Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19/07/2024, 05:01

General

  • Target

    5a90d4bf3bd54bee01aaad4601d91729_JaffaCakes118.exe

  • Size

    25KB

  • MD5

    5a90d4bf3bd54bee01aaad4601d91729

  • SHA1

    5d5027a7614a364ca263d43483a3d874eed41d4e

  • SHA256

    ac2e5f2b74f6157e498fb2ee77433b71d4cf8d98fe943e3794b3e69c0c285bbb

  • SHA512

    6a8b023d9beffc975f8c51013b2e306484b1d9584d3c1590fb6a2ca9fce630e19b3fbfdeeff78b2dea630b6b73d433618ed7349ab54a2f1ef95de28df42feed2

  • SSDEEP

    768:SenzHbrA8QBAiZsjpcUdOlIfUxEvFdruT:Sez7rlzxDUuvFR

Score
7/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 46 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a90d4bf3bd54bee01aaad4601d91729_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5a90d4bf3bd54bee01aaad4601d91729_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1916
    • C:\Windows\SysWOW64\wscript.exe
      "C:\Windows\system32\wscript.exe" //B "C:\Users\Admin\AppData\Local\Temp\DgreqMpza.js" "C:\Users\Admin\AppData\Local\Temp\5a90d4bf3bd54bee01aaad4601d91729_JaffaCakes118.exe"
      2⤵
        PID:2312
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2116
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2116 CREDAT:275457 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1164

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      bd289dee3cf1a78e2dc470cf884376d6

      SHA1

      a4640520d0ca894aecb7ed69d143d277f382da0f

      SHA256

      663983c61bc8a7987029cef4b1add0d2ce0235aadbe0b4d5b227eb9aeda3a97c

      SHA512

      a0346fed5e34904de1b3d888c820288e4b730ce7f14a00968d28f3d87f09cae3ad253b844440fe416418e6599f6241dbb23f9cc0c502b6f0a1e9f35e2ad443f4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      166187dbcf9f7077c9d6ed0f395cfc68

      SHA1

      4de8664b0b0b9d05992acbd2b589bd1e00aa3abf

      SHA256

      66a1847f95211987d1cfb7b0b842edb5ac844c2ec6c4d048e3f0dc3430a85d9c

      SHA512

      b05bd25a7dbde36f717375033558f84ae2982c33b1fcd9c37fbd1d115ef02eaa6e4095d32c8368ea0f30e6fd376d563c84785e3bfb9fdf484b256a5fb67e4e88

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      a0c1cbb5cf2b62cc32fee498e635d29c

      SHA1

      848a1e52aa69dd9bd5934888399ce5ff1e512ab0

      SHA256

      33caf9b190958a3ebc50f9a5bede5dd6ee07cd6596e2a43c4555699a37e6a08a

      SHA512

      c733c68c2cff121ed037d8e6eb3ce284429542f46b7e9acd10cc9e8455104d1f98e8f4bf7d9bab354e406e04edab77a8c49e38b95ac5fdd578a9f6591f3c3538

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      602f16ee74b1d094d113f78fde7048a7

      SHA1

      90dd2fcc85f8b1d4c875322a67dc53d5debfda38

      SHA256

      dd66c3ec7cb30918a5a46dbc2be34f9f8d3be464f6dd24264c936c782fa6eb8d

      SHA512

      a78f61d5d49ec2f472932afa97c427b465dced5c8e4220edbc1e0226f693ce5add3f4b9c168ff193e5e0b552d1d66fad5444914507ee77da8ac4e7203d25c8d7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      9b6edfdb211f44d4e3894765d8c194de

      SHA1

      461e03d6fb4e1095ab02c745d6b582bb895170c4

      SHA256

      d26a2c4283c3560e000f48707d4e262365a21ecf8f6cf6dd56eb0ba6e8847542

      SHA512

      1626510a74b274c032a0bd84e7c6be2b697f461fe47e525c983d362cc79c793f77a202bd70d2c2cd9adb3df0578ff0e488cf591671b412aff11dd64ab65a45ca

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      83c27edc12d18f678d250f73cb08a0f1

      SHA1

      a1021b71d5e4ddbe4601d12871306f1f78f8df5a

      SHA256

      a1ea27fbbb6d340dc3ec840abd1d85f4c296787c15cf75a8617bd1274f8a0238

      SHA512

      52f280e940ea22df8a05dcea0d9104c42b7517803be02da96dd835aa1ff27fd1b2a6acadd9783a4e6b018b1145e8fb4619622f861e47fa467ca736e58b12322b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      002b5ea942a49918ceafd9ecaf010826

      SHA1

      d105cd6112e50a5aa36707bef8523d9c2b86ef79

      SHA256

      3d6d95c351c429f2a58dc853fc880b8bac16258e0bbfb7e288b5de1f9b60728e

      SHA512

      f7eea0117dbff3bbb89aef09212f089f4770d304e96fc4632b0003e255fb59a22d64ca9a43bbac9bd18b83c120444b0de3d47e53add06f1014cbd4a13e5adfb4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      0b171b45bff4e27ed143e4592fe35cc2

      SHA1

      e252c3aafce34fd640c7dbdf9496df26a20a9603

      SHA256

      0bcab9260f2b7eab1be001281b1289cb9a4fe65c5a5c3db3a6eb1d6150435c8f

      SHA512

      35100636cee242b0f88042cfc6d5faaecd821064504f288ee6571474933df76c085a5d8e856a551044e7d4667f5d9adc1b1e13579f1dd7e0265f61ef8320dbdb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      e66c9d74897df0f489cc89f01b32ac94

      SHA1

      2f7228276ae7242f133c4fb8e901aeddd94f9d81

      SHA256

      06b4d4b06b19ffef2e1ddf33a0e0b470c2859fc17098460554833f99fa03877a

      SHA512

      fe1152a22c19e9f8422a3235be0398e4765b265864c8aee0b97a3a110144da382e38d0342cfc21b2d3f1d0a12f470a33a715859c605c894028e234cfd135ffb2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      ff9226770b9d743b8678a451fa7b3c68

      SHA1

      4d7e16e67264e2e2915eb9d3e0c30d8d531d52c2

      SHA256

      9a54a4672d60c14de2cd35aa5f325fbe10b1f9513d72a00fb284821bff7be646

      SHA512

      a625f0c46489d51245f48453e33b0acff4c4f2cd479314c486213b9c71092ced3c5777f44f46b63cad3ececdbb99d218d2a0f4a9c10560ebf73fc43a882b3585

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      4e4d15fb8684a4a640561a3bac347bff

      SHA1

      cb6a8acc15d812c81d04c22f5b2a73e87accd36c

      SHA256

      1e8164cf20bbdb538b5c3631dee639200ed9b92af607d03fc2f1fc8c3d39ccd1

      SHA512

      b85401e04a30d560a16353fe267fb9c098e4af1c2443625aaf924103ebb961e8e286ca618edc3f66a7df661b68bf50400e1ec01f9fb4b6d2b548ec7b376e7081

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      238cb72d7abdf7b1b239adc15b6438af

      SHA1

      1daebf277068a52e483813c9324bdb435a78fd55

      SHA256

      34788aca20779089fb84188c37ab5de63f8d2a5085cbda6b6206140151e3dd89

      SHA512

      430d955dc1fc8dd584aadda4d5208af0a7aae0c7bc41c0e7474bd8158ce720750053a12ccf8b97db583b0f0ab0c050aed1b0db8ed29ef22b15378cc00ac1a231

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      db32a8e45c7425ba0ddefe307b3c1df7

      SHA1

      e525693d152112c7c2f6d82e1a0655981a972088

      SHA256

      8e0bef9e23dfabeea7c9241575184f335ce65fe6b56c24329e3a87c094936350

      SHA512

      beb7b5d90298e47e4cb32b84ecceb201b681324f9ce26ca0afbe18d52a1f7ae4ebff6e6041252b95dbe509d958fe2a38932715164f2bd71f9bf624fb3dbd09ba

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      9ef569c3ead65baccc7a14abea389353

      SHA1

      be431baa25b36938654d31b042c7777dc0f3eb86

      SHA256

      c25f0f99bec63d89b208bc924d92cfdc986a65cbc221184b6563382669a2a774

      SHA512

      9f2b925f9152a1c41626fbad7004e4a0fd9c8afbbf98e937a9a0e8e1be92a271fde1105bebc76ec2f18fe082632aaf7dce16c4f71f4767aa178b815450a28ee7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      e8b72b0bbfd22035fa7ec63b9a9aa99e

      SHA1

      565aee47c99e33fab6b8f56383dc06bf66449ca7

      SHA256

      b6d4baead823e6fdab7e112d782d8cec8dbb8328584ade7a83f772b38f38ee2d

      SHA512

      dc9053e6921764b8e17ada0b36c15315a312984af36c788f1713675588baf73608cce167925fa69789cdbfd3ee279997581635eae645340d78f947a91f8e506e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      f32a8df0ddee12807c64698f9d6cf8ca

      SHA1

      944de89d60231a79195db24a30fd2555c5ed4810

      SHA256

      948ad51ccbb6bec9ff7ab8a58596a760b419ec3a29b5f035a8515551d4aedd8f

      SHA512

      35c2d0fcf56a21360b8d557130f1622afc46a6e6798df38f50e48b4533444d728c10b8721c2dd15cec3a3188cab0256dc659204e52bdb57195c0ff32001b3a07

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      025df9c4fe79ce3b0f7e71da24a3c163

      SHA1

      fb20f2c07190c7d4f87a184ba75c848f3ce7de71

      SHA256

      284cfd42db2c5627e52afd46bc4560fec9d9b5fe02c6b556fb2af4b4de8bf25d

      SHA512

      2b8ed556314d68e217c60f69f14d5260cb8e439860721d264faa5e018a3ca1735173e418c2a2e7c7beb1870d88365b29973cfc1c1b9715cc550dd6fdc6cd85c7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      82f2004a8d0eac4bbc805648072f43c6

      SHA1

      55a0e970225a5cb6dd7bf556074cff09743b046a

      SHA256

      feb7e777f4477290894756b4ab71d308cf65bf8b672d7780902885fec9ef9b02

      SHA512

      0680924a1600acb39312fef689f3aac9d093a6af5901a19f495f2da402e66ed4987528c001f8ac829a4cba7bdb1e11e729b6dbb50dc0e208ee751e93297bea9c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      2f8bc3750cfd048d322c7eadade77c4b

      SHA1

      6fd7a3b1b529f5b115569708d7699274c68c8c6b

      SHA256

      d62303d7b66b3bc036a38aec706b2a054c83a6f65e4632349c631990878946ec

      SHA512

      b5cee66ee884ecfeb3c1d303446baa757027a1dd0fec1d8aa4ca295268cae757bedcbeada74884be7479e58e84585d5541c42b71d96f507a3f36bd51c1f71176

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      f2f4481bc63a7ddb1d2acd16db9978cf

      SHA1

      afdf29c5f664739618d6da41e5f1175529ace621

      SHA256

      326a1d82c7fe3088322de5a7d940b99886afadf3d6bb2cb8e477c0acb465a66f

      SHA512

      faaf312cbe344709c3006998a92090c1c54d51b33f550e8f236cf08aff40b0086754f17d29f0a8bd68043ecd9cbc1dee4cbb46853c3b5f901d952ff542c33403

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2LF9I1AK\favicon[1].htm

      Filesize

      291B

      MD5

      b73189024a094989653a1002fb6a790b

      SHA1

      0c44f096cd1fec253c1fe2fcfcd3c58fe05c402d

      SHA256

      014c471c07b2bc1b90cf5b46eb8eb60abe3ac278e43cd8fcc7c4e6c8950c592d

      SHA512

      1bca726835d33847812060c968e5306535f513429de5c90d66942155fd42ff75508dba97da8ca36c6d6e6a8df5a2602fe3be047bb5612ad4e367c6c00e1e50a3

    • C:\Users\Admin\AppData\Local\Temp\Cab20FB.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\DgreqMpza.js

      Filesize

      6KB

      MD5

      fa7f5092f9cf70adcb4efa42c9f95359

      SHA1

      fcc83240d4a4dcaa706095107ed3cfd52e295638

      SHA256

      c8af8b7f84709daa13ac7ea787dda819f184ff17d524efdf7513883a0b1bb58c

      SHA512

      a79df4f6c1f51684058a51cd2bc775cb157649c0d952f1ebc58b671f423254a021e57e0f609f40a68c83658957db2a984a657b596a9be753a1e677629a08203d

    • C:\Users\Admin\AppData\Local\Temp\Tar20FA.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • memory/1916-3-0x0000000000010000-0x0000000000025000-memory.dmp

      Filesize

      84KB

    • memory/1916-0-0x0000000000010000-0x0000000000025000-memory.dmp

      Filesize

      84KB

    • memory/1916-4-0x0000000000010000-0x0000000000025000-memory.dmp

      Filesize

      84KB

    • memory/2312-56-0x0000000000410000-0x0000000000412000-memory.dmp

      Filesize

      8KB