Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    75s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 12:46

General

  • Target

    741d9b14ecbf63c899d8f3936818acb6_JaffaCakes118.exe

  • Size

    214KB

  • MD5

    741d9b14ecbf63c899d8f3936818acb6

  • SHA1

    5b3e0f9c82cf218d309079f68f65e96a20ad56bd

  • SHA256

    1b39b2c7f11b05080d920f25a21d6e6b1ef29051f707d10365354d3800b7c330

  • SHA512

    a0c3390e99ccb3e57b940bbf7f6428c939aa5641aba863c76e4d556f2b40caf93ca3d91635b467b26011816c2bed368aed4e0c0c6545a27520e8198bff2b1f75

  • SSDEEP

    3072:+BQCtsUXd3e0IT6npK6sWWuzV7FWpcSz+egU2FtaL+W:+CCZXd3140wpVp52F0LV

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\741d9b14ecbf63c899d8f3936818acb6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\741d9b14ecbf63c899d8f3936818acb6_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2388
    • C:\Users\Admin\AppData\Local\Temp\741d9b14ecbf63c899d8f3936818acb6_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\741d9b14ecbf63c899d8f3936818acb6_JaffaCakes118.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1828
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2880
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2296
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2296 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    83590eb3277e142cc8d28f62f0857888

    SHA1

    3a76a882c33d0a161b8a4158d6bffb91e2c5708d

    SHA256

    851d6b60e07d3fbcc274c0e2695a0d3d968081353956a856bb3fda4d2ce24d09

    SHA512

    9bb9068cda10e49f25023b599bf2f7585a330ffd79743d121a3d9972baa727a0fe33414378be652a975342c7ec32649cc0897c394faef007f13bb7a8f4bdcd5a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6ed9d8bc0ba5fe753a7ac0881ddd3613

    SHA1

    9c5e087da9c87b93b24f2d77ccb1822d85802ddc

    SHA256

    cd4adc2cbacbbe4a9c23f234240f0e56e91ada26cd1dcf1b476040fe58a3b1d1

    SHA512

    2d17410c92b1abce654bb0c263452e947afcb0f19bd388c2104da4d7e00729c4c3c3dbb149f1bed6882a05ac0d919920c2dabf7ea9967e2bfd8142fd4dc224b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cf047465e20b54965e70ac98dabf8e29

    SHA1

    8953f74f9596c97f7f4485020270cf27843eb069

    SHA256

    fc317fb2a0619ef9d9df30d53ce507606371c33847b228345c34318bcbedb76d

    SHA512

    f0792c85a8b0f61d0c53a2b3af9b6bf2fd992b2dfe44ec5d44bec8e90a5b47871a6b759591efc892e885449fa81c375b4913a35eb64df1fe75a9b1f039e5aa4d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8733b7faee5df18e34b3034383938057

    SHA1

    2c0ea97768bae29ed7036a8fa5b188250f2f6803

    SHA256

    436465c7bde53235a4ea10aad98f45cc3db21cc4ba88a5a787e66622c767e0aa

    SHA512

    db783761e999f506ceb83a5465209c24a2ae2975588525c927e979481bb7988f31034fa84518487d7fe5e62c75a6782445cf283107b8a94d99f0697f3d181aed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ca4e7e55efb25bfc4540a1f10bb757a7

    SHA1

    87987c987257a8aad5bf3a86946df8a844938e46

    SHA256

    b93c1cf7e165f1b2ac11a7370f666890f1203426405fe14b2a572abb8b9bc6e5

    SHA512

    c782efdc33484bc3f7f283107dfa22b0192ba2aaaac04833bdfe25cc65e32c944d6a10cadd3df95391bc0ff48f2364a047bf592422bdb0e61f98571aed75d846

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    81a32a349a5aa4dfe0b2759189d9a98c

    SHA1

    551ee9d8d015672fedf50331894b0c69f5f214cf

    SHA256

    3ab5070e06dcaa39ed0c9ee0b44b1c1ba49ccdb4f4dfece923382fffb1c2a0e3

    SHA512

    c30eefb6086e22962f0850e50969d494ef03d19489d4bdcf0cf29bff5bdbdc88ff372b3a26d330149fc37330e6e173168eca568fbd5f877a89c22b3526f90813

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f09a73c1dc56b9ae024a3dd2476c135b

    SHA1

    c47bf40fae8879349a2803e618b1f9314ec579b8

    SHA256

    07974a7930e78d6d8edee04549b2e846f7264e0903fb6c69240b0ac7f49f671e

    SHA512

    d079e1906fe9bbc9993ded16c33f73818556c5b3913fd712daed67134fab55635e35439a82e6276601a42c0fd8456a2f18ea4eb6525ad05bab80446625bf7a24

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6be7093f6e9414b0706ab1aaf108e8f4

    SHA1

    6c6dc8084c689fd17ebcba49371a10bb71659971

    SHA256

    b70405edf3424572e6507cbc9e883d31f54ee27f05bd9db70db4f90f1d3381a9

    SHA512

    7b05e8471c51a6c1adf7a6fa445ff262d5a809657c653cd44950d5f18f882df22edc2d495e35810dc33ed9af61b0293de63adc34c4ee05d5a5122e7e44ceccb0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1e7e71a466f97393b022812ebb1e2069

    SHA1

    fb5038a68ccf9af686addbeafc558900fd18d363

    SHA256

    8d325e1485224a30e622ce1c978d8ce95b062440e12615f6a63141f108080f5f

    SHA512

    c2c9d0f04f540eda6cd25df46de2f155c020707540678add37f13cdf8cfc35408bfedd6dea0787321fdee33a371b5ba70d5875cd85a2117c1fa6af6f8eb321e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    60cb9bdeeeeb2d57f741fa3714dd99b5

    SHA1

    0c6e9cced3e35fa24c7347377fb31d400ffc756f

    SHA256

    08a981efa28921b2e12bf82cf035feca792749535e6179335ca56de7f4a8d62a

    SHA512

    9c8fa87939e69d5b4b051aa3d7d30702ce2f2476b652544857c9aa5459506a01f37cf2a3630aa3c255e166d690c5c07f86186d5406c87c7ca294bd4ea4c6eb66

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7d32c578503b1da46722807267aab960

    SHA1

    c909a44e2eb1e2250e72c5c6cb747debe2c095f5

    SHA256

    a7bb6e79243435369ae25ffe650bae36bf2bc1444e6af087c933f93afde26e92

    SHA512

    6e1a3d8652f496b2d4b090b96cfd739ed1e4183638d168a1416dbbc44861aa2f8520e2c146a2b32ba4f82602df47f8710969c7782a49694a6f0b466fb216b6d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8a4cad7fa3ee6d5ea898738b0560b7ad

    SHA1

    42c2a9d3e18547ce0fb83ed32e65a01ab8a2ab0b

    SHA256

    d6e673727356a06ec28722acae7835e2c1885bcb3089615e920b5f234b4743e3

    SHA512

    5422d8c10125400e314de32549a41f2659f3c0757f031eeb8a59e18f5d132dcf39d3531602597475a2c87fdf5b14cde2be6941c22ce60b89c1bde0457e061a80

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c0e4dcdcde5ffc8390dcc36c9fac2a7f

    SHA1

    7d015d8a63d23fd412de8d9da9d24a5f625d4ead

    SHA256

    53f75766c7ba99b35bfb0a789988e23ba9cd86ad299af307b8caf979ce8abee4

    SHA512

    de51c8817d0ef5b3d1189e10cedea8c25ada77dbbbc334d3ef27439ea39a548773cd1e20c98e9f207d84d8780a358eb4802392f9c65cf4c714a492b5ac4543fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    41f1d630d50de8b91db20670f5148827

    SHA1

    5174147005e327707d04b309b7bae82f4e26c2b1

    SHA256

    357c0157414d3bb5b368763a1dad000b3ccd412a32fae30a35cc6c108c077b5c

    SHA512

    bf3a585d540e266a556f5d48fc390cf96ce279c2c6acfafe45778617518f50de5bd9362d0518b06380aa653d5d72a669979657c52bed9f8066af70fffa661aee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    773e783892c95aeb6d103bc66fd7e985

    SHA1

    f1c22850c2d080923154a2481bef7afa844a2766

    SHA256

    6ce7d65f3bc88c09350f304641486de0fa2c74a9f7ffc44d70b0adb85a5a14dc

    SHA512

    cac5695400116231005b7ebfaf3bad5a8116f2c6ad3d361492dac999a254b16a245168e375282011c647c8866f89957efbdf73eb9f6bbc761b1731c0124b70f1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a5db14c730d55eefb88b34826bbadefe

    SHA1

    e2277e1ef18dcfdc68c74d6349b40618a44ff486

    SHA256

    a0bd8a4ffa8cbb959fac34e5614f135950a6caedb50dd7d1fae0971f73f6609e

    SHA512

    c33e7af75dee610c0426764e3d8e171187ac56cd53f02f8c1077dfc2c5b7af19e3b6a3c35b94047c4e29c3758f36a89c4d26c25c42c63baad94a176b30865121

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    18e115a44df8d5265f4e2a13e76b333d

    SHA1

    2aa62894fdd29e11b7646e1d691a99553921c705

    SHA256

    f8d16e49fa46bfd80dfe332a8c1e14d33426d2e2263b4e5193952e10bb8e2951

    SHA512

    3a49a5677214b8b060a7d1eb2571fef2aef32b659213ad6fcd93878711d88c23a02eda9078c54188e5a830b3fef7e73eee648eaf73e0980c02ad5a4b13c51990

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0630a53b83af132096d2256e96a919f8

    SHA1

    5b06f56ca3daf003d56f411b72550b181c10856a

    SHA256

    212d6d706accc13dafd342a7a75f641abac10ffbad86cc0330beb2f136ca3469

    SHA512

    f4b15ff47b730b697dc955555750ec6545b0b12a16e1be9c46170e0ddf04a40b7f4fe107e36bbcb297d3608cbfd7e3dad4010f2c772741c422b3094f73f0d7e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e9e0bce1568b997e565f281155ac2693

    SHA1

    a98b6c41654597c0213cfb465d0f5632da7fb6aa

    SHA256

    7be5251cec7677b8364ca2707c15fbf03fdc8066e46e36ae62a7516999f0b8f4

    SHA512

    da7539e476200dfbaee2c4cc96f9131a44db4fb7d0676e8663375dcbcfe752ae89ccb4ac544df1cd8ee62ab53d05030ce6aae649bf4a7876a9aa83261f23bd43

  • C:\Users\Admin\AppData\Local\Temp\Cab5F72.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar6030.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1828-9-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1828-11-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1828-28-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1828-20-0x0000000000330000-0x0000000000331000-memory.dmp

    Filesize

    4KB

  • memory/1828-19-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1828-18-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1828-5-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1828-7-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1828-24-0x0000000000340000-0x000000000038F000-memory.dmp

    Filesize

    316KB

  • memory/1828-14-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1828-3-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/1828-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2388-17-0x0000000000330000-0x000000000034C000-memory.dmp

    Filesize

    112KB

  • memory/2388-16-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2388-0-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2388-2-0x0000000000320000-0x0000000000328000-memory.dmp

    Filesize

    32KB

  • memory/2388-1-0x0000000000320000-0x0000000000328000-memory.dmp

    Filesize

    32KB