Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    03/07/2024, 02:25

General

  • Target

    20c39cab80fac40a7db9a24f31ae76a4_JaffaCakes118.exe

  • Size

    303KB

  • MD5

    20c39cab80fac40a7db9a24f31ae76a4

  • SHA1

    b07b022544b17e9f619867d2319a0500575a179b

  • SHA256

    984406c0310d6af570a57ab8fe1f76f073baa5879c1431859d6006a8c3e8c91b

  • SHA512

    4d22803c17919f506403779672f246996b01eff122ced3d83bcb134e0e0b2c7ed0eaa53fa4331702a7ab497568b70b0d75d80833c5aeae8bb3ffe97e68e66214

  • SSDEEP

    6144:gYoYkXCmIJghOVs+sF60T0trwGPtylLuSAcY1swGY6mLxwUxaNHmbRJ0eJmMlQvL:fEP1p+sF6e0J1jjcY1swOmGOaVmbRuu4

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Modifies registry class 20 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\20c39cab80fac40a7db9a24f31ae76a4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\20c39cab80fac40a7db9a24f31ae76a4_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Users\Admin\AppData\Local\Temp\ICD1.tmp\FP_AX_CAB_INSTALLER64.exe
      C:\Users\Admin\AppData\Local\Temp\ICD1.tmp\FP_AX_CAB_INSTALLER64.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2420
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://get3.adobe.com/flashplayer/update/activex
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2716
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2716 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    89867e7a4659da8b02bf1e90a15f7bea

    SHA1

    eacdf84284d7ea75bf9627037c422a122fb24707

    SHA256

    e97df6a8c8c0430c5dd474d46364dc71381c4e4abbeab248ae42c85329c5646b

    SHA512

    ae37114b022919e829b2af646cdadd6b55f921b63587bc1de65f0622a542a5988d83c3d456e150b096e256d9e2b2f6810d06b3c9a7ed35be38c976a5d8d9ccbf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7a58167944eed48f3efbefc7b7e2bce4

    SHA1

    195fdc53417bf22778e302cb93b05709663f8cba

    SHA256

    7c3030917972c7b412d5263514c8179c1575a647ba0ac96bfe59b168dc3ac1f3

    SHA512

    713f1515e96c219623b010e4c1ab9b2dda257be48170baa04dae5f32be133a4b989e2de4132964d067d63b401b019cb5b2d624a2d5f2b3d659fd6572453cb0b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    37ecc4c3a024b946f50b50708969bda9

    SHA1

    905605c467f89691396f6574f3d78d464fb36f13

    SHA256

    6714babff921d355d6ee023a1d720e61f7db225ee140cdaac599bdfd421c62fd

    SHA512

    f465e4ab266cdbaf2b25ab0a5e3138a55145c7cebbc793d7adf6410a2d0264c9c84713023955d3e8152c3ffa14952ebc6359d4fe8ed38b955a051cb72f75be51

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c5e8bcc8c818bff62a96262895100333

    SHA1

    ae208c0b30c3c64027f8416a1d4d4cb4f177b133

    SHA256

    dc3105c7fe9e8ee3d601b8bb0481b90ed5958f4953ae3834ea94e747e00de818

    SHA512

    dce4d0998b9b40dbc5f1d301b25298fe305b0251a5b4a82319467669e33562a637d959693a1c2d727aa42b0f5072a85431a03e205a282beda635bf846bd57d5f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b6e6b539a05aa873cf86acde269688a8

    SHA1

    f45db0b0d40f3d1597a1d49f698bbc311836ac91

    SHA256

    707aedd42d16baa2238dc273f925e8d1969e6a27b53f8babd0f360bd4e891339

    SHA512

    f1739d8eadf22e81927dc84ca94add1fce6172d5b2384590f6c8d289145ba169463f8e3f8a474c0a931a0533591d097d5629a7aecd864f2fa0138b956f22b281

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8f0d478d5a600f5a5b9ded65c05b12ee

    SHA1

    2f7223097a68668f5dc1081b04e4b43c58a8c612

    SHA256

    a42a5904b272613e1039b4e3b9fc01de77a0eb1300cd50207e38f775a4a2dab7

    SHA512

    4cf31db5ec154efae41dbdb4d2708c78fab49f2f5909fcc6af220d5c955d4b9d0c6f8b1c3c619f1bd86c7237d065cf3452efa7d046adad332368f34fbc7692ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4a2ae5e585abd3fb1db58cdb0e806599

    SHA1

    56fcbd30c6c84e759b404e94b192fd3e1ee430ff

    SHA256

    462c627d2d4af2d28424bce5f4222da4baae8978bf488f8337ec72fdf2d6500f

    SHA512

    ed5e14da1c0931185ddad74ecaf0f8dd687d5da81e57bc5b30fbcb37d3d5584edfecb9afa4b71dcb436e5d209c175aed4edeb816563cb77ee5de898bf9eae4a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4d126ab438c0ba93f618407c72449f80

    SHA1

    e75e4bdb9bdf7d56e78c3f724de944678f9f1cc8

    SHA256

    24176d2afa9a81896a09afc32d356120c1c5d66c2e5ec2c3fab5d30e1e46aacc

    SHA512

    13dca594204c7e9631198d7d57045794e5b8300a5ddd5f60cb5e4f9877414aa5f7f2eab71addb34d3ab6337dca8802192714b716f1d6ad86715a86d19270d689

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4f045d01cd9bd71edaf74b435aec218c

    SHA1

    c980b3c09f8febd63836f59deb7dbccab61828b0

    SHA256

    e58735c9fc1cd8f0244ce75317711047c0a9799580d68b9d890b3e7a7840dbbc

    SHA512

    bc3939cd916b32035d8f3e2d234468ecf44aaa29973bd6096b5b9bba493dde8435b61b997bb1747f25d4be64709baa444675d9e6d93916ebde79031292646032

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    97137fff7150e964d999c6278024e958

    SHA1

    50007e9a2f1d3260ed3fe555b5fe075fb60aac6d

    SHA256

    a4a3a437c133ed500ee269987ab013fa5e387926b88c93973f28c469069a187f

    SHA512

    390c6d40cdeeca7e16c121a2f1b3e7de95057ba998afa549ad18f47048fe2ed16f0588e6c5faa8426aa118171339c747cdb2f79e5f2bbd363646c002ba13aedf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b154416c3edc0b7924a0b8d41acac6a1

    SHA1

    a3f406a6fbd8159a4f66a0f135a922782f2bb8a7

    SHA256

    74dec9fdabea23cc795392c8f35f785fa2e193f69e3685ad92f43bdb39a41b31

    SHA512

    05f451305454c7109a39b6341bf00b315becdddf623b18877a15acc9ee425dc8c6f38bbab4ef67a394fdbb9bed239f1f1e22635f5f5f1b5fd60d51484966c23d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    74f9eaa936f9ef4cf86888e40161a8d4

    SHA1

    98a50bd8a10dd28193bd6800c4eaf55b35f1bd7e

    SHA256

    bd6f8c8b3ea0b851f4536a35c23e7069f57e0e5359047179486e086f2c93971a

    SHA512

    c4e55acf79f6147de2da19fbf770bc62d09be701ef4e26e490d625864d98c42ea8a792c8321a92263d5834144e22922007dd96d960efb0ef143846d492557a69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    8ea0bdaff1907d1533e00029b990b18d

    SHA1

    0fe6d8caee4ccc153f1346a01355bede0de60902

    SHA256

    d377aa5c67cfd4dfe0b61adba20cc2521872e5da97f92b9247b4b4f8526d9403

    SHA512

    5b8614c9742e6b4a8b6590f10487e45c37002606691a4fa1a3c2f75f16b2e589d069b2f328d18559a1d528217d5deb4251554fb9e0e46170c56372ac4bae0b48

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    b3c000e56b9fe326b64838c969d8740f

    SHA1

    6c2af0c51b1c0d464f263b245124d129252f980f

    SHA256

    bf6b9d0b11e18ae6a8b43afcc2124bf751e5a8f67e5f3ba69b7d5ca2f2a85d11

    SHA512

    478b406effaa5faae0e6f6ac6ad675d2e51d2734c56d1e43a5774ad278448ef7968ffc2a15f299d879bf81b5f0de3968bff16d29d7ffd488f7019fad0f435c4c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TTL9DZJ3\swflash[1].cab

    Filesize

    225KB

    MD5

    b3e138191eeca0adcc05cb90bb4c76ff

    SHA1

    2d83b50b5992540e2150dfcaddd10f7c67633d2c

    SHA256

    eea074db3f86fed73a36d9e6c734af8080a4d2364e817eecd5cb37cb9ec9dc0b

    SHA512

    82b4c76201697d7d25f2e4f454aa0dd8d548cdfd3ebfa0dd91845536f74f470e57d66a73750c56409510d787ee2483839f799fef5d5a77972cd4435a157a21a4

  • C:\Users\Admin\AppData\Local\Temp\Cab1E4C.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\ICD1.tmp\swflash64.inf

    Filesize

    218B

    MD5

    60c0b6143a14467a24e31e887954763f

    SHA1

    77644b4640740ac85fbb201dbc14e5dccdad33ed

    SHA256

    97ac49c33b06efc45061441a392a55f04548ee47dc48aa8a916de8d13dabec58

    SHA512

    7032669715c068de67d85d5d00f201ee84bb6edac895559b2a248509024d6ce07c0494835c8ee802dbdbe1bc0b1fb7f4a07417ef864c04ebfaa556663dfd7c7f

  • C:\Users\Admin\AppData\Local\Temp\Tar1ECC.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Local\Temp\Tar2A3D.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\ICD1.tmp\FP_AX_CAB_INSTALLER64.exe

    Filesize

    757KB

    MD5

    47f240e7f969bc507334f79b42b3b718

    SHA1

    8ec5c3294b3854a32636529d73a5f070d5bcf627

    SHA256

    c8c8cff5dc0a3f205e59f0bbfe30b6ade490c10b9ecc7043f264ec67ef9b6a11

    SHA512

    10999161970b874db326becd51d5917f17fece7021e27b2c2dfbee42cb4e992c4d5dbeac41093a345ad098c884f6937aa941ec76fb0c9587e9470405ecb67161

  • memory/1636-997-0x0000000000400000-0x00000000004CD000-memory.dmp

    Filesize

    820KB

  • memory/1636-980-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1636-556-0x0000000000400000-0x00000000004CD000-memory.dmp

    Filesize

    820KB

  • memory/1636-0-0x0000000000400000-0x00000000004CD000-memory.dmp

    Filesize

    820KB

  • memory/1636-1-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB