad722ae9faa3d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9160905dff1968d07cdc63fd110a70b6

    SHA1

    3bebda1e5e5f5c01c26bbe17d926eb88210365e6

    SHA256

    91268a3be378221ac384de54c57f19d046be46523730f44806d43bc9ffcb3550

    SHA512

    04731e4af09ee58fb03da38f9f28486c6e57c965be4f9298413a8fd4d422360fbd593c3ad430742df0226448e32e245c7739d49ab994d8d82cb14964cc1b903a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    332eed8fcf16e93cd6fb0f1ea66273af

    SHA1

    4223e8b6a583b36455c5e89c3d1d69ac0707dd94

    SHA256

    af1abfcf450e0471f2a1742eed12268e869beabbc1d07da1315af1e4cd419cfb

    SHA512

    d1cfab7bc629c11cda3265419f148e29f7e2097ecbbeaa924f2e87eeb80971a36d8ea9e417d28d29962ea51fb28a65599d7ac667cd8f0ea322f0b5e677bede88

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c13aae8cc0fe314a6bdd8d84207a3158

    SHA1

    1f579feacb592975402c0ec618e1d93b14f99cf7

    SHA256

    8b8a33e05a12b3d806211253858a495d53591b216771c5080f0c5bf3ca11582e

    SHA512

    64195a24485e811471d0b384ff06274eafa100cb5b9aae300be8d4bb82382b3e65b6930a5152d92551f7e45c6b0643df67ab4c97dbbaaac84eabc3fa3e8141a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    94eac250a9a30060b6774b283c04fae7

    SHA1

    04b54a10727616cee2bd853c6f53ac1504df96fb

    SHA256

    65007f53c359ec97febb3478ec9ae0a20b4e28323dc68fdc3a376c191b81b92c

    SHA512

    39f928e1f4ddaf6d9ef6c2819b5904729f051d5795d770fe6bd213bde1a4aadbf87a65a4fdc514f6ac515f319e7b018cb09d2ddd30042cbbe92578e67079a539

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d7acd8461928236a54288d8424fa3363

    SHA1

    135542c7046e7b9b310c43b53565059e318f83fb

    SHA256

    5e9220f97e31b1701eec1a2a1bf652f4d54dde39c8193c349f94da69af2067c6

    SHA512

    d05a4a05975d4a6954e5673fd4d27dc1a7b760000785c27ad2de996bea14035cfa3f2f50552d3f37b9c7c75f525ac61df6f188ccce6ddb90deb6e2ed8bfb0a04

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1d99ff8cc09bd43e943a79fb1b3164f4

    SHA1

    521c4c74519aa6b93228ec6fc6f06d4435149b3b

    SHA256

    854850fc60a37b0dcaf2e9254e7d310472adcad559eb638bdc23cde24ef17cf7

    SHA512

    4a9e8660f73a54050a2abe404838407d5f827e961d2aba36f7916f80be7845e8604757770b2c63134651af4a1cf491806afc4de8d310b9150b9704fbf4744d40

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    48becce86339615ccc62a746349063ef

    SHA1

    4caef287a4e642631f4c22419384d20986cd5419

    SHA256

    1a2c46ca9d13a93239c60b26e512c67db124113beb708b32d42aa616fe19b1f1

    SHA512

    56813e56f45c0dd4b8004a234aaa7603fcaa794412067703b3e8d8a026b4ec527d6e0d7faa4aa86cc78989f0af188bb0e61123671fc1ab7918903e48068f5fa9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ad6a5de825cab9e68ca55a3fcbf47af6

    SHA1

    fcd5a09f851b2510ad6762bd722eeb29c70cfd96

    SHA256

    597f60e3d008f245d143d2d4d56a6f5347423b0cf3ddc2f900ff7abf831bfe20

    SHA512

    693f65b43cd86bf7b0724b1e2c0d013bd315d05694712e9d54c991fbd8a8fcef522121f55386d8da0abcac2d08c21ea0d6e0f39375ad6b2d5dd4488fe5c01a23

  • C:\Users\Admin\AppData\Local\Temp\Cab23F6.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Cab24B5.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar24CA.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1148-10-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1148-56-0x0000000000400000-0x0000000000DF4000-memory.dmp

    Filesize

    10.0MB

  • memory/1148-45-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1148-42-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1148-40-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1148-39-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1148-34-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1148-32-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1148-28-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1148-26-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1148-24-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1148-23-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1148-48-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1148-20-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1148-49-0x0000000000400000-0x0000000000DF4000-memory.dmp

    Filesize

    10.0MB

  • memory/1148-46-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1148-58-0x0000000000400000-0x0000000000DF4000-memory.dmp

    Filesize

    10.0MB

  • memory/1148-63-0x0000000000400000-0x0000000000DF4000-memory.dmp

    Filesize

    10.0MB

  • memory/1148-47-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1148-4-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1148-0-0x0000000000400000-0x0000000000DF4000-memory.dmp

    Filesize

    10.0MB

  • memory/1148-12-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1148-14-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1148-16-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1148-8-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1148-30-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1148-6-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1148-18-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1148-3-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1148-2-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1148-1-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB