Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    24/06/2024, 00:18

General

  • Target

    054c8f7588e431f4bbc04f8e2499a622_JaffaCakes118.exe

  • Size

    72KB

  • MD5

    054c8f7588e431f4bbc04f8e2499a622

  • SHA1

    932c843c6ce050f22b01249242029cedd335b6ae

  • SHA256

    dadeac3eb3677bedb376f788ae5ed262bbaf92e9a2aa592a46e828ad1a8ad04e

  • SHA512

    3111c3f47c704412ee6a8b8429cb56e6b1ea773aced3833d81adc6ee24a86b651afd72ed8a2383a6baab01bbbeb585ab575a613b4328abc97965600c74d565b3

  • SSDEEP

    1536:0yZMSZFvknTePMZd4k4kJJfYRN6QcIAiryaEPYlcUTk:DZMJnTeM4cJJfq1ryaEO/k

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • NSIS installer 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\054c8f7588e431f4bbc04f8e2499a622_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\054c8f7588e431f4bbc04f8e2499a622_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2100
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2672
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://bbs.yxdown.com
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2756
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://bbs.yxdown.com
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2628
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2628 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    04ac2aff85007ef28aea58176a0e7315

    SHA1

    a126f9eb8d4bbd0a54caa5cac44a2ec88cfa6b0c

    SHA256

    af598aefbb9749abd239a00eb5e929fbdb124f12101dab10e96bd10fc9ac8fc8

    SHA512

    dccce5c2dffa36b16e93f7be7ce2f51185a5e77649cbd4702970b83215b5a25fa6fe25e983a2a068e785d663442936ba64412f828eb93c6c0101fa30cbb27eae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    14d422534d5f7f743cd50f67a46d0230

    SHA1

    e27b9aac51973386a76d97243d64a2b1f7a0fc05

    SHA256

    6a0a486200659270ae5bd7074b8042f1be714e437dfe78fb158bd04e7cfea50b

    SHA512

    a85686ceb2e85885877fd73289f723d4a8d964532a956bb046a38c063efbb3c7e076ae9d352dc4962e0b0332e250c476e5948a4792fbba8c4ade71ed770a82dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b438dca4736d55797407c6dfd192b177

    SHA1

    1cd22896962592354093430ff93fcd05b3f06ac9

    SHA256

    4972c2029c650c5a218c4ea04e3703d3467297513ec17d69ef38d4c885f7c707

    SHA512

    199f3c8477e139d1cf50489567379a537db1e3b5064bd2d2c3639ae350c414ba9b28ecdd7cf6fe2e8ee554b59a354e12c06471c57449a3e425f09c9e71581ead

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    11a63992e29f98ff892c1cc5a2a21ed7

    SHA1

    71d607dde16a3b1923fd02bfc049de64665d9156

    SHA256

    8faaab5487060ee71ea5b3f1b59e988437df03c5683945f4656925d0b8f6e896

    SHA512

    e0f01a61b8c7e4a9f325fba417e3878e33a0f7c9b2dc54f27765624f1caa688c168ecc70a0d8e5e615cd537cefb7b0d549c5b0d1b33e936f91a17b596004c652

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ebf7c8d46c587a37a09493b58d8194d6

    SHA1

    f3ea0dc9edb7a4bcc27e9b3663d8cb249b4b9bd5

    SHA256

    7caf6d40b33263263c73054a68862c8af2d56d79938d930f6c329bc5dfe0d35c

    SHA512

    51c0612b4ccbd537d0e2f1f4198b845f7086083f5fb9f7830c9249a5c6c8e6c4da7172d5e6a5893dcd3817a413c601b154c4c0d9696c9801b066c36270bcc5f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9f35a878f75d8d5574b9d4d97581cf0d

    SHA1

    57806d8cc690c7f265112e30ef545bef6b86e78d

    SHA256

    42fa1343dfe387466d28baef7cb805ba4874410e19218f50021772b5ac923e35

    SHA512

    c371bc0e428439e19071314209c1993192c0153ffe9a29fca22f210e21caf9e35a5ff7649364e7590f1d43ab4dea8cdebf6bc17812ef536ea7627a1a481eaddb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c791da44fa1fce1bc72199c91a60aef9

    SHA1

    b89325fa8767a2d5c2f5be9ff52054d05c36e30c

    SHA256

    0ead5217f9b90667905b2c7324082495d772d395b0739eb468c1c6dbbe438651

    SHA512

    7e85ecaa5ed89ba76307aadcb9ad16fcf56272aaf76ce20985381d582a831f055f91d9bd80845e7bea8211fc5e79aadc806f280457e4977d3c6ce974564212cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9cf31a0aaa45c9bc7a547b9419fa7efe

    SHA1

    e8751fcff4a493fd9f480cfee75da30d27451fd7

    SHA256

    0edf03cdcae47bab168c6f56fe6824df23eedc58118eed2c34d979d9d0c285fe

    SHA512

    16340818e91017b2d11a3e2d2f79012d953a1aebf72790a04fec56800fd42c472e75ad34cb1fe1c47eb2ae0a8945423e03a70da1ef4fd44c67cefaea224160ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    280da99504c4f483ae0097a1b185d0ab

    SHA1

    598943e8351efba763233f77f7cfd1b296ab9b5a

    SHA256

    4e2de030ad47b93021db27f2f1eee999896fcffa97ac9d734569e4f79793f66f

    SHA512

    04f37c2ca3848414e6f5cd7f075d3615c623d3ba5710822dfaac2c8feabada091e65a6426331838bfcff6d71847f55fb5516586c7c7cc15685b8924868ad2bff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a8e95bc08a014c2ca59ec7593fc5c745

    SHA1

    b9f4538c13a79485669cfb03656fb89935f51c6a

    SHA256

    f4c86ad797db0aa91eb132fdd6befd729df7d8b2f9e4e72fd1cde4f0e94efe17

    SHA512

    df7767a4af257bce67fcb81094a88b4a62b77e6d8c6b7799e55af31913710429ea66b503f1fefc4c353d9327f2ecc7c0c143f0ceffa1f847f591df0f48819ea6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    82f38ce1a46edebd50869f52c02c7a3b

    SHA1

    cf427a414c8f0111b4dd23ce808a19a6d7ed7ac9

    SHA256

    2a68605886a94ccfddf63e169e230db6cbcbe67ce1c43a3160c0aaccb028422b

    SHA512

    b9d3ffe82ca8cb429c43cafe5c800d81ce9b1765e71edef91b2ae8661c43f3069e8943f6d0fa78de6d4fe81c4afceaada4fdfbd7ea870f7f728c03c462f1b326

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    07ca521c4b9fa7427cf2a063abd491aa

    SHA1

    83c8ff5f90068105f86ed2a9e22344108548f01f

    SHA256

    132256f4171e2c2395a24830e32e26444737ce1640457459a943bd048302b733

    SHA512

    af7ec1acf62414f8e9be2169cfe5e9da85987776c4824f9e9393633cd47dd6d33ea5ff53feadd26b64f80977766b8df0f03b8e7358e66e05e6d3feafb3d3e503

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f35683fc62e1e66bfdd4d4f5cdb746a5

    SHA1

    44f166357fb7de7cb5a215434d63f07414c1b888

    SHA256

    aedc991144b05c91c86a040b36a139881127828f7f4d58542517aab717b90b88

    SHA512

    e2d71db6284a07d15e7f1d89aef48311c3cf9bc19a624cac11ddce77de9b79dea5c228813bca8cc9f11e4c2acc35fa30858134879639a6274259242c1a8ab7a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c53d3c142a8a03b8464bbb42a925304d

    SHA1

    3287e14c197d1ad5d243a43f3d9fdf3f639895f5

    SHA256

    f6dc01623b60c65012a0be24f95a87a570787d4efe99046c260f33b0e3441881

    SHA512

    fc634f5d625c56d515e5832eb4180268cf90371574230d92aa544ccf22fc86799da96669a37acfc6bfb0e1865e5f889fc10bbe2da1e2fe11cae9c158c6f92bce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8e0bce92d97e755dda1161ae1f86da7e

    SHA1

    33d46436e7f7c94d9820714e4bafc6ae91b10758

    SHA256

    6776c39f10eecae327c2cfea96eb34ef9dbecb7925bb89f3218f732674c546b0

    SHA512

    0e65cadc8eef466b59ed329879c6ef009ce9818f1484ddb6605b9dc78aede031fb5464307b86013ddbc2bf0070fc842d0a133e96bb5aadd8635422488390bcaa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    100ce283eae5335b393369ac601a51ad

    SHA1

    cffaff4ff795dadafc676809356e13c0ff40b995

    SHA256

    befe109241ba7fde96fe0ee8e6012b3c8b8fcea50e48c3abe2c32f280d8694d6

    SHA512

    724b79e7a03cbbbf1ff4f2190f3b1c1077a1df9b4933e75ac1334647d3367abb523d21b2e586ce7ddf214299f36ac0fd41c4fe2249bf3f1cbee1c6e50a5210e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2824dea8dae528b7c7a9301fb0cbabad

    SHA1

    63fbbfad34089b45b64608c65f79a951397ce54f

    SHA256

    63f39857a68281b2201f07bd2508eef91cad2deccd4d0be95af65e9ca376bbee

    SHA512

    e50d1a08ba3fe32e09e12b8ad44a442b8d000de92df33b7e07442101f4c9fa5a3395360d50222ccb57b1cedd100cd129e70f877884161d4b38c6384fd64201e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1abf93fd2c9342953648fabf65d0a387

    SHA1

    8d2772b3b9a96fcaeb9278991691c50b94cee587

    SHA256

    dc6ba3abad4d7e8dc8b448789d1ce1aff93c6e86da9475a77081b1a14cb28443

    SHA512

    ae062fe1c845b585463de30ca376b4d84ac9a7a26eaa10cec4ebf18f9279acb4fe93646671bdcd87a3e63e9d7df794aa982d9e71feedbb426e0292d7a9e162dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    81cbb3cbe98cd368732d6843bd3956ae

    SHA1

    cada863ab1a5cfb514a70407236b1614c1d8890b

    SHA256

    23cdae05679733db03fcb81d05d37bc224e53af743388b1524a649db13575567

    SHA512

    cbefc2af57fc0b7ff770d14b4b5045242df09c736577b40fe583ff8ed22e0b98316eae4b3fc6ca844c73124074a23ba41bf3508b57cc8b2437ba6087351c16d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4b092e4e684f6cbdb05ca90e56508650

    SHA1

    4154a817b6d397c5a5850ceb16909617fa197f5f

    SHA256

    cd36b272f706d1d352c355b83b10786fb0f9d500d93c42d952c0e3407906d5a8

    SHA512

    ed0d41df5adb2bc99b65f99a316acd304d7cda4439d0e651aabf3b52b93991578261f59825dbc8dc093a15bb67091e83b1601cbc724491d9a391cd519ee357d1

  • C:\Users\Admin\AppData\Local\Temp\CabA6BD.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarA75D.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

    Filesize

    72KB

    MD5

    054c8f7588e431f4bbc04f8e2499a622

    SHA1

    932c843c6ce050f22b01249242029cedd335b6ae

    SHA256

    dadeac3eb3677bedb376f788ae5ed262bbaf92e9a2aa592a46e828ad1a8ad04e

    SHA512

    3111c3f47c704412ee6a8b8429cb56e6b1ea773aced3833d81adc6ee24a86b651afd72ed8a2383a6baab01bbbeb585ab575a613b4328abc97965600c74d565b3