Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    15/07/2024, 14:32

General

  • Target

    4a14c1233148a74a56b59a9735b39da2_JaffaCakes118.exe

  • Size

    129KB

  • MD5

    4a14c1233148a74a56b59a9735b39da2

  • SHA1

    bfbcc5a36d2f3a1f6ab88031c04763f1b5692156

  • SHA256

    9fc355ef652e447dfc05f9d447cb1e719f7584721af38c871e1af2f0e24e8814

  • SHA512

    39da63372210473302f0e417153bc467399e48b687a58c3abc667d1f5ff2b8d03eaacace53bba6304413cb2724013359a2903c70d8223f053f3f77499adb0879

  • SSDEEP

    768:7cDeFStvveG22DNK0XwbulNtvQqLBdpjaT4dkNcDhdCNxDRqCEoJx8ngz8PEtiko:ISqPlDlsqdasdkuuxntJWwE0lz3fR6

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4a14c1233148a74a56b59a9735b39da2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4a14c1233148a74a56b59a9735b39da2_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" ema.gov.ge
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2500
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" ema.gov.ge
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:108
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:108 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5069055993cc2fbbebdd69bcde452f38

    SHA1

    4888ca1e8c7575b7f43fac5e2a292bcbe194083f

    SHA256

    84086ca5c356b83d1718decb0afe36c92fc5663f0880e571a235b45973fa031b

    SHA512

    4cea5c56da92ac3639c8eb50bba701f289c210809406173836f6d5ac672932f2c56775613d8430369266bd9e5cb84f9ca82f3d2307da561c50da7abd01d75d05

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    947d8412f64099639273e825e1238886

    SHA1

    030855e0f80cb50df972ae3603988ebf23a27064

    SHA256

    630cef18263a99ec32cd8db9da3c150b9a45e681dfe7f09822cee41064d39451

    SHA512

    68fc4dac8d8e13b549f859bc1d01a4682c33b5942b54e7c631827dca29a38116d4c56cb5e9d8d4cd39d68435d18447edb88355685d300965eabcaa4ebbe37a7d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8b7bd6458d22f9e3d64107bdf902e193

    SHA1

    a725b15b21857e512b81ed2932972956c349c319

    SHA256

    54ba36a063bb522233e60c090ed929b00986fe8d6b8a487106a77632f54798de

    SHA512

    78916fe04f41f8e081f94681c1862652d95213f2ba7424474c3f46119a0d2c78aaea7adf787043804727d41e263d00be28f67501bc9c08a034549a1fbde55304

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3fcd46f22697fae0770205e35a67bd5b

    SHA1

    92075f665bb422f01f8403dc7909f0522ceedd1f

    SHA256

    de4cb6ee49393f39fe41fa73874c65e04017cf41fe79e67d41bd3c77c426a73f

    SHA512

    a630860a424e0c6f2838d4bbc7170ba3cb1f73205c23aa566bd9a3f90e701a7c5512579cc12891620e62e3adf470689ee3832408485607bb75fe658158f9bad2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    53c80d54dc264cc6ed383201ab56821e

    SHA1

    39832cdeb73a3d44fffdcce1663873166913665a

    SHA256

    58a48fdbeec7f23576d150dc213f6606bce8609b9ed4639ed30a3c11811d979a

    SHA512

    8e5223db73ae77b31da0f3533a736d957eb5b358b31ec6a64e44c1a0cf5adad5030d9d5c82a967ee8ecab4d68aaade28babe4e690f5c22536371f2f17dd34346

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    68b58afdacf444571187425a0a80a7fe

    SHA1

    b47aea5f096e205f7cb9e33e3651c9638057ddf1

    SHA256

    8a33a17ab2f534f10d50b0a18720fd1201d872a1e64691cf6d8a0dab3b177cfb

    SHA512

    70b87778a228708c0d2f007b88e7fb482774b65bffb7897cb0ce4a7cd5af8bfdd2eea5bc3a14333ed42da60c38856fd01ddca84adcbb7e01a4dc200a07cf7580

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    28c3f1158279be9d0941f6639bd57012

    SHA1

    569a793b5ee628dadb826e31c6c6e6e7a91a4126

    SHA256

    8f2156bf8e3f5feb7f0fb42ab73b8a63d62720c1488f3ea17ffa8186af7d4874

    SHA512

    47e0573cda0584f280005c3c4b9585106ae9eec3a96a6557f5f9f60150531d61f5e711203916fcca0d1ff2b21c2c2530a93bd4d4421c6302fee1e940b47d2c72

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b065aa5b9d101aa91eebbd0c29b72cc6

    SHA1

    424c5dd6403ab59364a9401105f31ad037b48c54

    SHA256

    7cfee142cf0c9ae1a6030717ed422ceac6b3d4594c77584764d9fa93141aceec

    SHA512

    7c0addc4a946ee52b1561e58d75db0bbbff31f1bfcab0dc0e11798d49355a7b7c453bb6e9a305927847078c148eaf0f83cd039c0ee69fc6c30be5de98525051b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a0797e25e5c1f37ea257508053d61018

    SHA1

    6df483b90a0a8e3329c4407339838d3215df0da0

    SHA256

    e513b924f1211e997010b9168c124e96230a5a84f3f4c60ae40282fb71198ba8

    SHA512

    cc7248bbcb7e48bb1c1f42c564e42854eb8989dbb74a433c63e5f843758cd123f2190a9f01539ee69bb0263bb1c428f63c6de257e85b5105c9a3f8811f57cdcb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6672e22de70b98b07bd9858e029b90e2

    SHA1

    878d5e8acc38f08a9f70ff038717f743e6d978c5

    SHA256

    5ea91501324e5faa33ef702d3ebeb3bac770175bb292a7fcda8a08b006d57fcd

    SHA512

    0ddb18c322f8f40beb20eda45fe31b2f71c74717285ddc913dc1c6943dee1f9299ef1f5036df43c13b90233303b82a105d1956fffa9c6b63f5fde3047b8f929f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4bc6fcda6c167806d5a13045937c8e7a

    SHA1

    d7b3ef06d716838475447900eb9d062e47a77a60

    SHA256

    bef349fbcd9e93528298ef54083559628226a7b9eaac23311e413089d5536482

    SHA512

    611d78166383071441b21bc517612f08d1b831974134c3796e0e3361135fcf953a9ccbfdef847f119e720baea96c8ac440d38632737573921a38a0b41b88df79

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    41a23cfa7ab917a1eafa5b1000f0bf1c

    SHA1

    fb2626313313846cd82809153134b2257b20886f

    SHA256

    9e847c6f7c718b621732f41431e058efc45162597687eaa8454ca413c9008f3a

    SHA512

    e70837c1d57ec9644c894841da497fa239dbe24e91ca962bf2deed484f04ba110c67405ae7fbe45787206eecc5c26d8a99f1a2f720f94854fd5d3ab6d51fd03c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    372af109ad8651d22e3afc84faf55df7

    SHA1

    3b1601541826129df8fb198aedc28a822b818b0c

    SHA256

    36dc668e0bfa8efaea3f71cc94baa105881e35a87f57096433ecdfb276e7b8c1

    SHA512

    50d3271c8dd2f073f1fc491d31e0f9764df161e43c0fed42a7d022db3e778cb5fbb90859057906314455221e199c54cb031f8cbc82a614e950dcc17020b56d1b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b65cea9ba8ccc70b5a800ddde752bd24

    SHA1

    56f1cbd4b3de8a0d51d70c0e0bd28c0c4a5f6f3e

    SHA256

    a61d13c16ef5c832643fa9d66d9fc049fa93cf16a6f1baa12068445228619818

    SHA512

    f43196c3d97d7f226703d9ebbf6df6053c35f54b1b649c3244fcbdfef2d091447593c14c337e44d801903ae1c6e825f19123a017884b8b64bda0066c48a75482

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d9265480ece1e5085916e34bcab9b685

    SHA1

    8391f007a92a385696654cdf68c26f27d6d2e475

    SHA256

    3f0511a41fa96ad794af4c69f897f83862aff0c3e5328335eb7b701a6f68f6cd

    SHA512

    15a621f74f9eaea41200bbfae712c82478285f859b0686b16969b5a40c2dddf3fae2ba3357fc65a67eddfc6dd2719cc9ffc2f025cae52c5b87939e59337a974c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b0c7902db9fde54d8736b4efd47804b7

    SHA1

    36d565a4ced9d142911fc277b12d1ca4cddaf964

    SHA256

    4b2189435859948d0b2519e3e172905fdc22ca9aab54bf008167df2a8b1aa962

    SHA512

    5f391fe6560ed63d29a467945684beed8a851c62fa2467e20c66496de72b07184a8432871daba2deb8ca0109a271f8310412167f33c2392106e12642ae796613

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    16b2ad676b7f9c37b4db2b2f1f5a67f2

    SHA1

    6cd3138c9fe369181d19530c080a0bb9c4793385

    SHA256

    c85965cade8ab018dc5d4805694785d283b48be9c7d8e8c09500fcf5ac24c6bc

    SHA512

    31b261373762d86c21ca806b680784487779b5427177e28908fc2513125ec53d1823935d5425b21b35612f711639c8f3564a4c61ffd690c25d16ba37bfd0d116

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    286b2f55f89b379cde3cb1415863299a

    SHA1

    e71f0513dbe664a8be5345d2d5baa8391fc80167

    SHA256

    1a6b487ab4cec0703a0aa5d04c14d6af19aac8212068b663599f5afaaf417b39

    SHA512

    91f30ef0334e67e3e27b32a3103c4dc64d0957327362a3673ba1a436fff6ce190142bd7d0af078fe196a56ca325ea9160f9e65d54aca220e32989dbccf58a2f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    06843d7417b7c4c8bf117886879c83f9

    SHA1

    d7dbeee589772843ed61195ff594dc8e91127829

    SHA256

    250adaa775e56fc0c6ae56949651b9d08b77417889a7d7fdd84cf22cde7f0a0b

    SHA512

    7da2e06967c80a6947abf20411d59fc1ac345817f0a9c93a4cf1fd734dc1ae2ec5a0c5bd82ca11990a7ff8618cb92697a543817a9a9280985515c5a669f9a12c

  • C:\Users\Admin\AppData\Local\Temp\Cab208D.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar213D.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2172-442-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2172-434-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2172-433-0x0000000000570000-0x0000000000572000-memory.dmp

    Filesize

    8KB

  • memory/2172-4-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2172-436-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2172-877-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2172-878-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2172-883-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2172-884-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB