Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    10/07/2024, 10:23

General

  • Target

    34550dab589ea25651f365efb3ca1f37_JaffaCakes118.exe

  • Size

    173KB

  • MD5

    34550dab589ea25651f365efb3ca1f37

  • SHA1

    c01a9d1ccac365483381c2342708549c73217f06

  • SHA256

    a4948c6c4acaa1cae2eb859f6d3b97326660145f55e7e6b44d245bf46e2cd8b9

  • SHA512

    9fcbba4a5f05bb682629b4bb7b179b917ea52c6d99e5f34e121161dd83e63a8728f79a07327acf908813f3b3f5aab912ca6207c3eb8dcee29af05bb6a015f37c

  • SSDEEP

    3072:O4jqDOAnJZE+6vGMWq4E1wTakIfWeW2Fsn85bCymn/S/36dZkWB3u:OUDb+6Oq4E+TsDj3bYK/qoyu

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\34550dab589ea25651f365efb3ca1f37_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\34550dab589ea25651f365efb3ca1f37_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.error404.com.br/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2452
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2452 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e2b7c4a393801c91fa339e198aaf4428

    SHA1

    ff618e1f2add90e5b3b7e26c3a2f01660ac51636

    SHA256

    66d156e5753741b79226ce4acc7d4cb07abcd50a61a8bac883c0e0b80b83ad8f

    SHA512

    2d358668a234c9b1e89797539a28a26fd54c839ecd64bbf168bcf6bd482909e056d288c719497eaf94729f1b6dc32b6c6d755cd6d7aec535638004c6ac3735e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dfa6e72089c0eb4e9fdee192ea4f4b9e

    SHA1

    9238d585cae5943f0d0144ee0e751b68f0cdb0b7

    SHA256

    855a5053fe2b68399f93c20aa709b1ae0cd3cf7cbb08094a964cb4b51cc3b323

    SHA512

    6394cb27b3c7f35d36d5512497589f5666eab2c94c4b0b4468a5221e486595607608a0a53fce44e69301bac2fa1bd255ba21157b02d9d566f9f399147715facd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a560fbea4eb50d8006fce22a7b195d9b

    SHA1

    d9f5c1442bf7062399f15f6d76fb4964e1129c59

    SHA256

    94bf507116124416dfe639765545db1aad354438ba469da5ec82f9047abc7a2c

    SHA512

    9e762fd71ee3c7eec1450433037784b9966f29134c27786bc38a9b66c19aa4e176c6a25ee467a0a580762db1a3cf6ab7da1021727f84ba7e6299b883c464fc0d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    860eec15b147ef08f08b864a96a8632c

    SHA1

    6d37c3947a03e196bd29e1cb8fb5ddf12673ba31

    SHA256

    c76babb83b9dfd4aa74105c19f7522e2058671458461e338b9731e45e73b5f1d

    SHA512

    e6ac6bd7eae80ec8f3dd9e33f0ae44bf4404c2adc120f350e032c445e6e17720435ef7337a87ce70294447c4924ea2b84e2e4a492d7dfe0a5023a3fe8b7eaee0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9936ba88d13f829c0f41b3f4ba28545

    SHA1

    7e91b6e7bb82ba63b73c54459776cd04303e6931

    SHA256

    fab19ac651068ba759dadc8fd2cc73295e7631c6889ba5700a72fb9962cca70d

    SHA512

    c104f593a3651e4d141ec9d00c7bc4450d2336a57032cadb5c6a8408713a06ddcb7aceeb1a86b8ccd6e6e96ac6d929dcab52c13303623a56569fd8c71d2055fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b41366b5adc7932b68083ce89633720e

    SHA1

    cc967bcd8a9da296d4a61edd44dcd193470a4ad2

    SHA256

    c3d082eeaeef2d0d908a7634709b979fec55d9a8004ea3d0a2f136a05182f852

    SHA512

    3b36b7654064594974a978d24ceb32bb42d2145ffaf12286beb08a8879f039e2febc9821e2dd085f83fb212da04c8ba9e3c9c89557d8004ac592310df698b18b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e381c197ecdf7c43e55d03cb6ca99ccc

    SHA1

    5d37bf624d1f0aec03f48d1f152417a4dbddc094

    SHA256

    f5b9168678a66e6a5983007b9c029da8b41c24e210b8f9b8744d85ff93434196

    SHA512

    b0a6d93cdb3a250668fbb7e60ab5a3b61b1a25b77f024bc460efbf40f666e788434663e0bef0dc2fb86b40296651f78f1b342ffb3efbfd3d793efa03f66b2af9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b5790772594b130e8cbcb945ebff2e20

    SHA1

    b18d62ab67a3bc9336da9d4e61ba51974c12a5c2

    SHA256

    df8bda3e80e991dbd1afd21b6944e5746de626d325174a05bc083ef07308a6bd

    SHA512

    e1fea429ca4689ad4a34f1a4cfecf9ca71091182c25aa95c01cd03cbf032405299c7c8fe4d4c15813ba600ba436bb6a68099a18f185d9c4c78e84ba708d5cf45

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    685dbe996822b109f0f621342eef9460

    SHA1

    410d8a7fd9007d2f1832fdd1d110099d84d6ada6

    SHA256

    e51d41da290f3b58dd68770d01477ea56ddcb516fa3769dc6fbc071b1e739607

    SHA512

    8b6e15c2e15e00095a4f8752dea08479d06c0596cc89422402f2ae65381c607dd5cc713fa3fbcdd9b8fc4af1520b9966aaa08bf3a1027424b9492da47ee84b1f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f5eb244f62c6e6d1a6cb4f480f3d4590

    SHA1

    602c9334d3dbb44522d5393aac6bc1169a2e06f2

    SHA256

    95efc067184cb0723d4464fa7ab10a1838af291bb8ea3ea707dea8c44f1e95fe

    SHA512

    baeaa416a19af20968dff4c101b04bba78cf93d0de5a45b90eaf32f73a988f61fc77551221b3c1e5b1ff70a60d36c2bf32df57fbdab8cb99610c6ec8b8b35f7b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    30485c047ec7ace29da7f64f89fa912b

    SHA1

    6d2c5da1195428e36604368c38117917a35ccdcf

    SHA256

    6a97a3b2802451f554a40cde20d680f0dc37b8a1e3a7405e60571d0f2eb70081

    SHA512

    a526a6fc9b54d19f0433000d4d028d0afb151c385a9a1e20a272340a30d0591fecdfeb7bf5c7b842da54b63b77fb9feefff276785d56888abcd6af171eeb207b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    92d5c863bbbe5f5a3bc640c6d0f66345

    SHA1

    fad215aea5e37293b811ad5bfcc48a2d2d785c58

    SHA256

    fda9fd83201e06fbe19f39f1a3e9e82451f95e6387fc60e582983a581c270e61

    SHA512

    281bd4cc7c4e45e4a03cba9d28c7c45d4bd92e6d0df89e287e0d9db7af34ee6ea92e343d5a3c5276925db0943f1b409be351886bbaacb08acc85a63cc4bd5d8b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a06ea883a6717afd94e5965dbc7c426a

    SHA1

    55fdf0ee71b426f844fdc5cfe2e33db2a0a634b8

    SHA256

    2e3a08b659d2d1f0f751fab67eafd182a9ba3b84e47f71293afbb733f38d6a0d

    SHA512

    e3e8cc4dea401e0073a2df4d6335aafb0e0b03cd09b20f1bbfea3317442949f6d655cf1774c8b76371ffed8cddcd0ef5694f0691439dbf65e738e11df8a1aa80

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8adb67f861af1b6b8b65cc30be073151

    SHA1

    2798217ac63380a4c5e2b8b94ef38b954ed81c7c

    SHA256

    ff0a4e6fa53988cccb31b69fa4869ecf0956377546a90cd1204ef62e73667cb1

    SHA512

    8f95e80219b8a04b22e6bd9360fd07ff9a684aa0230abf4482d775e508a9a0453acb1af5a7e59a7c9f177f5d01ebeda0fcc7d017b892e3b2e01ff8c13dc5f128

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3acb6076c4bbb23e6db67ef226c2dbcd

    SHA1

    6745d552fca522a446f8a87c488d9e0b0474dee5

    SHA256

    47296924b9840162342348a8dd6987d05746689144528d2a0881dd8ad37fdf5f

    SHA512

    15af4a17fdd1295284e8eb749f265a19922a35230c6b4e6de8aded46cdb38b10f2eb82241db87ed6271e3c678bbd23ff2a78f2520aab5b76d1c11c4c80296791

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f6fb516d8a4e2e7886c24ecbba1979bb

    SHA1

    2682d2a1c4232ab8fdc98a5acc5ccf82efbbd6bf

    SHA256

    eb9515b6602dabeda9c0112efceb4410247d357f033a280f5519adf70481139f

    SHA512

    4661a5f26085bc46b1edbcd0ba963e0b8de2ccc9fd0dec866b01b69cf3ff73266151471ac3124b64d8cbfc312b2b03efbca6987ecf651fc5a28ebe2eaaa80ab0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    18cf2f2fd23f504245adf02a875596b3

    SHA1

    2bf302b337eaad967a9a9417e613b99f9ca8df12

    SHA256

    2a1e0f80f418e3f8a1f0b4930a3cd1e3585fa9144a0ebbcdf5ba6b2b98bb0610

    SHA512

    c69ebc6aca189ffc3ef6e67fdd1cd88f6192a362e6992ed4772f0e0ce6b028aeec50419812cb266553385adb1125d0131644c826e65ff3b6f66d8cf3ff21a503

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    31b34f50f3f3142d0f5792ae7402f67b

    SHA1

    f00627376c58d8c7e0aef86d902a34216f6ac5d4

    SHA256

    8a077697a19c3ce6a219c5a4898dda84b3670845602aa5366059d15bec01a8e5

    SHA512

    3de912a7c55bff00f3a6cd997bb99f959903f988225dd309df48649db8180c45926f7b99d74845b6439e0dd040a9094feffb02fd01e4e13f4568a1ea71447738

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    72f7c0561d4dd21686e79df575cc0d23

    SHA1

    a02ef23952f90a515631c8666fd73b5940214ff7

    SHA256

    7a30335075612e0a6fa750bdfa25e11432515f2352988c4987ba13844adee44a

    SHA512

    90cb4a3b5c372be3010d0a4dbe9e25461bf3c4b7512daf18e43b2e1abef22de0acbff93ee5579619be4e3d72e3e90761df579f0ee53c22fa0c1d86bac52fbb8d

  • C:\Users\Admin\AppData\Local\Temp\Cab4D56.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar4E17.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1740-3-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/1740-1-0x00000000002A0000-0x00000000002A2000-memory.dmp

    Filesize

    8KB

  • memory/1740-0-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/1740-439-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/1740-2-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/1740-5-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB