Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    25/06/2024, 20:24 UTC

General

  • Target

    0f681a6ee844afe2e3b8cd8628dcea2a_JaffaCakes118.exe

  • Size

    560KB

  • MD5

    0f681a6ee844afe2e3b8cd8628dcea2a

  • SHA1

    58dfcea8c4fd1f471d7e2c99c81f33cdc65471bb

  • SHA256

    b977c8ab2ea817c3edff62ecb0d1f59c78515e0367d546ceb5330cb786472a48

  • SHA512

    5afec0a8348252e00f2022b8b206907171237b20e4003e55710a424430ae5482e3039c5bea22d77437a88045d0bf880fe3a0d36ec4792cfb7782bb84ffeabeb0

  • SSDEEP

    12288:VP6ys+NgzZhkDjhmrWvX9JdsIQyY4dR/2ao9jlhSCyPBo:JBNUfkEy/9J1XdR/2asjL

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f681a6ee844afe2e3b8cd8628dcea2a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0f681a6ee844afe2e3b8cd8628dcea2a_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://down9.tian-kong.com
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2564
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2564 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2688

Network

  • flag-us
    DNS
    down9.tian-kong.com
    IEXPLORE.EXE
    Remote address:
    8.8.8.8:53
    Request
    down9.tian-kong.com
    IN A
    Response
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls
    IEXPLORE.EXE
    747 B
    7.7kB
    9
    12
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls
    IEXPLORE.EXE
    799 B
    7.8kB
    10
    13
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls
    IEXPLORE.EXE
    779 B
    7.7kB
    9
    12
  • 8.8.8.8:53
    down9.tian-kong.com
    dns
    IEXPLORE.EXE
    65 B
    138 B
    1
    1

    DNS Request

    down9.tian-kong.com

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1264107159153a5f97881531d13e8752

    SHA1

    e1d054ce4681be0680f1f85734174dc130ec082a

    SHA256

    aea6b3f61283776e95168e2e893e4849758ea375ca91ec7afaa6576e284c8c24

    SHA512

    8a89e2d500675d7317cabc6581083f43667859dd4a89b3f1343fc9933dc1e774c90199a5f1c457324ea51d6e68be40c93836717ca35f1c4d312b111aed0764ab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0afea15e36990b5ce2d094c71cea7217

    SHA1

    ab6f11bc11c77df2b704a50513e36d1dc7967b4d

    SHA256

    a7a4e9d1980dde59d77776af1c1a3071aafaeb30e605547d192adedc335177e7

    SHA512

    e412ae3e5f53d3b369d1432cb1439a2232bb38793e351646a37c823c13513ff919a4a3e35f50a96121a39fe12e702abd34cbc9820cac5d2629edaa72d8d8bae4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f174d3603509b75cc25cc8c91217cac3

    SHA1

    d6c09617172f70319f0cd0d93b4f88669f8be34a

    SHA256

    888fe2df915c62a2724de4a0150471ad9cc35e4ea3c603181f6fcd547ce02012

    SHA512

    062806211f5cb7fd774877c668b046fbef6ff0bb1128149367c247ef2f9a02bccb15613fab76ad6c19620d0d24e7a0010887f38bbe216dd4805fa739a9d25e69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f3e7a839b559537b4d3bd6e1a6d6a4ac

    SHA1

    9e7b8a592afa52c6a128cb2e70180a677fc32fa9

    SHA256

    f816a7e84bb729852d39eb28d31b68cc5174054f6a8fc33fd023f79e006f3a11

    SHA512

    9d5cc9b28aeb03854b3451ac6f1fa7825d1e782a513bf372b0fcc156df59ac3e7cd5eec253243989122af319caf63166e47919b475b92950c4a93cd2918b5817

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b978893c92e721c8e0d888f064e1c8eb

    SHA1

    b69d9de54dbebb1c51016a71268b1d0b0c1c32ec

    SHA256

    5dc11185b5a1c76e41ee1b664e37c32eea3c2cab1a773d42acb8e86a53046b52

    SHA512

    969c168304e555531533b0e297c2461b5e50d2ec2d8632341fef6f9f5db78825a7e523adf5087a6bab5a3fd353cb9e70868c3b41e152dcf38115dd0875523cc1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    242fc6d5a1f994a08b18e5b8d2ce6281

    SHA1

    0c2c7a6c899bf21674753063efdfd2d743f183ec

    SHA256

    124ee63a6946d4f5944f8631b085f32cb611755f655451f7cd95050ab511c61c

    SHA512

    c6793461e47de3a4429975b44bdd1baa7969bfbed186c230aec24d31fa6461cb5ce18aee893ed08673cb1b053e678ee186685ab34c95be0006be138daba2da96

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    251ec8186473a81901b9f9d857684d30

    SHA1

    c5a2c86e5869d3b14511ba8a7bc1e55c50fe90a1

    SHA256

    5aec37cbf238d8c1fceeb094712136ea014389e50e12e7099a8a85064c358649

    SHA512

    030ae9e6479953c362359f4d1e392da8fbf0ab6866f472b4e586adcc2d1124da4ffb055aa08aa0e783ca81c3d8892778facf0fd1ea51c07cfeb3334a361b56a5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    423ae43159a94dfa3f42ff1b43238a5e

    SHA1

    4e62907871f282cc072e7640cbfe07c62b0d4314

    SHA256

    f00ea21c74ce105a5e5faa0b1f08922781a9803bf6a844fe58993713d245f249

    SHA512

    ffe5a1d6591f82a13c603d9ae6585d86eefb34b4a669a98c8a00b03504c8d84bf039b42381121a5997466b5601fe45ac9d8ceb5a7edaaa95fadd8f2cfadcadf0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a8ccdbae139d66d72f1cdbf2054c08f2

    SHA1

    a9c0b9c97294b6551326aa8ab6f92c81dafef71f

    SHA256

    e7657e2eff8a4c1023e7250d70f06209921d7b7ff9859f404ce4193ab5b47c1b

    SHA512

    587be747be60b3738b18a8f6db8d9bcda56555c88d20d80066b00c35fd6f1524295ad5afdae1f6fc22ff43f1d45747ab0c7493be8c2e3a39c7f369358572e1a5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2e8f0d08aaff4e98f117407321e9042a

    SHA1

    ba43809ba6f94ec34723511242eac0174c982e2d

    SHA256

    eac916755222c0cff24f8afdc2b645285df8d64e3b940c1413b1fbe7191c5581

    SHA512

    ebdf7c314c4c9a5955185d8228240f6dda7a464d70d28e3787121da40797f056c2a3fbd161858453f4288dc9c5f3cbfb83ef2488f036bc6930b14283d88f8b1c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8fce768794558900e8427b757ce73070

    SHA1

    9c68e1b267a8426aa394f8803baac35452e5af0c

    SHA256

    abb17e2c83a49b0e7b69d39edfb6868d6f55554fee87549a43cbb2f4612b8d71

    SHA512

    e49636b1f61ec10f2324ac7bc07c9bb196814215bf1773e7c44997e7e67dd89db7c71a396d60e93c45257b7a7ac154e91a0601818a8009502acb6c2946153c9c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b5730980538efcc6a8746d2b2651dc5f

    SHA1

    d00006abd485fd81a74e1df337b948a3484f33ed

    SHA256

    af6496aec068751a0f0b175a42fa49e5ad0b1f9046b7d3b882f651c3d83817b3

    SHA512

    93dfb5ccb332a26b827d509cc486a204905a270f31d9e38f27258efbad99265d0eb8253872386157a48b7b79c16110e8a900b3f3e9532ad7cc32b3dce12891f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    98ac1acd8a1cdf195c7d7d5edc95a390

    SHA1

    320f430f56bb7282a7862641d5ddf73eb60b8dd6

    SHA256

    931b397796a42c3f38ba40437a44212ab25827bd500c29e6c4d75cfdf0136aec

    SHA512

    2bad17b1a55cdd5a75d8a1a5e36f53a8dfd786a782f1817a3f77f14bddc03757b7db3069fa123ba5687d6bdcd3405ecced0b8909f16e91c38f4ddb19b7bbce17

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    19a94244f3093c1349f2d5c5caeb8241

    SHA1

    0231a3c5d303d29be1496a20d7b3669a9560fe7c

    SHA256

    f6b70873f799f31c2c24fe92bc6b36a7c43d7a80ec66162bb9082c0f77e38738

    SHA512

    88ae58003c73771362dc2370a676ff006d6c66f0c3326a30a2c9c337abb079fcc89b136f1ae55abe34d93368518173757702b21ff03301fc8711fd4e969e32a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0a4298e97d4836b31e02f3703eda3cb2

    SHA1

    06e0657f57415ecd26670cc8ab3a525791768367

    SHA256

    ff3ec53f964aed056d12c29dd229e4cd044a2eaead4f36fdd3bdf6d83bb1e36f

    SHA512

    8cedb806dafadf5fcf5c361fe770a5958315345c9bcec184ce2a3d854756dc91e223184a52426d784601294a49bcf909ad73a1c324d661252abfa69acacdd6cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    19e3a9234d4ee6df974fd8e86e9c5e1d

    SHA1

    e7941f502682c5771a4bdda7ec0247bfbbee0b22

    SHA256

    6a5a88e3a82e3dc331cb1af78021cc53543a9b1ea8394e9560fd0f5dfa4ea1a6

    SHA512

    59e5a95b9849442d4ba662dd882490f63237cde77f1a5f943a2e3d105e33067219bca58a0b80f160e10411e93caf183fe9fc491f18a43ec9886f72758679d11f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6963cb3fe5131497d4fcc6ecbaf6714d

    SHA1

    bdc7fc349f4e650208393e9a04d81cf6cd0da9b6

    SHA256

    81244fd7e9e94fb0094705f6d898438c189b4e6cb8a40df1c50dccd45c8d7edc

    SHA512

    5793069fc69d6801c06776f1d017b831c454aa62785721e748957c66f343f2016f964b26c1b83518e63a9b36be06a15299cc6e0aa5e06c2365d29e450cff2bf6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d99857f3539f36bcc0fd4f2807d00587

    SHA1

    fd18bfbc5922817906d8b70546e5f1407e5797aa

    SHA256

    8b91d9bc4ccebd6fc7524bb46975682be5480ce69770bbddf33091dab0322d57

    SHA512

    df93cb2ab543e653af8a8edad529c4d011b0d2828c20c8615a955614582b9fa6427bbc3e3563bb216bbc62a98676e76baee80a32f01669dc2c9e62a55538107e

  • C:\Users\Admin\AppData\Local\Temp\Cab3CC4.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar3D54.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1900-435-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/1900-0-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.