Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    134s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    21/07/2024, 18:39

General

  • Target

    60fb7de5eee6485ef6daa2578ac283d4_JaffaCakes118.exe

  • Size

    134KB

  • MD5

    60fb7de5eee6485ef6daa2578ac283d4

  • SHA1

    3e693d279df14b54c944e60e281ff2ec65589464

  • SHA256

    479e8e8fb5443e8769171704a2e37c6443d51710e0602482264020828ade6fba

  • SHA512

    98d0f0fe314a068dcddef4dacf069edcb3ea601b485acd2b17dd17e8fb1fe7299ae2acd4f8da60ffcc1f4bd429bf23a47018ba9f56f7a0988c0096a5cc89d14a

  • SSDEEP

    1536:BOC0FvV4OguHxjhpA4Bm7uW0vSUsghQevBFkutIbgTuFqKRr0aF5frleGhd9TfBn:BwV4OgSzBmh04eZFkz3Rr0gwGj9Tf8Y

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies Internet Explorer settings 1 TTPs 52 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\60fb7de5eee6485ef6daa2578ac283d4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\60fb7de5eee6485ef6daa2578ac283d4_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1708
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2476
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2476 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2816
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2372
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    615b5072238386e807dc41d8debd7367

    SHA1

    479217aa584f8c95cd74a8a86b45a88693432497

    SHA256

    0aba7048d6306eb592f487a97e776a1cf9e634f17e38a0b68db6fdcbcf7ec159

    SHA512

    6d25d655f2ca9ff3d95a93399956b43a2ea415b35ef627f4b1124988533f79310dd1e68c232805e3efa04b6af777736fae8e942361d1df6ebe5b57c8c4b3e163

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    197fa819eba454705381fb5e0ee28cb7

    SHA1

    f8635e6fdba3db0e42a94e0a87fad3c10821e99d

    SHA256

    758d0497396fa9ec0f71c1a02861a693831c3dbe42f2f5f641c4d3802f483890

    SHA512

    a660a0a99b6b67b9c47efa2f3633c1ef5a8824f5203f6d3995916fbffd8701ce0bc4f9133b615728463922590f92df93c5f3a5c43764e96a202171b0a9373ae7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    959cabf6fa13a260afdc7ded257aff49

    SHA1

    bbbcaf80bd3293ca1949934c836d6a416e9bf83e

    SHA256

    a9ad85c2a469f186d747a37b9a9b00c944550e36ab166456db5fac92b8e4c5d2

    SHA512

    4f471951303b5351f4d93fbbf2280c468b6f0f01f6c14fe9a0b319c233ab5bd3b6bbabe196d1d935ba8738e1caef9e9099bef53d2e01ec5dd0bc1875396ce343

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a8bc08d648c418f35694a1a6ca1ddd8e

    SHA1

    c66168f2c3d1e5c1349ebaa6e62ee4298b95442f

    SHA256

    6593d1ac378df58022c3d8504afbf99067338a1c957e372b92a62b7059e52cc8

    SHA512

    58dbcec64592898e76b641ca77a54182f65698b3963de631ef6adb63aff7285f6c1610799ac7ed2c948f694b0f8b7c677f8e585e385947688f14da63c7e4dbf7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c30e36d1064010637bd33aeb1a89b3a9

    SHA1

    72ee043130d7b7b645fca62217f2f222018af8f7

    SHA256

    ec935efe62ff74d91e08557701c56d5c4e7840f3f5b13bec95e442ca5b50d470

    SHA512

    c2a1f3437eac39eede0fba7a7d77df2e532d798a07fd28e610246828292b4d4f82c73a63eab812da7c9f225d7b79e8609f7f419c780721fcf8bb46190065f40f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    82b1161654a20f717d1cc7664f2a4b8b

    SHA1

    306b588b9964170546bd1363915d3fb33976d816

    SHA256

    3dd2a0b193eb5a13e5d4ddf3d43c3c1833745cd0ee8b9d6fa703e3b86af44891

    SHA512

    4b1070157ed28b3088957aa78f6bb80b80146f8036bc27dc4a893c795c7cf3d7aeeb0b712f4cddd6dddf6a25851e0059343145518992c5448cd3f476f119f5e4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    682c1688a12a1eb6a0fecde7c9ce63c9

    SHA1

    b8134ab1358ab44b0d4615615e13238beb7cabde

    SHA256

    9dcb20695efc823fcb19c06683687f71b857609ef8bcbe2a6ccf04ee1185091b

    SHA512

    94242de613ad771e0a1c2056492aab7a7a4e20f9d5e30f826a8d6a31d2bc727e7971b248e8c8ea0fe8c8e13e3689d6869a80713023a8bb86635efc9a20cc4037

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c406f578c911ffe4d3b36b02e7ea9604

    SHA1

    83f96d61e2af0a662837e890c60ac378015ffc36

    SHA256

    278a1e9dcace4224cae4d3f05999229f8f7ad5ea5c2f2cd76b55d33553b19f9e

    SHA512

    a771efab4505924fd18691362efa0ec1d4c132651bf4b6a00a5c7d0da94c52929acd79ae5ae0286f3e1128f6ecb4595b986e60bfa92507ac9917b6621f6fe7fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aa89a72e91429abd5bef6dbb83c7e3ac

    SHA1

    5ae96711568c715db52ff4aca8ff3b75bbc42c2d

    SHA256

    e62a6758d752ba7d3e8f749a9f2206a6350a99563593e9130716590e0f0e4356

    SHA512

    7e8deded06eb3493da16d8739186efe56019b1480701322b9724464f4d515877fc245cda6f7e1a1aace0ce3498ed299eab7e0529448b429b63b01f217a0f81cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f15b8a6efb103dca090fbf6d508c3c7a

    SHA1

    f0586871346dc6a178a23f793fd2b26ff8552b62

    SHA256

    90bbeeee94fa82d795f65f6557586c4277d8e2297aaf67d29fa2fa419e44fd32

    SHA512

    7effdd042605a9fd6cd374cac5a599e23855e5621ce4226c0bc8c3f8863cb49d7994d781bba9353c240480a0db36916ee84774f513aac8ed014b9c6646264792

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5075cc6ac99cc4d5f9789303b5c4d486

    SHA1

    27223b8877e3f27b785b225ef8bf724ce5fdc6b5

    SHA256

    78122841b8f2bf5c35f813a20f92231e9d8c5fa38400f3bd43888e74b03f8cda

    SHA512

    f3ded4558e164ba7f2693eeae8e212df034aecfaee10f9a0f56490b7484c3fe6d89798da707dda6eda94f0113379418698ed12c30203d4bb4914553d3fd279a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ce114e1fbd52fb61b27be62998fede5e

    SHA1

    373e2dd9f67737d6096e3e74503b8fea349a56f8

    SHA256

    85061a012fcf028b12530094bc46b2ec3c40388cedb7897a5890779be0aaf620

    SHA512

    c9e31ee0ad19291e44bf9c889f054a76b74f0bc4861e2d13ab01c0d9bdd2a0d2c1000b97f93fe1a4ba3149525cba62d22fc7e601b80dbe203528e30d234454f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a8c070dc7b7a09f1fdbf32ce88d84740

    SHA1

    889f70ff1b283d2dc90c43f5a6fbe5129f7939d2

    SHA256

    57a46bda353a853f54698002875d640dcd7801ecd59dfbf1a2beb8a393ff86c8

    SHA512

    01ce7dcf1eb80a993e631ec99ef3fb0667dcda3235fe9cfb977cb73817de72a54c9c7f3697e444446abf6a634c42dc59e0cc647fb3b80f4bbc6e20f08705edde

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fcdc57f08356893629764c185d806292

    SHA1

    0c6269fa7f6d85c55ef8517b68e003edb7af3a68

    SHA256

    f6194122fa3ae1f44bcd24e1d60a2dfe3e2f9fa11c7d8a0c15e183958d3f356c

    SHA512

    dde40b6a1f40d3503ccc80e2f5c0649eb99cafddc41a9c94acdefc4a8f1ff6ab754b8e39d8c8d5e8a5ce9f92f5ce1297d3f4e2ad5b7b1d2952481f017afff21c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d45d87b339a689ec0e537572f2c58fd1

    SHA1

    e8003f9677ebd26f8cd98e6c04339a19e0aec5d0

    SHA256

    50c8bed147d127aff4c5561193d4ced5e4523825a58cb6ae92b6d3494510352a

    SHA512

    70d61567092c935d5b63abb42d2bd72cdafee39aed4b3e95c85e4147b7cc04a15e5a22e8f9b5104049c8edbde5cea76e2f4887a3cd964abdfad9511129d2f2fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    326847d2fd6abd8a721cdae7fccfe448

    SHA1

    5bcc0621458d6b4b3dfe13493f41c55b43477671

    SHA256

    660b7e7703caf3c225612d2f9826a2e71bea25e01d93673d8ad38a16df72be57

    SHA512

    141d4b4ad641ada73691f677729ea7a9a1bce0c052b9568140581852c3c0286c616cdd5871d437ca5302585c3777539ad01fcaa787c6771a6376f15a79dee298

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eb083fb4b2361f0fec2eb17633e3829b

    SHA1

    11f9cf6a2486d6fd36e6f3101fb5061414ea7df4

    SHA256

    e23ad020281ce87cb23c0375b8aa48a84b729ee43d95f14f9e510929de90fb60

    SHA512

    ce0ca0a643bb14237dc5b5b41366651bd86cc4e8b1bcdf9d415c63fd57a19262ff7c8f388bab636236581e38349c2391960b22ea0eb3d7c669ca1bb454957cbb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1a3288363123c43829a624628ace5346

    SHA1

    e223e0121fe59af30eec1889662501e92da20186

    SHA256

    a43f7a97608b8f14d33ed91608f7044245037be5297e726ccd8a70ccd4a6f11f

    SHA512

    84d78bf96e4066e41696ee8ae9baa41b2fe8a3e2a3fba606904b4c59cd8607f024dbf21f71dbf65b529b725e32989d297059f9218e64c782db81e989b6d5fe4e

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{B89F2961-4790-11EF-B96D-66D8C57E4E43}.dat

    Filesize

    4KB

    MD5

    e870f7e560fcd1dac0740b4350a13b55

    SHA1

    9c539dae047ad69378dcf95f0299ce9eb8a39251

    SHA256

    818c12c4bdee62aec6934fb8c616d06d7e46133632db514300f12a288a52a4c3

    SHA512

    49c440ead634a42a5eac904b53e7138694e4c06d59a69242c8748a14ec1dd13620ace798706e06b5203f2a7874d058db110d1ab2c4c2091c4a5166dd90248e86

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{B8A60731-4790-11EF-B96D-66D8C57E4E43}.dat

    Filesize

    5KB

    MD5

    602d5600d9bda19cdcb254715d492ae6

    SHA1

    c19a4a7252dfbb4614dd63366dc102ba7bedf639

    SHA256

    7dff2da0d284de2afa1fd827dd36304b2a0c2bcd24ec31cd53ca629e6e5c1ef2

    SHA512

    853daa8ae5657044d15fb0683c1ca8e108d0ffc8afacd11dd955104beb477af0ba93f01379d767f09203c11fe37d863d3ee7b1ee41a78466b48668298cb8a548

  • C:\Users\Admin\AppData\Local\Temp\CabE8AC.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarE96B.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1708-5-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/1708-6-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/1708-0-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/1708-4-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/1708-3-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/1708-2-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/1708-1-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/1708-9-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB