Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 02:35

General

  • Target

    82b88f9a7aa6a7b07801c6fc042a6d55_JaffaCakes118.exe

  • Size

    38KB

  • MD5

    82b88f9a7aa6a7b07801c6fc042a6d55

  • SHA1

    0a0b8c409d922e4a2b199dd62b7a305520db4a6d

  • SHA256

    72d82578edf600f8fcf0901008d53d732660f3772cacfe1323a7d77631b29cd0

  • SHA512

    29ae89aec8e594540f44e5defa34db26d7dd31d98f2309f17794f7b0fa5676ab6e9166e31f419728ea0aee2f780a3ef2081d4f9672b920c3c2b3c57c562fa098

  • SSDEEP

    768:e5IPvOgQIYNEeaG9OX7bXr/qYZUVZvWInxOhICy18HDsQRjzrY:7xDYae5OX7bXrSYkOIxvCyWHrE

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\82b88f9a7aa6a7b07801c6fc042a6d55_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\82b88f9a7aa6a7b07801c6fc042a6d55_JaffaCakes118.exe"
    1⤵
    • Adds policy Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\program files\internet explorer\iexplore.exe
      "C:\program files\internet explorer\iexplore.exe"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3032
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3032 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:572
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c del "C:\Users\Admin\AppData\Local\Temp\82b88f9a7aa6a7b07801c6fc042a6d55_JaffaCakes118.exe"
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f1715260fc1c95750f1abcc12655104e

    SHA1

    22663ee9ebe6b226cbb4a427b17eecb19605ca70

    SHA256

    1c105fb8473ca79a8e609bf8775a523b7cb8071af38f02ac871e70608bf2b00f

    SHA512

    5d7a21dd222bf98e9a26c7aaaeb0e92dd3886bf5c778e8bbf5481b06aeed0caafe397eda7b0859e04e7c50ce54eb1662d9169c044c3cb95795d6a269b81c90f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1a49955cec10f7a953ba1510484efed4

    SHA1

    2122ea8f083fc5c6b7fbf4a46cff51f2e1f8f4c0

    SHA256

    cd59789327cef894dfa8df3956f1de90bff1cbd2df8a5c416f534c2e0e45228a

    SHA512

    3f51208149e4f7f3b641d1f31ab38897d186f0b7d0cf1f1e93e6554d575243546c6db74c94c3358c1af04589979ef2cfb82844438aa8ea66769c8198a03afed5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aa35e35cf74a158f4c9c37d6dd7da3d2

    SHA1

    d41b063f38b0dae1754c8ddace351ed6e7082796

    SHA256

    4c940c6165218976c4367105a2c7f632cd5e0f46ca9a5b94bd8c4da41fd9a23c

    SHA512

    0d86f9d6e7264f026a95795c1769164f9f9ee7cf1c3820e746751ea6f92bc82c34af9a05e7399f0145ece248e2ee4b0f32f4ef3b48f134f645f9234bb6aa74d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dc3276aea4c27099ed2992286403eeba

    SHA1

    fa0c3ded1d96e0f5d4b517162bf0b23c2aed38c2

    SHA256

    958a9e5ef8b26ef82be9902778746280b441aefc384da91d86b1f78c3af6f297

    SHA512

    5033ecfe38edf2668baafcd6369dc007714b9dfb13ca2136fefdd6384d6e075f5434bcce1bd3988857679f86e3404b16b6ad7953a72517200bc445e940654455

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a62bb5a4810da3e9849fafae26fd6134

    SHA1

    1a9a6fdd85a850a09f7264d41abf11ac190707b5

    SHA256

    7b2f28efe5cb975806aca5655f251639aaea3f1a7ff085bcc0647c2aae2bf511

    SHA512

    bb2a4f945093233efa7ba09301ff590f70b4871ccd7d67b3ee63860e1bbbc15208e1772c60be1e07a02a8f3ac9f96f34844472577a1bae6e041896e1a728babd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a28938af384117f193720a81ad8699d9

    SHA1

    b202c1be49a955dbc826ae24af4ca743ddad8a40

    SHA256

    e623f18dee4aba72e83ca76a2542eeb5b793cccd6f3fbbe8ead57402aed4eb1b

    SHA512

    cbe397a2a4bc1c5f6e82e1673db10df49f5ebb52c5347469ee94e4b6e5736df1fef6ca555b82aab958a147d578744d5f71d6d5a12f33cf28d15b44ad689de53f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e1ffe6cfe6660e1a98a779e9ac03b75b

    SHA1

    5738078b9942dea0ddde68406c83d6a2dc855b9d

    SHA256

    468fa9f882bdcc04d9a91a471456932bee7b4e852837234230558ff7bcfd460a

    SHA512

    e6ed192e9171cd7a5822760c5591131fb9837869e39b69b950ea70fb11a87c05fb589d2d7dd6dce4766bbede0abf14a2105f2137261e6868d20c85f421be0882

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d7dd554dc0ce26cf9b9f59c67f443f14

    SHA1

    9a0d18c57489f959c4b3bfd55790e9857b19c3e0

    SHA256

    734325cab60d3603e0662f6d83e070f775a1cee73a26dada5d10aea41ab175b9

    SHA512

    21ce53715d58bd79a593f3c2b03514edf8dabb5d2a61f0cd0251f7aa716ce7fd90c1863f1454bda498db437060baf875e548dfd2396a2b6ef7aefa8d411216ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1a4682878f506f28dec13f36c05885bf

    SHA1

    12124682d73dcf15a7feb73dff47f238ac9adee2

    SHA256

    96a18aaf26328b8e98b7768b0e3712f85404d4d3c14cc604192f6fd40c93e6bf

    SHA512

    64d0073d663df08b5b42662312cf15c4c99ae112735320dab7891e4a461900845eef097746dc1c36145d546086b714b81982d36b3f934633cd35da4d71301647

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    60afbbfdd9a2f9c1aa873c43967302b3

    SHA1

    c1315f06ee8a10d6724ad05c86bb9cfd5d1b2a28

    SHA256

    d67d34c6eef1b55c0daed5d19880e824510a2ec31fc5c9435b64c65ad4eb1d9a

    SHA512

    9770b2eb568d58890c2016ce101fabbbcebb8f446d7e167d312f246527e9a9fb4a735a5d4d96a6710ead61ff96e60fdaaee8ce1dd4638854b0e11b2430581ee3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ea1e49e4845b73fcf6a7b5da42100816

    SHA1

    ce332a010ba0ddd298246b1b7067ddacd2a4b263

    SHA256

    bee1184081dd0e778dd9545c362270b722e4ca584c63e46a4608f738477ca78a

    SHA512

    a9401ce93499be7f0c23d9cfcde68f17a6d1c1720bc83123ba32974665b82255ec3784490c54abeacbb62a7190e20719ecab6e01096ac0e219a9678d3e9a62b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8987aa86a797b3236a3bc5857957993f

    SHA1

    0322c22e19bb47a29033df51dafe1890d6b48ac9

    SHA256

    1cb91ef901abe0990a8b532743722fe1e263fc2a2e5c14ac032a7265da9e7fbc

    SHA512

    078309f9870a7a01679f77af3dff98bb847ec4dc691ddf7ac34a02d4cd4517e452e0558eca4938db7e024efe128fcd093639066b3b7f55ec99aa737c86f14307

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8db7edc965ce66d950105815ff35d81e

    SHA1

    9ab692e8712d471ba5cce2fd3a238f2b1e04670a

    SHA256

    5d4ee1e0d62c21b7cb2e006a7075732f515c914e4f4721519748c8c377b8fb65

    SHA512

    2315f2da019889d114f4fc82911e3a8176235fae601b754afe39afed7c67f47e818205a86a29d1df94f5da3947c869dbdcb63c3def7abadaa473baf79cddef5f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b28cf98c8bf482bb4bfeeda896770825

    SHA1

    375f51c7a824c5c01bc0a46bbe47a8f8f0fa26ab

    SHA256

    2aa8e57eff4fcce3c452fa03ea528e977c79b0ee168c9dd4ae70c90dbb4bbf63

    SHA512

    6b8a340be09abcacc4c4f61613aaa54e390322ddc195f5a865d5f53e24f1d587e130afccd36c82a7cac4585c3cd680f7ed199ab732aa12b7667273ba3e7e658c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bd62cdefdabda5ab21460c0f15e10c86

    SHA1

    f703f87e3039f3cc388ce77288cbf9ca0affe9e2

    SHA256

    de74446d88341fd09a258e4903aefc823010a890de27119e7bf4da2a7e691e05

    SHA512

    4dc2dc30895795ce78bf798ad3797ba3f1415cfc16027476a4b85e26eb5e41beaf5c0b9cf5255f9dbf1fca2f21d88c56911e3589fa8c077d1f76a8662be8e95a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d892c860e047a85627f2968e7cb45c7b

    SHA1

    d04e926888c7bb673f26c6fbc0c1e5e688992973

    SHA256

    9f1762ec20dd9e89a4300c7ea79bd3fc28fdd31c2250afe0be3e12c993c86f88

    SHA512

    a583ad8f974502e6c4e04865332ce094088e354b4730a66c124f7dc5feae42b7446102d8c35f61aa38ef68cb46ab8c90f489617093a276387b43c9289c6b408a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9b71272603b08a807ddd705992a8681a

    SHA1

    02ae5bfca576b1aa8939665bebc8afa822156c9d

    SHA256

    06aa85b8b1f6f52ef3653998bc940b02dd85dab1697738054d259a407bd4dd8d

    SHA512

    57fc70ca835f548a5bb3d63c2b3f7d0f726245265cb3d206571c0f759ce6015d8c6518f8375a1f4e7320cdb74788db9eef1e756ab87da8a25bcbda2c27f675ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b5b1926be69ceea462270379ce023813

    SHA1

    50395bd9d68a0225c91d6de18e56fcce3ed84606

    SHA256

    174e5a2779dc6c37e617c68321893e93e3b9979623a318fb68051a34d8e63632

    SHA512

    c51596c4aa567ee74eb650856ffb51ac8561fcabcce51f5c23222228f0b0dfb713ac196ed57820c29eb6c086a6197c97095ab7b6708982d250f6157b4890ae6b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    29047bcb677e5696b38dcff868a006d6

    SHA1

    b678d510595da1fd2b1422ff35a04d6aa769ddb2

    SHA256

    6fbe19656e23c84cbbffcc73ee1727ca72012fe8627fe2fbbd192485bda81643

    SHA512

    94153c774088045e202c4e1ed405c874ac0eb4ba55cd78a71dff1e5bfff8565ca1ab5c320fcd51c5b0096d8183b05324b5a225db0ad83c8513e6cc1d5ab3fa82

  • C:\Users\Admin\AppData\Local\Temp\Cab3DB.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar489.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b