Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 23:11

General

  • Target

    7621cafe46475b60056b307079a25ba5_JaffaCakes118.exe

  • Size

    50KB

  • MD5

    7621cafe46475b60056b307079a25ba5

  • SHA1

    a0f9aca4901b8dbadaeaab660415d7ff57543f44

  • SHA256

    c25bb4b87035025c73c699bcd9edc7cdb3b904042f32f6d56b822103d9f895a2

  • SHA512

    21453045aa51c119ef0359c5617c53761ddf96bacca92d0dcb2729e4c766481f7f4b9c7f1f045649feced3024a1c69763e5cd43c046a0bf7e3639843ac030bd1

  • SSDEEP

    768:bIqTD/H6QTrauqbEzJr9W3UiBCgFWe+ekWh5nZ2saRCuQMhjA:btiCWuqbEzVoEifUWh5Db

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Event Triggered Execution: AppInit DLLs 1 TTPs

    Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7621cafe46475b60056b307079a25ba5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7621cafe46475b60056b307079a25ba5_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1008
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2684
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2684 CREDAT:275457 /prefetch:2
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    a42a4e929dfc959e82c532eb2b5568d6

    SHA1

    ce2c2138c8ef4f594da3b30994e8b99c4116dfa8

    SHA256

    e722daa21c8d780245b0bae06db7256ea24fa5433417da51ae2f728e113fe5bd

    SHA512

    81c7e499223c28b5be362e6e600a5e0bde060090a1faa746af46c192a6811296382a6179184ba688baa1ce8c54665a569796c0a4ae53e62354ce14c05bee11ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    380f0dd6f4c7269eb52ac0fb3fbf243a

    SHA1

    5977ee31657cdd102270c7380f4f9121266ed2b4

    SHA256

    74e01daa0c9bae02995c9310bb2ac89baa16046d0c3d6bcfcfdef2c746fd6a21

    SHA512

    6eb481d53d1bfb8f2b8742ab4cbdcaddae246e6006cefdacf832e60317af77998481dd304d074fe201088f250b1e9bd8c80cb72764fa407da343923f6b0fd53c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    cd54834c78c45d6364d99d99bdabd863

    SHA1

    8729c6f76cda025a3ffaefa21a147821f0a3f637

    SHA256

    946bf730fac501663eb06940a60cf854ffef05a230811788a8bcfbddf67854f3

    SHA512

    bc9857e55ec43c27d5b565f6aab1a508b2a673b1f7170b20ae09a98b2257acd87c9864673456b4e93c05d8c706b3ffc9fda393c270aaa336129fbcea87b5bafd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    eec68ca4f384dd91a14b2c0f5b5b56ac

    SHA1

    587f93f9a65ec8a3b83e81d9b93338ec5bed55da

    SHA256

    4e609cded9f53d7fab4841bc72f7959c88999f5cf500a1f42c6392ccc4505e1b

    SHA512

    a9753c551181806703de879209a40e05628865c0b6cadf79c24f78a03947f1822c02f2ec41086310dd51c9df78f9afcece17b34b9d92bbb571e5f5bd2752b496

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    66fad8ddb58a32a2d1ab8ebb1cf0297d

    SHA1

    f31609690ba1284fdcd84801165c0405b249f3b5

    SHA256

    85f13c6022baae011c4a8fd2425909b94e828ae0a7c5ead2da9c81025d3fd4a5

    SHA512

    11a5a18920610708cc2b9fe64a43cf27bdf61db123fe3067815ee1e248b184585dac86bf50c98ad4845f95bd0833ac4f00070e34f58ef19810b2d782774ea4ad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    b4317fe5d53fe26473b1e746fd17aa45

    SHA1

    6763a20f0fc4e8e862dce6b487a81a0c8a0ed21b

    SHA256

    6f34221d532dad9e9e9dbab7a7a33343109031d961540afd8046c30c0728058b

    SHA512

    2d792284bedc53b810336fdac1b83d1022004efa1c2fb308a8bf54a090d67e575daf9c150ba092a792e93c27e60670b697a0b1901f7471330bc207e4004c71cc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    d885966a2d6852e2e9caf1eaeeccd2d3

    SHA1

    4989a9b8fb07e79b1fe70352ffb1fd406eec107d

    SHA256

    98e537ab5c21ce93ec3b5c7ef2e05b3797a6befb40867f78df4dc8baf49279bd

    SHA512

    fba62e42893dd0abae9efbcd5f1dcadefc71d1b6eaa16f57c87a04c1b0d721b55d771d4b7bd23e320a1e73a5e5d9696b2e20c4215c68f72444572368f10d1aeb

  • C:\Users\Admin\AppData\Local\Temp\CabF335.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF3E5.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\SysWOW64\0070.DLL

    Filesize

    37KB

    MD5

    01e05896962fb7c616a08650fc32bc62

    SHA1

    0d83b8917126e478b7937549472397a11f85aea8

    SHA256

    443e687cbd2fd449b7afbc35464b05561073563569e1a29af78960b49c70199b

    SHA512

    a4c13eb89440e70007f9eebb7db851523f9a6420b9167f57f449d706b63872261d364510a6228ac017a02da1363b12dfdfe81d4c33170af5514bbfe857a7fd50

  • C:\Windows\SysWOW64\0070.DLL

    Filesize

    18KB

    MD5

    a330cce815856fe93858a8788c0a5bde

    SHA1

    0d59f138601561656fc84d44e99097c6541cd7b9

    SHA256

    b22e8f1afafaa623bf8b175d614ccfafa0d8d96945bf50c9753859fef4180c58

    SHA512

    2a12a91152cfd3cb0aa1436dce0f86b0c400870ccc859c77a68ea5bd5e49312bac40ef8b6c3fef4adb6fbde970f76f76103cc47cf2074a44c3e2202d8fe12ad0

  • memory/1008-0-0x0000000000402000-0x000000000040D000-memory.dmp

    Filesize

    44KB