Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20/07/2024, 01:05

General

  • Target

    5e700f2f613ae0ec3501f2825b892aac_JaffaCakes118.exe

  • Size

    193KB

  • MD5

    5e700f2f613ae0ec3501f2825b892aac

  • SHA1

    1821fe1d2365e53a2156118c9cd07b83dfcc67b7

  • SHA256

    6f57fbf3b1553f57f64794a7e5b2e2e10a7834d5f7f05df9b1fbf85bdda0967e

  • SHA512

    d3f3f4f939041bdd1b63a1ba1d62d7fcff82c8d64de4c848ef20cd957e7da709215ce8a9e3d9374817bb352ce397a4c4f53d05b67e8e0c906abfddee290b2696

  • SSDEEP

    3072:bDQlDbvjudb7eQuneaMfRbk1N1zOMVsxN5k9yEmAtKDHL+:bjugZbkhyMV8MLYHC

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e700f2f613ae0ec3501f2825b892aac_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5e700f2f613ae0ec3501f2825b892aac_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2660
    • C:\Users\Admin\AppData\Local\Temp\5e700f2f613ae0ec3501f2825b892aac_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\5e700f2f613ae0ec3501f2825b892aac_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2732
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2748
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2528
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2528 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    63aaaab3697854daac364542da0557a7

    SHA1

    f85c9af98b2e793286f9ba97fd6176f0070685c0

    SHA256

    0b21da0e3e43bf53e9d42f0147418f7ed112d98cdb6e307c54f6fb9ced75e0ab

    SHA512

    d0c7e0991f830c49c92db1af9281da33ddebb3bda5cc4dc5ad6f38f14ee90204c9cfd07dfebf01ab6a040e583027e8ea6a3cb991a375ad1fa1f18f5c0a1e17d4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f90cce2c48716b9df9760bcaae862d62

    SHA1

    3995e25fa47b95c7cce710743c91157a47e20435

    SHA256

    10c32a6b2ee700c772e1f2aa0a20b6dc9316e5d4b5b3a4044a6e98314a7a1ded

    SHA512

    db70f338c3eeab8de234631a077550480da4688766924ed6985ac920de01edeeb9eb59dbf7ddfc5b3808af0eda99be03f73e9df146eb23f587b669a2ea1ec7f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    46cb53fe2b795b560c127370b6a11788

    SHA1

    fb49b16e6c139ce2e997ceb6587bfd40cec4ef2e

    SHA256

    50a4a438495cfc0a5b68cbd323e17fc2ab4ab16c4d5ac3387629aada15e39f04

    SHA512

    e7d8bedd129530a96d5a73053c6bc8160e4f9a852d8c68e86d91931b4cb045b348e6b848131f39014f07d48675599c20e364a3e3efd19b19f807bc2e1941b228

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    989b48809d770a20257311afc6aa98f2

    SHA1

    eeb2aaf8d3fd5390f03b324e8925bf673e5251f4

    SHA256

    6fdc1c52fbb4ca25d6ac2a6883928770ee0bfb85235b11b72909fee6d826430f

    SHA512

    8aad6e025de5892a2379fbf2522294e47a7a18956002bf4ba941a78be12ebd6b45d60fbf6add53cf46af619cb6d83494421e53d20d050578d439c1381664043d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    156fbf5e03f0663d5f820f298f097971

    SHA1

    43fbb3caac72add40d943b9193281da0413e7668

    SHA256

    5b9489a990d7f6c765149e1bdf850be352a8ff83726ad3f64b2a959f6240dd35

    SHA512

    27078f61eb9672348fdbb5fe3dde510b333496a89d695f1f82d169159045ff141711dec75ef0b3dc23323eded03fbd3fcd91e5a44e8960513abcbbac83aa6368

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3b164e52cf16ee4482a27280e4bd62d1

    SHA1

    a0f757f1f6196db80e6b3c204ddbdaef50568e2a

    SHA256

    407f05df39eaab26662ef635db7a0b70186c962973a6b3f62920e4058188acbb

    SHA512

    4a668c577ef558d33a5684a05f734709dcee28af5ec031b3bedacfa4b6d1824a3cea843196f243c66979c8843bede4f90bca026f85cf9253c441000030099dc0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ad038a43115ab23d64193f2b47cc573e

    SHA1

    90a47e303016cb989dcb62bd04fcfc1d1ac0a0e0

    SHA256

    60a8443c77d92b7c4f6813212c37297d7f71f8d92ce768e52989ad5e70c3d3d6

    SHA512

    b61a5d985f6678a0eeefb8c0b4c5b59f1f94d5b5c67549527e33b39cdf463fdd7e81dea342f2d966003416bea0c335361baf6ac0062ae1efa1d0d2edcec56fa9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bd15badb48dfd0ae71972239de8a1f26

    SHA1

    7fc52a06bfc69d578a2b05a27ccc87b4083e44ff

    SHA256

    45c03b47e0350d2a287cc023baa0c499b0ab80b3fc6ce9993caddcee73aa5799

    SHA512

    c9504e01f16e7285cbc42816388c7c49a953ee608153a5fd609dd39587e6d47ede42346c56abb541e41e91c500766caf748670f0b0289aa28f564e426734f2f6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6503d2fb34670dab74868b26cbee70fc

    SHA1

    50d47d993c8c249b733dede35f1ff92162bcea17

    SHA256

    28599773a551d0426cf947326d9c58cdea6b6e41051ab3dbf5f2510e1015abc8

    SHA512

    94664a5669579df1dcbb295f7fe336bda9cb6a20e69a44de7f1153487d08eceff17a07671671818a1b5c72bc26432be716bbd438fa77454f17b4c8e26a1dacbd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b260876f0f4d9a42250088c337f22b35

    SHA1

    53857a57a2f7e705bada4ad98f7b3dfafd1c996e

    SHA256

    06c97bf368b5ae94ca99aedd51745e38fe8bea74d8e885f32e2f627c873edef6

    SHA512

    052acf265e3fc114f779c2892da837ea1fe991a52b46c4285aeb1b256d36ba0f6cb77e0030f975e8dd6690b514b79bf5e4025029a9c988658a159e1e2634ef51

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e8a043e57dbd80591a01dc66c1e58cb2

    SHA1

    00948dddcaf05a4cc888789ff802090fc5d5a569

    SHA256

    52a386e36041c9c05f7770c015149d7abe073fc22653bda83476c6d6a177a7cf

    SHA512

    76cee9daa22f6f9cea673b8881924c3000b3b0fbfd7eb4ff90a745fc16e794b80952e00907d53fefff88d59eec5c9143e0ff21ec81fdf2c2fd74e668d2eccdda

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c4b1bbe339bc1b3fdb0a6bdba4763af8

    SHA1

    b4735bd0ec828a8010fe6e9307434314ff65194c

    SHA256

    d0a063c2f67a01b03c6e80365747b9bc6bf901bb0aaf4d60fc6d10d6e010a38b

    SHA512

    89a83e0928fe8ad9529b0f2bdb97c361f8e7dec0777276f830b7ffdc3a6e5e388917ebb37d8d2af187d20e4be746d34642c16b4cfb177be514aef5c0a03aa31d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d8abc398ffcac0b19f782e3b26f7df42

    SHA1

    bafaba02d209a30be359662fee7cc9ff47d8de2c

    SHA256

    6701c364e906e3cca74c05a9bacf2f94ed6baf792798b2e9321d5da3576e5d74

    SHA512

    253d2791ec212de39a08240c6db45d9de97bb58168198715b49865ba03859d0dc2ff251b2580f600c7a4cfa7e5633267234da0cf2855844445b1e85fc60f2cf3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f5c3f983e6756d9dd8b73ef83c0c2608

    SHA1

    307fac24f37e3a05ce709f7491f2999ede796651

    SHA256

    05c8fd2f91f809b03df60dc108cf0628d3136403b4a4416c73b96d30a0ec4c4e

    SHA512

    be7b22cdb64cc2ab86c4dceba831e97186efb11689ee541c14081ab7764e8cd7459548d1a3ea6b3623026c531e9afaa18eeb78cb24521152f7208cee600f696c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ee32b5424068e16f77dc3aa542655058

    SHA1

    b00e7711b45c1d8dcff2f8a006a4b9153815b9ac

    SHA256

    1825a006964df898ae5ea45cecd5868ed4b3668ac82c06182d43260dea38073e

    SHA512

    68565e77b91f59200bff09302774155fa5638c64b915e9975a65a841f84e6aa1e8621fa14a1730133892659dee397e069c14f0d5129bc3bd87d698576edd1c26

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a25b71b60c094b2e93a73a13bc7a45e8

    SHA1

    7d7c8bb2ce0346d4b705236cbe2f527f8ffe94ee

    SHA256

    4dc446443488dcad2c363fe10557382acc02e08d21f6c46527d80e0f209acdb7

    SHA512

    6cb562f84c807f25253fc59c19c39530227d768d3c1122ec2789356af341ec88fa84057c77ae0f36095702e9a0212b568494fb6c1f4e09b7e06a57f1fbc1fccc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    349c389a2769b532208aeb621ebc6662

    SHA1

    b111fc1bce3106ed91e5249e723b27763f01a980

    SHA256

    44d62f25e95f13959fd51bb5c5046327ba5dcc3374c074ad7eb3259cde1c1e15

    SHA512

    3be5d17b165d681df4d584ff4eadbb2294a8d6531718907744c8965ead75b7623c8135325097c284d7917e01759afe43ff431ae45b5b04ea34a911d3d374b2a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f86674389f21e9c31c71d3a9c78b33a8

    SHA1

    7b41d8944b496264096417f1bb546145ee410e92

    SHA256

    2277fef04538c5d1ebc65bb66a9edf5913a72a8e34676fa5c9e0f4257eed1d63

    SHA512

    9dd0a627bb7c5c7b5ca31a6fb817bb7e417c6778038cfc59d2695ae13c9a99200c27339ddf2ce7d34363862e59939ba9ff27dc5757514b972155fc974d0aed07

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cf1501ea51236ce986e49b4d5c15bfb1

    SHA1

    e9348fb31ddb7b528a056dc4c094e77fa2b59317

    SHA256

    cb8ef6739e8b2f887742a73213306fbcba4626b9d4d022e6d0ce9383a040f763

    SHA512

    b46afc873a6c6773fb6a5191b47c41c3b65f32942763ba3c1f40fa1d7b5014ea5231048c5757b090f7e83e29cf5e2cf382c52390f6b50773953d34b3c1280ca9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    59ad7fd8790fb1f1ca713499ea9bce48

    SHA1

    4786fba489dd643b8c33f5b1ba4e3a17a340196f

    SHA256

    317f594b938034fbaba240659deb4f3c82a244310e38acfd107d8699ee383997

    SHA512

    e02c78abfbcfbbce8b20fc031719ed7cf42a425994e4818c79f10972ef5196fe4a4c4dae6208088869628348dce0f7d1fb81247e6c843d14a22dd84291ecc3ac

  • C:\Users\Admin\AppData\Local\Temp\Cab55A2.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar5602.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2660-6-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2660-1-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2732-12-0x0000000000320000-0x000000000036E000-memory.dmp

    Filesize

    312KB

  • memory/2732-3-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2732-7-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2732-8-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2732-10-0x0000000000310000-0x0000000000311000-memory.dmp

    Filesize

    4KB

  • memory/2732-15-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2732-14-0x0000000000320000-0x000000000036E000-memory.dmp

    Filesize

    312KB