Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    10/07/2024, 11:30

General

  • Target

    348942bb05580e85754c3ef0f5547135_JaffaCakes118.dll

  • Size

    124KB

  • MD5

    348942bb05580e85754c3ef0f5547135

  • SHA1

    798e19aec83d3472b12fa0ec43ab8b000db4dafa

  • SHA256

    e2cea0d7532e45d4509a4ce963c62451d566a1a6df5a1f2d38b81dd1fdd64674

  • SHA512

    8e3752c7bce53293f298c4c97be9701de46d4a26fad9c85d408757f7c495d4a13ac5aa6e03aac097f4336e12734ee93cc9d1a5254d6e01000fa9fc167aec3ba1

  • SSDEEP

    1536:BA/JTjuwpcxRaMrx5PNYrKqq5CwwozhOtftHpdwbHaIxQukFlfdVjodVMo:BA/JTjuheMrFQwieb6IxXYlfdVAu

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\348942bb05580e85754c3ef0f5547135_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:708
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\348942bb05580e85754c3ef0f5547135_JaffaCakes118.dll,#1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2300
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" http://gordon.d4rc.net/
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2328
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2328 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b467520712d4c892ad69c8fb11c2db7f

    SHA1

    7acbf5df7b6fafc7d0e26ac8bee395060d530a2a

    SHA256

    33247c8af52f5348940af91a771c6f0beda4bd380a05a5c909896dc8cbb698a5

    SHA512

    72e138d5f0939043398ad27022ce692aae16cb006c564bf9cf274b32497ef3f5981f57d70d63907a3e6455d77d534a055bc414db7926e3939543a9baeeecfb33

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1c01360941ab982ac155df654946bcc7

    SHA1

    afeead7b4737ab5b4c1ae04bfccda51acb3dba7c

    SHA256

    ef0bc9263f5fb8760821d647f3d659fcac07020ab4d216d40d2053bff6285db3

    SHA512

    a39c90820f39c4e013a29737262deebb221c9da898abe327a506e3c832d8740d9d13d921e596910b2175bb8d09336e468e97a267e27c98184ba62f1d264ea826

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2811f145d912896bff286d8cbbd30efd

    SHA1

    3586178ad53e76d55e9725c09c61dcaeb5b001d7

    SHA256

    642d8020cc26d9333e33ef6d9cae7e99f1348ac952d44a5a6d2f1046d10f4b9b

    SHA512

    0aea0c560835d412b903ebe54fa8c0b3989cc9490f7e2caf80ccfb0daee6a2afc747dfe976a568f83f34cdfcdfcd061818481ee559a07e239037f2e4be9d36c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    817b08570a33c4e23bb01925db15f53b

    SHA1

    256a51c485247622a22a5929c35894f30c133614

    SHA256

    472e9c9efe4335e144224b736f8c1d94d1ec58bbea2085d0fdb34319f83bd2e1

    SHA512

    01a07755a4288285fbfb2846c0521b3a2fdcba11091831b954bd755723db371733139f5aff9f18aae89cb789068b1b7e50f57fab58f66d2583b916c7a21db38b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4a4441a2d1ab6a61578a7c86871e7d54

    SHA1

    7c12269eb9e2e593c28654cbd5bcae83b39efe6d

    SHA256

    07d2b44aa1bcb5747b23185af0b6f9ffe51e58fcf097f5bc54347c44b88180f1

    SHA512

    2f1dcee8e23f37e495d0c659c76bf0cb95c954e45e2146b257117e1b40f863ee4440a8d317c1b4e71212e21f739a2063f674d4e48feff4532d12b497bf74595e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7a8284ee175106507e77e0717db0c4c9

    SHA1

    6a1b18262ca0c494e954f5713178a62a5d2cf4d2

    SHA256

    8f1319fc1fc40e7a12deec61895674c2d865a739e8b2f6d11aea6e195b8d0c78

    SHA512

    643ca8f3fba31b6cdea5ccd57ebe8ba6b6924c2d96e45dc99e06cd0870d5ee9c2b037a820563e762a2f2fc29d79b8cf4f53290cd1c3d444e6c54b05eba5383bc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    08061061a6dc9a92dcb71e3f4cd22aab

    SHA1

    1a5fadc2971b24830734ffe10054e4976a0467f0

    SHA256

    66a1bfac013b5c952f67befb3a2884f4b8bb086271cb49729d8ae4ef03fb6da1

    SHA512

    9e6496fc87d568b2b8bdd6cb1a0bd33090e5445a886907bfb18c84727c46ff3948aefddca9d0a2753fc585c964a0d51c0282577b9b65b59fc4e48199fe92ce2b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9fb45dc10396132caa9f02e137eaba5d

    SHA1

    8ae737ecfb5af0042437b2bc8319ee064235cce3

    SHA256

    48a6f96169ce899aecb60ac517193cd82e8ee129959436812d84384a9674975c

    SHA512

    d0ada50ba4708ebe1e75d4ffd2ac7ee6e34700aa9d904e74dd606e03ff931f94953052c8f47e93475427b021e4ce03ac01cdda18ff350cb4beb8fbb2d549c523

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    11da13c6a79e95b8613f7ee00d7b11a7

    SHA1

    075e9b599d8ea429277d35d2ce683bb8f46688a6

    SHA256

    e71b145dc776d22656828ba77a97d1035b8e321e1304ea6f303bbd5031a4fb97

    SHA512

    3ecd6542b2d96f7049bc267d1b6c4877a09db791b7e241a1a1b2bbc8da071d3b1ef1bee9266029e1547c4888260f012db98fee7e7515df74f2e1faaf87f14954

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e6ac3ac687541ba6cdb520ed579f186a

    SHA1

    2e3ce76e4cb70233d22f10563de1ba4b05a54471

    SHA256

    89fb85a6948ecfd7871f4d983665211be914c295608f944104e44fa13bd86a61

    SHA512

    a15d14b4996204a0ab60ee7349638fa63b8da7d61626a10fa126d996339fbcb7bcc89928737ec183e1b226e5d6efdce994f3457864c4a399f2aeeb022445a1e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    124497d2b10521a7edf7656c62147717

    SHA1

    8010e6c14a1d94cb7b378caabced5d7d4a00a93b

    SHA256

    cecad862346164d053c180ea9678cb252161d5437084b940d015c670f90be323

    SHA512

    84ec45076a750ececf6398bac5956bfe19d07a7c706581f6896c92a96ba3e4a77d2abb9f066a5cb34e835f596ed29aeb72386ef11e54e7677a80c25bc055ee7f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2e209c626cb4bff2704c36df9591c5e7

    SHA1

    b4e71ac22a696c4ed1340ca641103229a46f082c

    SHA256

    11344c5499fd2458944881f62dc125f478f720f52e3f7dee10480bc4aaaa4228

    SHA512

    57e68d1446bbaed797a000ebe6ac670521fb1cfaffea8f4d164d63aa95dc6eb3be0a6af33bfc409d61bd83d5d37d9546ef2db270f97bd3337f4c0948a20e0d4b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c32e72b4497ce11ec54752d191dbefed

    SHA1

    43a5c3c70c92262ffe0835ebaac60e3cf43b228e

    SHA256

    6547852bc31c9a19635b1fb728130a9bb699540b5c82a06d10aa7156cc9d2088

    SHA512

    e2e730344b3440b1c697fb241392b11e31a28586739c00eef87264709ef3fa3418b1fa0cd01a6d8ef84e3e93971ff796fc8e3f0398797b4942f2a3a95edb04d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c2457360c82e8b91701bd16dbac017e3

    SHA1

    81a54f9bae95c67faacf124ad2c0928368b89073

    SHA256

    2b0cc370f29e7ac55c072edcbca72b9fa73fc55f9778005ca266d3d14a49561c

    SHA512

    039703cc2703f3ab97ce5121bc152273346f2324800c7837f45229cb98b158723df5b43d3a8268a0e940ee2ac493e2210281c3bf759870ba5cc615378eb802a9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d5747650995b2232ce93653e9086548b

    SHA1

    52a50e0278b1dd3e44fc9ef9b5fb07c085dc096c

    SHA256

    0db3512e283e68f67d696e6039b24492ea6e48017ef1a5f6b0b72193c4099a71

    SHA512

    83837b77df68c13a5c3d9c1b8a5ebcdd0578994094ee28ed864a5cd83d319e0769018e8c973801954a021a33cb847c9d8055ea68b7b9158a25df7086b853b7b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3a6aca7d2b2d26691c460f5a59d5e501

    SHA1

    76be5ff1fe71b21b0bbdc45b8f28578a265be03d

    SHA256

    1997ff5cd4ba49f02cf1a31ce850d0649f9b6041c553cab48aaf4aa4c247fedb

    SHA512

    af777228dc8f4db230ebf0b6c88711631b59b8997dbfc1ea426a79896f93a83513b67aabca16c410e29bb8ac567babeaf225dc626287b631e23001ac7a4d8ee5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1a51af523c0a27474a57600bb23e66f7

    SHA1

    19ec4770c1e66983d1d1954fde8969cd179d12bc

    SHA256

    9a18ae51563aacbc66fe4796df5e2c78843b297ff976710869f2f30c4f4a28de

    SHA512

    bd74756020f3fec7d41b1e37834d96922c7480c910bbad83434adff8b2e441fb77d55d96da0d35278471f9194e9e8c7e81143c85ea08f634a034f4ee0bdac253

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    730650f131b1d03ae220ac928c224c9e

    SHA1

    8350573d22ea1c9a93afd4bc40fbe993fa8177f3

    SHA256

    d24b05bb6e4381b541ea2207fed5579ba35d5c81c57589c7573ade4d58c57c27

    SHA512

    5efd61e35ee706df6b6c6cea0d9e2a8391139a6f51fb80fa0f7cab6cef9557badde71d22ed8db1f0ee040f714380cdfb74d944558435d171ee2eebf72d4fdf47

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ef0bc927bc5c50b8d245fa53dc48a6a1

    SHA1

    b2478c7b7eac343d5eec279bf464a24fc69e992a

    SHA256

    39b2066a21c93e983c9932117098d90d4c3f8252572c0dde386d4ee2c7477622

    SHA512

    56252bcf8ee3f2356e07f93c73eec0bee34d72b0608e8842c22978c54d5b6cdacc351f5b2e4fe7cf7814c20deb3aad6eb473aef3434c5a006b5c4e54e4f777c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ff07d3b221d1107e95bbbc471ca30910

    SHA1

    b2b8fdc198e951bec5a54615aa33f65663da7546

    SHA256

    bd974ee2b8adc249d9f71059cc974b01e77af2284a8cc22ccd5bfcba71677785

    SHA512

    6fb8edeb4dc9d1c4dccf73fba917c796f8627fe6b272343913ca3ba960939a494f8586c30b782dc794bc3fcf647bdaad90622159f886c07cdf324d65351539a2

  • C:\Users\Admin\AppData\Local\Temp\Cab126B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar127C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2300-0-0x0000000010000000-0x000000001001F000-memory.dmp

    Filesize

    124KB