Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    124s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    27/07/2024, 20:58

General

  • Target

    00ef4077bf8fb81b31ee73734f64d7de_JaffaCakes118.exe

  • Size

    611KB

  • MD5

    00ef4077bf8fb81b31ee73734f64d7de

  • SHA1

    4e28167757ab5ff25813da015fcc2506f8d3e69c

  • SHA256

    26db5ce5c1b9d2fdf021eafe34c312ed1e7bd563d29436ef6f5fc759d6f97828

  • SHA512

    f784bdd0147dd8c9bef18d4bf7968dea52929750ad6a0b65db933acd93361b2dc8eacd21f5c89d5c6757198b310bfb8536a3b0862212b4917b8dd9a9c7e21a35

  • SSDEEP

    12288:OmDslh3AU0/JmEl19IYrJO0DyYQ9FS+kS:OmbgE/793DzQH0S

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 10 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00ef4077bf8fb81b31ee73734f64d7de_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\00ef4077bf8fb81b31ee73734f64d7de_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2648
    • \??\c:\users\admin\appdata\local\temp\wmpscfgs.exe
      c:\users\admin\appdata\local\temp\\wmpscfgs.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2816
      • \??\c:\users\admin\appdata\local\temp\wmpscfgs.exe
        c:\users\admin\appdata\local\temp\\wmpscfgs.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2448
      • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
        C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1520
    • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
      C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2680
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2676
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2676 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:884
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2676 CREDAT:1913861 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9664b7f944b958086bd4a9f074e3c7db

    SHA1

    afd2f0c2a894bbe9357d2e379363db91f92b11bc

    SHA256

    76d6ecefd72f85f499b9cbf8e3d5b16f9bf4e8ddc24ad2b079188eb02ac7fba6

    SHA512

    c4a51dfefbeb51d73f776e75dd2065a76a48a80da7e7b78649e8e878dfab4bf2e77d0f3660f84f9872938ba4451d6490416adf961d851578e84317958a36ba88

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f4805ebc0acc737a70c1634687b91378

    SHA1

    ed5763e2d0c42d2e9fd565161b00f69a63e02e9c

    SHA256

    180213d5cb7f21f294e6ec62f26b20b27ad889f058dc1cf06d3dd2dd081b7265

    SHA512

    fcd1da08a475c2f3cbd120f6f11b737e40723a6011f9ad8876ca86e33043e71e689e4ed697261d208272dede886679395219a40a75e22e05f5a956c4c5b4849d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0877828d48b2bc0154320c72eddf5608

    SHA1

    8294dad199f24d7f2fb42b2cf9a45b1329a6a454

    SHA256

    ab9e92800effe8f8734cc9a25e1450ca8ef6b045a30056cd4606760de5f3d650

    SHA512

    70a7764be510341fafbf79c57704adcc3d27f20243f41fc77cd668020494f5f4aebc3dae408a0aa23b5b46b99831856831a5fb052a834819007fd6b4ba1488c3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f388efc091d934b4a8b9dfd144c741b8

    SHA1

    8c89f2926e2690ee3280f11aab1bb72ed58695b1

    SHA256

    4aefd492ec5088800f6f257f6266d9ee39b9eefe8e5422541daec3bcadfdd086

    SHA512

    a0f9db7be74ca80b920ade4634399811e40f16874fd5fb5f6457be36b82b9cb1644b11993d6c86d6b2acc3583feaaf24c8f007d0b2e4667a3455333fc6eb506f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    95e1af349346c98dee9a8dae6ab602bc

    SHA1

    bf90d0b28914fc7bda13c094bd6c09551730e34f

    SHA256

    a4c1254cafaf2f653b563bd05d9bf5a502afccb75ef113c7bba8f4de5d46f0a6

    SHA512

    0f04b959b3e31c5b8c5683ae89886ed3a0801949da1709e82d1b0333286f5a974b094a2c011aeeb154f2fb21c1816c5e9c30767901c2a9a8a4ab9f5e74919a54

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c7f5161c31531092104d6b2b16e2a80f

    SHA1

    c9cf326fee40244d465f80cf0db3c6f0a138ad21

    SHA256

    f9d5f88a7336f0be5b6188895dc745ee943f42e92e993ab567916fc97d0011d8

    SHA512

    ef114839b7a1a35111bed758f7345a05d067ce5acf9c6ea07508da683c1bb8634c57281b27fa6dbd839d64b233ce048c04d4089a55781712cddd955de4f5b0e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bfc9448be52e1d79061aa2b6ef6338e5

    SHA1

    3bc1f4f43386a422446e9f5d9ef9fa61502ce330

    SHA256

    48755fce01cd29b5f0ebde1667fdf375503e502e8a18036d613dca9a245e9c2b

    SHA512

    9abc9a0826b8daf643e16ddb44f46594a98fcbdb64789da61227ccd945d01f999a5829c2cae41fff3e5f1ce99d3b1138daefe6de47206647a95b2a78bee46c6a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8acf3c28524930d8e200c0bb29163b9e

    SHA1

    365da387eeda49f829a4d9cc551b1015cf1c4953

    SHA256

    523f40c9a7effab89d4f2b61c14c6f070a59f867e72b0da3bc2f732848e59896

    SHA512

    fc192c002f02e3b63556e6c13fc4d88f0c3d7640618f575570a48009d9e88dafc6e5abcb379c6768c2e404a5e4debde9872ae691bf7f6c0c8351cc91969cf527

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e56c0c5c7e0d1db982fce2710047f621

    SHA1

    06920dfa44ab47863a40918923a7cc867fe9867e

    SHA256

    5b5ca6b62a3139d11ad2f50a46bb9bbd63de29015e5bd052da6f048afaedf21a

    SHA512

    04f459343f55fc439ba21e656c514bf30886547312e4f92bfd4cc93ebdeaca8742d55a0fb05e8d1c4318a6cc734976d2ff7057d25b33cce69e2f2e961f150312

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bac2313779b5ffc806c897a98f7359f0

    SHA1

    aabbc22e9d8104dcf0c13524d43d7c14b21e4fad

    SHA256

    9acce3938fa5e7826cf29a1ced41cb334606bc3de35556f9b8121c0db9348a74

    SHA512

    7ebdc6df92206b78d05d71a77a406476738758c71807fa18a2f6d4d5bce967a458c34d4186bc6ae884a3ffd519b7c077475d63393025261a9569c0a32406f5d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    56c6629ab797e512ef9d9b828d02d1c0

    SHA1

    50d12417d755c0b5f7cf65658f0135e8da558b65

    SHA256

    6f66ce3630448cfd53cf94209eb21595287a7ace32a2fe8e289f41253feeb18e

    SHA512

    4dd80425ee9fda8e7901c01d26bd50c7bacf3db1b6bf496483e1435ecd209ea0a7028d85deadaee52cc8a40cd00943729c99b4ac1539c909fdcb731fd0d3549b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    752ba82cf87807cd044adcf9b4586e80

    SHA1

    77a3574f2f7a81fc347ca6348faf2ffa4262436e

    SHA256

    b7115e5a3b59de6fdf8f4d54c4f0a3c72d80eb6a451506e97df1b1b8b0cd3b15

    SHA512

    6ae1135381295c574377fcdabe0e231b5fc61bbb511a184a6786e565ff837d0f9654d848d5b16ae01adbaf0f53b7830588b7b232b2125f9fcb0ce06e2323153f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1f8382507edee03de864563179955bba

    SHA1

    db940708d4420fa46f9baf0d52ab26f687682e6a

    SHA256

    6ca522d9d0ea6b2cd3ed947b1a23c9632f974ee97195060c49e6022af7e1c58a

    SHA512

    c47e0b8d400b7e410bb6c0fdce6e895fc764944711912a62463c0ad6286ad310ee5a2e82b44e0ea9b7d7620569948fa8c9303638d253c016ba198f3bee42ad90

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3d91382689f3d53e1b239f8ae304f3d7

    SHA1

    c47e59ba68a1a9e567986ef0d479e1e9cf3a64d8

    SHA256

    e2e09d9be145cf527c8e5af6d07ee21e167ca7fb3ea2437c6a0712b3a13ea6d8

    SHA512

    327a4a443a8bdd718405060268cbf0b44650126f6946edd424169773cfee60dc5680c74876d97d58c94a5a0544b9767cc955c6cb02988caefef0ead8e1e92383

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e31d14a03be5a32ab5be799469118e14

    SHA1

    b752acd8bb5b2ba28f496fcba5da4cf0f6d08294

    SHA256

    b495f56ce0f8f4c255c0dc55dd90ce820a2d2fc1594260899b8b9c54f2481819

    SHA512

    062e82d57150b41eda0272f61fbad52d796cb70b165f62ea56d52399ad4ea42fa0952e4433fdfe153ce34be8338dac2efcfb0b07a32b2f439b15af887daa9e82

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    78d7fb2642645c74c82441a31083d3c1

    SHA1

    ba04418d1f5eceb8cbe9d900e80141945dc995a9

    SHA256

    dfe495c80cf4f3dd74941bd61590d30451b0377105ae05534cc11a7ccefcd886

    SHA512

    6a37f04269f9a2ba7d2d7155452ce39b2e107d597f80ae6bb824c502d3135d25a625abdbad9fd216eaa911bd27acc27b1e805283dd7ab0555ca23f4546e0c294

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e05250a50576cd5908e6ba3d9545983a

    SHA1

    8f493712af272aed9bb1b3ee2fcc8e8d1798d222

    SHA256

    d7d2c10824ca01843a248238044623c000bd7d7404f1330031d6863a4d0fb1f9

    SHA512

    a73cb1b4fd1a2f48d29449b4debc7b84f9d199da57dbb646885af7c93be7172717b3df500c550adcf0e936b5b048471653771c2beba158c0fbbadb0d165f192f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cf000478546de56d505baf4ff8fa6f17

    SHA1

    ac114f43d1709d524b5218f054bae9ecb831cc07

    SHA256

    d419fd5e6721206db2593c4ac9e9f1652178afb3f64042cfbefef13160331921

    SHA512

    028525e2cfb40006817423d0df710cb4834f65a2e2d6401602e4aa4a1313390b630e06c1c196c31d1b86b968da9f78b0586e44e4ecf215dbc7143e0453cc2c42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a3e733171ebf4df28530a544264e3010

    SHA1

    928c52ac6de6de9d02cfa88afc0d5b1d68819bf8

    SHA256

    a821c920ede265128e8175aeeaee0a3b92ddadde3d134db552a822281035dad6

    SHA512

    a09da9c3960120e1639962feea3627ef92fa72c4fd06c89c6fb8723b04bdae05404caf4ecf8f34a758f86f403acab12ddf61a7421273eb3b86d301a54f0a9ea0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    da1ca6c36139b221184aa9ac50a9da85

    SHA1

    868b91307f0dfa571a8f362a3ad2613b0c4fef57

    SHA256

    5cc72d7d0081f421c0d0710768dee0db5cd51884773f71f9d58255da9e7ed334

    SHA512

    23952a1f9c73e73b6fd1a4d7b32680a2350837bd548eef8674a6f66fe601fb19a673d6381fa33ced642e01e8c9934df99d11e90335aa84b9072128b8fe283cb3

  • C:\Users\Admin\AppData\Local\Temp\Cab6EEB.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar8EDD.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\wmpscfgs.exe

    Filesize

    631KB

    MD5

    d0b3423f9558e1f4857ea870ff5c5fc7

    SHA1

    565dadbd662106a5b07b1f70e30152ed4ac09ef3

    SHA256

    ae1b3ac19c78fd371d35786fb5b51c2e20d48afc9b684f20a36866f369c59471

    SHA512

    4b10cb322c2f0f07322b43740e3045367e3cd84b98675679b0a65ae5656f73d284784ce65fd11e13b05f2eca374d743717f47148fbb1e19aedd2bb2630f3b1de

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\MS4CS6A2.txt

    Filesize

    107B

    MD5

    618b3ae3ba29fc3ecbe44671a232aae9

    SHA1

    fa48512a131117f3104ee22255f2a54557466607

    SHA256

    9a7e24f98f317153f5d15cde3843295376fcbc9664c0aa8b09aba0369c4279e9

    SHA512

    3e38050f515dd1c0e91fa44f3fe027d8bfd8eab86aae3ec612b23e3966a81bd3bfdf352656c5663600c95883ac15280b6bbb4603e692f1d5e4e202d354442ab3

  • \??\c:\program files (x86)\adobe\acrotray .exe

    Filesize

    644KB

    MD5

    20339ae81dda94832ad675d6a2790f53

    SHA1

    e0f0e6bfaadc8d36a3d88ba223d37a0c8264d269

    SHA256

    2cb8337bef4ee3242007aa16f963e8628ab81707293594761397547ebf7bfc88

    SHA512

    3ea34f7889a13f96fbf1e52855ee52fc62a3c290014b4692ae40007c72e5ac10399086605197d6892ad2386b8ddbcdea3cc6a928d2e943e1c7369e449efa642b

  • \??\c:\program files (x86)\adobe\acrotray.exe

    Filesize

    637KB

    MD5

    caf540c5a9445d5d9454d4b02d6e35b8

    SHA1

    4aa6d9a4b7955bee154e9eed4517cc530c84f091

    SHA256

    f0ddb853c948e31ff78da0a4b55e1a7c1504f6cea5a61a4d19295942c5cdbf96

    SHA512

    66b5ad076e8b068ae95807773863df532893df30e94847c63b45045edd840534bc6d9e4627cd90e7a961f5a7674a738f2c4ab404f1bd9d492940106ba5dc4f8b

  • \??\c:\program files (x86)\microsoft office\office14\bcssync.exe

    Filesize

    613KB

    MD5

    df626f8aa63570a430fe2ab18498072b

    SHA1

    25eab9bd6d999ba4bf71fd60da6f9d17e4b415b2

    SHA256

    5f96a974a2b1da40785c42cf4a245f4c41b74b7ac9710175fe24bd6116607459

    SHA512

    99705693de4989b44a94cef0e14ee736a3627342a63b62c5f9ff4dac102ceea5484d493cf9354a5bcf89dadb7c120c75964eae0a8d104652bb0ef24441853d23

  • \Program Files (x86)\Internet Explorer\wmpscfgs.exe

    Filesize

    637KB

    MD5

    708060a181e79c5803640809da731556

    SHA1

    939d6be99c4cc7f840a970686918c1881905f3df

    SHA256

    3036e87178a8e0b63f6484fcf0a7cf5d7179c087cc7ff5967ff164ccc248b167

    SHA512

    c03b06197bf49a91568cdd3daef5a00dfeccd8d080a7fe7601b624983bd323450f43a98778d31daa2336994003d32a3e8957333243612d8230cca94dbed377f6

  • memory/2648-1-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB

  • memory/2680-35-0x0000000000470000-0x0000000000472000-memory.dmp

    Filesize

    8KB

  • memory/2816-22-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB

  • memory/2816-50-0x0000000000570000-0x0000000000572000-memory.dmp

    Filesize

    8KB