Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20/06/2024, 13:44

General

  • Target

    06883457db24dd59994c4ccfde029d91_JaffaCakes118.exe

  • Size

    66KB

  • MD5

    06883457db24dd59994c4ccfde029d91

  • SHA1

    41386617df2b977d37aa143eae078dad136a29d7

  • SHA256

    b37550fe1d620fd35f2600ccc515a6ace64b51bd7c4219e8b81cadaf315bb326

  • SHA512

    7547874169a36a1236e5ec138ed66316a0574b787b99f2d18a59a7cdb0a5986fb21b7e964f3d01020e9382dfa283f7ae30ae046cf88f827784e9ebaca8769842

  • SSDEEP

    768:OC+q5QIwbDzn2LY1J3h6HEy4v9/WbES2mD+ysLSxS0v+o4BtBwAbBlHSuJKqyLok:J+q5QJ6szhJyCLSKUCXHTJKqOwK

Score
1/10

Malware Config

Signatures

  • Modifies system certificate store 2 TTPs 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06883457db24dd59994c4ccfde029d91_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\06883457db24dd59994c4ccfde029d91_JaffaCakes118.exe"
    1⤵
    • Modifies system certificate store
    PID:1812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    108b7e4a717ea62d8de8ca9d8b64b7c7

    SHA1

    ebb2500f9635c6914394422d2524c0700f7deea4

    SHA256

    d923a2255f9a6207f8615fe0d649128fd7a271c51853d70cff50ff9f68d72d7e

    SHA512

    f2260352681b685c2b95c850e286941775fd9c77dc7ff5e1bd37f98dbf6cdc462b65e6331eb0babca08e39a8214f7a28a623501d7a4a5d2072d6960327e5be47

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    b51701a76e83a97c9bef0c61d804cd7f

    SHA1

    161cacc9cdf8cfe8922d49c49d240c0bf84b4299

    SHA256

    df78762a7ae1d886787d9c0ce35fc2e52902ecb122d5ada6a9b9b8e6e4576e4e

    SHA512

    f4b6e72398a44210dde9e1e479a6f2360447894efc05291bea8e795d4b68a516d1f13b2a9a9bdd7b57289d4c2f2f97ede871d4ce38a26168cc403618a2f3f888

  • C:\Users\Admin\AppData\Local\Temp\Cab2D59.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar2E5A.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1812-1456-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1812-1015-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1812-563-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1812-2209-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1812-2738-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1812-3361-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1812-7786-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1812-8219-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB