Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/07/2024, 22:58

General

  • Target

    65241a75dcd44cc1b3bfa278de1a6b99_JaffaCakes118.exe

  • Size

    72KB

  • MD5

    65241a75dcd44cc1b3bfa278de1a6b99

  • SHA1

    dd11ceda96ea4870158b8249ed8a9b189dc4f56d

  • SHA256

    50dee37d4d7a7e85ff1e4ead701c9b2c92085e26c79b6634519e8b7ec10b671a

  • SHA512

    99d96d606c159f9834ee572639fbf51b4210eb16aec5a732091445a804f7ad30858e5c1b3dd226b0ae91f39bca7aecc024f187694601dc0962d8160a1ccefccf

  • SSDEEP

    1536:IUTmPdCguLFDCao4kYzghcV7Mb+KR0Nc8Qs:hmHIFDW4mhcV7e0Nc8Qs

Score
3/10

Malware Config

Signatures

  • Program crash 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65241a75dcd44cc1b3bfa278de1a6b99_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\65241a75dcd44cc1b3bfa278de1a6b99_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5056
    • C:\progra~1\intern~1\iexplore.exe
      C:\progra~1\intern~1\iexplore -new http://192.168.123.5:8000/2PFOXYgaSrLx5zyQpXRZqb4Cn3DG5H3K
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2436
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2436 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4820
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 300
      2⤵
      • Program crash
      PID:2292
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 308
      2⤵
      • Program crash
      PID:2288
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 292
      2⤵
      • Program crash
      PID:1708
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5056 -ip 5056
    1⤵
      PID:3500
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5056 -ip 5056
      1⤵
        PID:652
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5056 -ip 5056
        1⤵
          PID:3284

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          471B

          MD5

          5fe1d5be97aa5a4b444680410010b626

          SHA1

          0b747d5b13d5745fcc81a5819b2db8e11543ab42

          SHA256

          018bb27ecbb368115c6dc85539b5d24b0f7d548a3cc81ace6f7fbdc2a5aa55d4

          SHA512

          b3baa42206a9866e37dbe747a04d82d49e51e8219a8ac51170498cbdb98430a6b3f591151d3dfb133b1734f6fefc62b90efbbb907c800f45e93eae998c009fbe

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

          Filesize

          404B

          MD5

          dbf9e5965fce5ec445f18ba7c1653e82

          SHA1

          f2f18572821604741c074f322514beb0228055ab

          SHA256

          8db53047344d54a110d5e5139295046f8043265db24f12b236c6f47bdb7f6506

          SHA512

          8ccdc76da0b75116fa851fee0fee1c42c4f221e4045c84ad447ca91719f22bcee8babc7c6e0ee2ecac626f6add2f4ac9645012a201d1b97e1c2befd6cc732d92

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UEL5ICRL\suggestions[1].en-US

          Filesize

          17KB

          MD5

          5a34cb996293fde2cb7a4ac89587393a

          SHA1

          3c96c993500690d1a77873cd62bc639b3a10653f

          SHA256

          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

          SHA512

          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

        • memory/2436-27-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-20-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-10-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-18-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-19-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-17-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-21-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-31-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-32-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-34-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-40-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-41-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-42-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-35-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-33-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-39-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-30-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-23-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-28-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-1-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-9-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-25-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-29-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-16-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-15-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-14-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-12-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-4-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-2-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-7-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-5-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-44-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-48-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-52-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-53-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-55-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-51-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-50-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-49-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-61-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-6-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/2436-8-0x00007FFC8FE90000-0x00007FFC8FEFE000-memory.dmp

          Filesize

          440KB

        • memory/5056-0-0x0000000000670000-0x0000000000671000-memory.dmp

          Filesize

          4KB