Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    09/07/2024, 11:51

General

  • Target

    3042f9dfaf2ef09f73ad8f2c6c9ef5b5_JaffaCakes118.exe

  • Size

    367KB

  • MD5

    3042f9dfaf2ef09f73ad8f2c6c9ef5b5

  • SHA1

    0248ce7552adcd6d12aefeaddb7cf0f5c30e3a07

  • SHA256

    4e85bb07fd31beb54e589e4342449788a1d6fd49189eef5fe317b3f9c0cd8639

  • SHA512

    8f99e1bebf91105abe0488f1c3457b7b5f97260581a79811952775c2776b06856c8df58f4d08ff785053e6816edece2bf06db4d443f2d18ee176452fad562352

  • SSDEEP

    6144:HqwcAeSrVC3Hea5poAocYcDwkduWRc0TilVIqgtfU34qh6LQckvWyI92ypJk7boC:H4DSY3HBo/c98ScTzb3NhcmW5fk7V

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 42 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3042f9dfaf2ef09f73ad8f2c6c9ef5b5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3042f9dfaf2ef09f73ad8f2c6c9ef5b5_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.flogao.com.br/bigbrotherfloga0/foto/201/127954121
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2504
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2504 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b30613a4f217da2013ec2dfab9300a0b

    SHA1

    9676f511085c65afa562cecdeea7d71df31f6977

    SHA256

    4df1a697d213b2dc1f2ee1f9bcc19eaa1087c0c6bb7e82528204e72fe0f9e1b8

    SHA512

    812ed5eb93e6553bd9bd689467ab9b7673182b2842a9343c9f1135a87efe8b262774e1b7ac2a6ae0b6dc0b8328a5a33a69215b89a2da951860ec367844ed824f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fb1f63985e09185afababaa3a0a29408

    SHA1

    3142a922cc8be335b878e93e1a84f55b81fb254f

    SHA256

    4a0fe062bc51b361ad7baa4d559ca83c5a28e3e852bed7be6d0913ffc982811d

    SHA512

    97ae71096bceb46ffce46a03c4a3741efbddbff51a925fd38d9796382000ee0759c4b0cbe7fd8148e4ab781876792ae1c2268780637634522b6552ad4d9e745e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1be276a53e3c878aaa4bc1c63009234e

    SHA1

    21d674ee2ab023b1bb616e21a1427338118574d2

    SHA256

    d7781b6c8fd805d058ab34d029d29bd473f76d4f660a966bc0bbc873416b9980

    SHA512

    e3f55100ec21fe555608e01151a7c9f6279d74e4a31ca9862a9ef14d3790465ca6fa836743ae78f52c6357232f2f256a1f39cdd71e5bbe0fc5256967f7b2c640

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    23c78e32f75b45202f737e3423321b89

    SHA1

    37fe023653a5999d39ba4aeb68694bdc9b4a1fa9

    SHA256

    525fce85ecb051a4b89667201995f936d192a911c64bfe6d6058a266c90d4a42

    SHA512

    2744b1e25194a9c1b08f1bb7a7cf13145671196823a6a66c093c0af33fbd53e2c46f3d2847f6c6943aecf440bc8a41728ef20f4a8d2b3de1ae14dc5f7df22d2b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a35c632afa1df0630d8a252c7eeb4a43

    SHA1

    7d66dabd54b3be6976626cf81d45dbe695054c90

    SHA256

    98adc5c13f6178bd61958d790ab6d8a6600dea5f59f2c332054c0136737a0ed6

    SHA512

    c2c10b08cb3104a478445c1604f67012ab1509876513e7de5447948e5542812113906a512b37d367e477a393eb21bbc6cebb5a8f7ec6990b16790aff8f414be1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d920b391cc077c2cb95803be1f78bf9d

    SHA1

    50a8742a86322a4be8fb6ab13ee9f2e82d58e9fb

    SHA256

    9d20986b501dc80380a65a1770708af808f15cf02de0e9736c335273b935ce75

    SHA512

    3f6649b3fb2d89f471a89a49b72dc61f0643599b55bd858c036f0e4021334a2f0e307373a23019c9e9fcf32878063fd792f59a58380f73c646d15c5ceac1ad96

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e2d788a8f7631e86a97f4e71acddef93

    SHA1

    7f162db097e086c285b5ed3e7b8b23b41152ff98

    SHA256

    c325af0f9febe22a6df366abdd5365261cee7b3b5444cb18456c998f653a60e9

    SHA512

    6f05bf7ceba97747ad91b36658f0195a49bff3ac3ed0e5cea9df1f9aab836b5b2bc49cc0821ad03d4bcf366d10c53009af8db1927a6d2fd4c722178de1a3e2a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ec535eda8293cbfb3c57fad9db90f4e0

    SHA1

    8133a7c96b465dcaec19d403e4bcafddd84db3eb

    SHA256

    985099303c9b92401b140d2d3ecbebaddda8b827ee162dece854bbe7de2b8a78

    SHA512

    2ce2091f729e49f9de5f04e3f07d21fea80589820faf2838889545d3b21604a92700571ded59b00fcb5e3b88da31ea35323c9af2aaf9b9a0ac6f7177aa96efbc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    490099fd837ba3a856c4e62d3e123775

    SHA1

    53a02847ceb847630e84ce69163015c210971ee8

    SHA256

    ca6f7519adaa69478ed838e87a0068162fae0d47040032f74fb49c6c19393bcd

    SHA512

    98a7b618a19978db6f100da55185cb7afdeae659f4f1521355e33f59a61048586a9867367c04c7c532656a140488c5e22daf7f56853e1338a955b3f79c058fc2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    476535f15e6e0f45202b7487f87a61d5

    SHA1

    8f6991089e201240512ce5bc229e07671a0ea746

    SHA256

    760b48db97664b64e66802191b825a2dd82b0049bbeee696b02b587064506ec2

    SHA512

    0c0c361faa33a5dba8348268d0a32c56d39929166d0988531e8e3b60ae1426bee46284578194cefb80f206986dd4e83ec96573518981dd28aac71a6f1fd926ee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a309a013a2fc15d13173e48dca95dad1

    SHA1

    c24bd80d453502aaf8cae5f27b153f6c80a199e7

    SHA256

    38dfb06f7f319f0b3e6ce4413e9c9b227cfba0020fae40c17786727e1dda3c11

    SHA512

    e4e608c597631740557a3319d18718abb6bced320f12612e1b1dc87b397f695fd3116f8893d2b3a54fa9c14cf31ad678f2f7d6dfbc64f73f4b6723e0eb28607e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    242b879513bd66068343840186c11ae2

    SHA1

    82b0f05bda384855ee660f22e8be4a02e94dabb7

    SHA256

    c77f684338f62d1c388a6875adcb948678d899cf08193421543375be4ac716ca

    SHA512

    13c60f5cb00754d9684e4fbdba5d3b1e2a8693674d31701509da74a0447f95edcb45cd4ac1f750db4b9481199ab0b46e7de4bb7613c746b864ead616d480eff8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    057a232b63f6c562e6f77bfcabdd5ca5

    SHA1

    2c2db120a63caf41fce708753c6b76ec031a4044

    SHA256

    27a06a85e433c378b40359f8516152953598853649191fbc50fde7d623cb0b45

    SHA512

    e3871a537e23bb2799e01c6e24f545e698f81b736a9f32c5f6f1c026ac75e59edeff6a43718ec617ab7aa3a082c5ea9d0647a796078630e3b315689a638f6396

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1eaffc2a43b38a7d07c865f914377682

    SHA1

    7f57c2f9beff0b67a3fb0549e1d09df62c6bfe53

    SHA256

    ff5074e7554d4aa7f3e727bf053ac67581e6852bb3cc0ebce1bc1b36c9c96a55

    SHA512

    f7bf52939a41e146785f0f99a596e819ea4bad2accf528aa61daa81cbd8e141b7cb68485a9f6dd67e7da69cab0d837c5123b4a32abf1de2f76f47c692dbe8f3a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    49b46034455e766be9d6a094e1592e5a

    SHA1

    5bd0e2dde5df46bf6fe81080e69e5c8841dd2de5

    SHA256

    6bb8728b425e0ff06410ad32b80b84615e3269068ff65b9078af1f72fa9353fe

    SHA512

    289e9e671d48402f358051cf6c8327e5c49ca61a06f8dc3025f1c8a70a6f9c7b2981a4e3421a75520b49d50b6ae6f83874c2139ba17d8346cff59967a63eec31

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e493c47907e2c724179a7d34bf6a96c7

    SHA1

    41b6d9ee7ceefca5579a625729f00abc9f90d646

    SHA256

    c11c99092dd2dd737636037b405307268481936d9fc9a5715e05d514c4188019

    SHA512

    6a9c9864d2d35afde6a5ce7aa39d840a9dd6c9a977771d849303d97a8d97c773fab09c4017f232153e4dc4bae1281c1d362e1f4bb62c0e0ea1c4b896bcc1c53b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fb761fc84eaa38ff1af0498cf21786a0

    SHA1

    22fa69ea5d9953d5866112baadbf7cdca985d972

    SHA256

    014f9ada3a4becb808d925e4b0bf195230c0b97a19f57af91a030004d8c2865f

    SHA512

    76d6044fe850dbb50679e386eab6ed863192f7145330330f91d94f7cbb706e3562e1e64b2a79c92064d19bc459de4132c7242ca17ae46d409534d38c34080e54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    090c2fbf3fb1b054bf1ae7f65cafce0a

    SHA1

    60305d88cee5a948cea0005b5f5abee299939797

    SHA256

    352713067956200b9f343303c51db3dfb62d749f22962619ca2d95ddc3725516

    SHA512

    7e8abdfbbe57a91f9cc24594d07260cbb1789cbefb3dab7b734d43be40604dc16968db24f24c5720285a9e9ee3a6df62eaf88ff0f9cec97a630e5085629c6758

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a7b2dd546398432e14829f58858ec8ab

    SHA1

    cd65ed634efe183940b031a76cc5bcaffbb9b89c

    SHA256

    2e626b35b7a90d01fcd12433f8f15e7cf15d718239c833ede854d86f08677272

    SHA512

    ecfb1d647e61dc1ec19c8443aca1bfd233d5e087229d71084f2be9a8e94cc15dfdca4d34174659f128e5d3b39aad30f1ae3b6b0ee7765fa6d853b58d56bdee48

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1VX38S3F\styles__ltr[1].css

    Filesize

    55KB

    MD5

    4adccf70587477c74e2fcd636e4ec895

    SHA1

    af63034901c98e2d93faa7737f9c8f52e302d88b

    SHA256

    0e04cd9eec042868e190cbdabf2f8f0c7172dcc54ab87eb616eca14258307b4d

    SHA512

    d3f071c0a0aa7f2d3b8e584c67d4a1adf1a9a99595cffc204bf43b99f5b19c4b98cec8b31e65a46c01509fc7af8787bd7839299a683d028e388fdc4ded678cb3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HNGGU6NJ\recaptcha__en[1].js

    Filesize

    533KB

    MD5

    93e3f7248853ea26232278a54613f93c

    SHA1

    16100c397972a415bfcfce1a470acad68c173375

    SHA256

    0ec782544506a0aea967ea044659c633e1ee735b79e5172cb263797cc5cefe3a

    SHA512

    26aca30de753823a247916a9418aa8bce24059d80ec35af6e1a08a6e931dcf3119e326ec7239a1f8f83439979f39460b1f74c1a6d448e2f0702e91f5ad081df9

  • C:\Users\Admin\AppData\Local\Temp\CabD76B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF3A5.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1640-96-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/1640-1-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/1640-4-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/1640-5-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/1640-6-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/1640-9-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/1640-8-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/1640-0-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/1640-2-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/1640-3-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/1640-7-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/1640-11-0x00000000764D0000-0x00000000764DA000-memory.dmp

    Filesize

    40KB

  • memory/1640-92-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/1640-13-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/1640-14-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/1640-12-0x000000007EF50000-0x000000007EFAC000-memory.dmp

    Filesize

    368KB

  • memory/1640-10-0x00000000764D1000-0x00000000764D2000-memory.dmp

    Filesize

    4KB