Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    19/07/2024, 09:31

General

  • Target

    5b5e9f6fade1e61ee3e3b79741fbc7a3_JaffaCakes118.exe

  • Size

    504KB

  • MD5

    5b5e9f6fade1e61ee3e3b79741fbc7a3

  • SHA1

    6957b8b40431d95991c6db9c5e10f58914e25244

  • SHA256

    f8abd274668d6672cd420af842bb4514e250706823eb482512fff90dae26759d

  • SHA512

    e7c7cc4f2a4651a5fca28cbc3371024b063fdef34b0da5200b9a98adb514301fab26cad09b983950484e0b7c24afe56e24ef1e91d47a027ba0e336d5c2e130a5

  • SSDEEP

    3072:uk5IVqhV55acSC0m7V5NQgI3M20GO5aqjDAugiaOCA8Spout9:ulcCANoS

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b5e9f6fade1e61ee3e3b79741fbc7a3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5b5e9f6fade1e61ee3e3b79741fbc7a3_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2092
    • C:\Users\Admin\AppData\Local\Temp\5b5e9f6fade1e61ee3e3b79741fbc7a3_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\5b5e9f6fade1e61ee3e3b79741fbc7a3_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2932
      • C:\Users\Admin\AppData\Roaming\Rwmqmh.exe
        "C:\Users\Admin\AppData\Roaming\Rwmqmh.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1744
        • C:\Users\Admin\AppData\Roaming\Rwmqmh.exe
          "C:\Users\Admin\AppData\Roaming\Rwmqmh.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2712
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2664
            • C:\Program Files\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2688
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2688 CREDAT:275457 /prefetch:2
                7⤵
                • Modifies Internet Explorer settings
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of SetWindowsHookEx
                PID:2584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e0fa62986a44824509c3bacf67c4f2ac

    SHA1

    8fa45954a12a95a50947d4525c2c8384acfd627c

    SHA256

    6bfa64e7153f66f3f82b8df6b2289ea63776e20241345eccd7f7448fcb100afb

    SHA512

    28da55bef3face6d85f90fba5cc83be5f4ef62f2ec63590794906b56de320c210729dcb4ef32be528c9bfde6ec7d6a504474a362e4fff5ab3ac103a70cb700a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0a42ad6e73e03a841f61e2f18ed94fb6

    SHA1

    3d9411afb9586d1eaafbf5b1364b8cda7f1042d1

    SHA256

    d934d3be74e955f4b9409d535b2fbfc74a72e7226ef9d2e2ee8a74f598ccc8d1

    SHA512

    2ee146b449ac1ef1929e8e092b055273eadeec73b808a269a1c42cc051d492b5388ecee4b1035c9b3ad968ed836253b9e61a030a218f683776f8d13ce9708f11

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8d12a52ad4d77a86467c3f7f6510ea9e

    SHA1

    883b99d3a7638c94d97854e7699647e1ad238eb8

    SHA256

    047dd0d8cb120453abe0eefb8f06cc2e95e7c190bc6684ef39aaf086a98593ee

    SHA512

    0632cd642e7f98e2249ad77be40dd4d8e1d5a47cf74d4a6dac562917ed33ec0044ed0f0db6f7874a288ecb8535b7ae73c9b355d5d71cf969213a85b534630ac1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7f1f397743093098e4a043d568caf485

    SHA1

    8d72d635e8edbed48207d0e7a44f12c1f421e44d

    SHA256

    e61db0cf9feeba68d1b5449fddf1d0487b9dc1dd6499e4678727bae8cc28c5a1

    SHA512

    e9db33b4954847863086b76ab609285ebc9ff4afe4ce6e460e063d7d9f8215be6c3f8cf85e335f3019c7bed2d28e7fd63802c9db3d029fc7b17baf0133c4ee9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ae2620cbf601d5c3d539d236bcaa8819

    SHA1

    43f96d2b8691ae2f31b307c49245c76b0c0c65eb

    SHA256

    eb3fe5b0fa4427ed8499c8d6b50dc26140455cc120b53df3f520d8a66de6e6fe

    SHA512

    61917bdd0a0a7d798e0aa62704f263cd33df9184856a7059a03863051f3067b5ef71e847623f10eb2712b6a7d88ffb9ebe4232ff28bb30132ba6e97edcf4f703

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    821f024feff43482694244ea94ff1426

    SHA1

    c124ab146238ba86317daadc262af9b8bf3be6c9

    SHA256

    44baa39c4d29a7d4a7723cf11cf800a687a52fd1436e6b3987ff146c9df4d2b7

    SHA512

    357da9c1fc2b027dbcc9af7c20cff302b7efc1a6efa56aa910a3547b90e058555bca659f2325e8927be9d02b9b9f05f57f50f1548d6c26c6da050ef8ad94a61f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ceb3fe9a12723df92d4092e1bef6230a

    SHA1

    3fa43125037f4fd919feffe220f0b587c3c9ee53

    SHA256

    ec83299344bd976342a4d1a7cc5859b7ddf09ceffde8d976566bf1ab42defccc

    SHA512

    6d2cac8e5adcccd64bd1f88926bffe6df7f995e48b0130e547e0c549051bca1a2a7918692769232be5bed5fb6c3152eef30213d1165dc7bcf3039a4caa103958

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b068ddb457e936706f4123070dddec70

    SHA1

    e67de25a3f114f21282ffaf2351275931c32f5c6

    SHA256

    6558e661c9820e69eeaa0f6c25a9e464ef086ea069c1c4335811148ec45233a2

    SHA512

    a6a24de9486337ef2c7c22aa16906be8a07790421ca96673e7aa0752501b5ff58a4749b734a03791f811ef38f14c525d141ea79e1000f381e6ea5a042bb7f96c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    53fe0fcaf4017ce7695e8dc25c869225

    SHA1

    1ec4989c402fde9e94eb50b1ea7ef4e9c54e727f

    SHA256

    47d7c94789e04ba3c1faa13dc561ce7a791424cc419a3ff34cd303c5f09be142

    SHA512

    e33ffcd9252ea8f5e1b39be16d63b1057227c1bc3df0561df306ba93114be44749d2f22b5066c3827b04eac9a28d1412df5f339050477b252e12bfef2380dbc8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bc2016ef9c734debc37d1b9577837f9b

    SHA1

    1a95fb73fa207a6b78ce7b24db120dfee581c2d6

    SHA256

    da23f605bf1d93d573e2ae26a568cf1ae4345884cd5b5b5df5227720976d055c

    SHA512

    eb3e9a951afe7f532323921a1f42714a80a4ed05de41ae51ba956876c60cd052608183faeaa360238e3f82cb64d2df8801ec873d60651bb47cc93f0cf70ceb7e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2d8de76678b88405f7fd5aa0fe2a2670

    SHA1

    90fb8a235aab63f085e749d16e2e882e5e6d7342

    SHA256

    0fed8ab50d5d9d12b2d4e395e33983e6f4f3cf6bb7d958feffa125da4b92bd91

    SHA512

    5db44ebc824867a4f1e1221fdb6676c1232c54ece89435fa28703ca005e3a1bc6c215c1b3736a01edadd7b905573953fe6b4f306ba9df8d4c033a4cff3bb058e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    61d8ab3c98d7b3d9cc4fd93d95732465

    SHA1

    4ff20147b36b19969baa1ec1f8a7813beb084781

    SHA256

    a68c7459e9abdeffc8c9a00dbed666e4374a71aaf5761c257234c84f9b831bd8

    SHA512

    f33a16c8144851556d81d0b246b8b10795fbbb8af31ac75c95bfc16150170ee958504062214a556dfbeecb0b6b6b8970b3fe78fab73d827a627d7fd004693f53

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    490191aedc34f9dc6b9c6fb6cc86b59a

    SHA1

    2e906d0b08b8a8cb2c3e2f5d8c27cff15a34866c

    SHA256

    c78a9893ad6b561884894e0e0eb6c06bb8a3745ca02e20aad039708c9cce26ce

    SHA512

    f877e91317e5308526869f823ebad31af5e468efafac380b5cd34df84f929e44501db167f63a8256c221f9981186d30858a193e40ec2e24078bea7f25427813b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dcfa87dea238689a74ca55414184613f

    SHA1

    c2a69a24fae378f461b99fc5efd6e661d16cd43e

    SHA256

    4caa414bbe2120fa27f1cfd1b1cd0b7260f578899e57bc3987f0573cf0ee4b59

    SHA512

    9e886869ca26f9e99807ab6ab26eb235535872e6d63b48f653d58b2a4d712e46542366003aacc43988716337d6f0ca7d7037bd68fb2e466ae3b4d34a7ad1f06c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    81f2a6d17d38b59eceb6cd900c8f00dd

    SHA1

    59a04fb9eba6645ec4c0f8cb47b4a5e4758553e5

    SHA256

    63c25b65deb858dc079b914fce5b3560852b51f4e45f9551935ecf3b4e7c8b8b

    SHA512

    a2252ad01ffa243f6fcf30ed1f953469b3cbd42b1280ddc81abca8657b6d23247af5a5b7a762398d76072f89727e191a8a2eb16ff552e431849c534b675bc103

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c02220e89c6bec917a7a50577a4d60a8

    SHA1

    315187a7c2a80e65696227a1d049211547db8504

    SHA256

    08c2ab86dae752ce12821765c146e22f8ebea0c820e0d6010e9d035686a1b18b

    SHA512

    7d70de8450707b380c209a0dc434384ae5562366b2cc7e65c119738d9e2492f2adbfd0458cfea8e2c6188c0a27cab2d87020f3a240f81c75add7f32fdbab014a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ff00ae6e70e0c0e6909b5425118a7a74

    SHA1

    fddc9592aea4214249974c08e207bd689f4604ba

    SHA256

    883ebcc9566ab7dbd573b86f9e831e71fc61858ce7b161a36069bfc35f1442a9

    SHA512

    3db59d423250d31d0b9f4e850bbb242901f8cd77d2fdc08850d3b636705a9cdc2a77ed2a20497e92791b9abc7d3c1a0a71ecd603f0aafebe41cdde6ea4597c40

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1403ccc177f4fa45b5e2163dd71f24c4

    SHA1

    16443c19fdfe8977e0ddc4bb0773d330a136af9b

    SHA256

    7454899400b0120323f53f4f1f32669b931f8ed88f796ffa4c2919131c8c788d

    SHA512

    b843da5a855e059ec82d1c1a63d97f498bc85eb08809dc7e162e8b3380d94b30bde3ff1f49c3f33ee3c0708aa264fdd87ad1409720976d904a97e4af601077f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b53d1dcefb941ffebed8336ac998590b

    SHA1

    492640ffc2fe29fe37b8cdbc943510de22527d1f

    SHA256

    292766b2c1e01b50b33cb1016996bc0ac5c65be4b1beef6be44617c7d8c0aeae

    SHA512

    f79f38e03abc25a043159187b639e98a0f4b78340fb2cd1801791bd6558774095fa65a980fbff92dc628abe85d27fbc326ad0fa76563d5e62c6bddba4dc7ac7a

  • C:\Users\Admin\AppData\Local\Temp\Cab20F9.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar217B.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Roaming\Rwmqmh.exe

    Filesize

    504KB

    MD5

    5b5e9f6fade1e61ee3e3b79741fbc7a3

    SHA1

    6957b8b40431d95991c6db9c5e10f58914e25244

    SHA256

    f8abd274668d6672cd420af842bb4514e250706823eb482512fff90dae26759d

    SHA512

    e7c7cc4f2a4651a5fca28cbc3371024b063fdef34b0da5200b9a98adb514301fab26cad09b983950484e0b7c24afe56e24ef1e91d47a027ba0e336d5c2e130a5

  • memory/1744-29-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/1744-27-0x0000000002450000-0x00000000024D0000-memory.dmp

    Filesize

    512KB

  • memory/2092-453-0x0000000002390000-0x0000000002410000-memory.dmp

    Filesize

    512KB

  • memory/2092-0-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2092-6-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2092-7-0x0000000002390000-0x0000000002410000-memory.dmp

    Filesize

    512KB

  • memory/2712-32-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2712-31-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2932-3-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2932-5-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2932-8-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2932-19-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB