Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    10/08/2024, 07:06

General

  • Target

    8535fc494a078ec7b975908dd91a04e0_JaffaCakes118.exe

  • Size

    982KB

  • MD5

    8535fc494a078ec7b975908dd91a04e0

  • SHA1

    8546009f7f1466e4f7eb1cac4fe246af2963b1d5

  • SHA256

    8acd1a17583964daef8c49d20f2c970576241810cd3c91dbd8d24efe77cc1b50

  • SHA512

    558f029c9a99385e9ceffc9450619d0c0f3eb8be02e3ccde275fa5dedb2b8c98aff5a235435ae1a7552ff76ab5ac0fd40fae0467659d1c66f916eb17321a6af7

  • SSDEEP

    24576:QFszWS5unaLSnYTwGJ+xCXdgVtgzEwe2Xp+8YKdxGHzcDJ:QxaOYTwM+ct2PKdqADJ

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 5 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • AutoIT Executable 3 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8535fc494a078ec7b975908dd91a04e0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8535fc494a078ec7b975908dd91a04e0_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\notice.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\notice.exe" /S
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2140
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\tjmy.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\tjmy.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2740
      • C:\Program Files (x86)\Internet Explorer\Iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\Iexplore.exe" http://www.iydy.cn/tjmy.html
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2840
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.iydy.cn/tjmy.html
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2836
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2836 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2624
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\down.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\down.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2848
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ping 127.0.0.1 -n 3&del /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\down.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious use of WriteProcessMemory
        PID:2832
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 3
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:2604
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\xun1ei.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\xun1ei.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    34c132732f6471037e176185f14d2244

    SHA1

    5461be4f318c246228298b6ae10064554bc2c2c6

    SHA256

    9ed5b9776349d212f962072697b7f1c90d6818b09675b560dc5d2dc1da4194c7

    SHA512

    90dccde25bc6b5733b2c4531805249b9c9452ac1b499ddb9cbcf9396d605c7bc66706d85aeb6b9ce257fb7558dbd0647bc7d441b7c82837a6e5089a8b7a9663d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc9b0b1f45668e42e861299f2c18dc22

    SHA1

    af008bd429bef3e49db9e8811cd1843797559b26

    SHA256

    af41e68118587ca19118883c949d36ffca40c63bf045be24f5fda8bb5d0635db

    SHA512

    450d88f5c035604ea71801f4db293289f99e85e5485b0f51a5dc83598db7bd6e1a952959b0217d7f7b9d84e7b8b7e19db1c696941920210a1db7bbd71d2d91f4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    419e6de0eca1abe60d92170c2c195e6d

    SHA1

    4c267cc25efb97863f19388dfd762221ca85f9dc

    SHA256

    b2d77e82b00677b3eae8ffa68bcda827f18e13e40780337a7457302c8314b264

    SHA512

    a4ce122b189af77c1f3f03c173f7763b1391055a1d5144ce8b543f827fa8d4ccfcc99192a57d90208a3dda9c9458a27e7cd3582f2e2ded751f8d9df9a90fdb34

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9db4e6bd0cdc44624366d408a3eec8cc

    SHA1

    c35783fde16c2a87c286fc44284897cfabe4ea33

    SHA256

    93b7c41c3b820c0ec1bb68fa99c98222ebf95a752019ebc857948ab615579414

    SHA512

    a9258dc7d4bd438eaab964a430f7d15339a4f57bf21e9fb8ae01a9949837e053190de52e07428fb90be6f1dac1440c0f835dc4fbaba9683e12c0a66730a9e955

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2ff518650de22d9ca7ebb10dd6c08626

    SHA1

    ccfe2e461094dd6ee452d5a52c379531009733a0

    SHA256

    914a5921c7325b792dec39b9529a579400090382a5e6e918b744aa1a0dcd3d4f

    SHA512

    14c293333f5a80344bad429b5a06a86d392dc29a7805ec69ea650b0ec070a5a59e5a257fc8bfee57f636e8cd8ed203a47bc1a056a23ede620fd288309ed346cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b305b667c42fe37f722adff219d4f431

    SHA1

    0ec23c85109173be5045c8d0cf0da54bbaea2b67

    SHA256

    f731e55d93dd802dcf0c213b456a42190240f51ac72eb9af486a777186c2b534

    SHA512

    3db145a57b59097e50322481d4a6ef8c50c7bcc704af5f7cf4ef58c8732e231866a2305a83306b70af2f028a66ed762e2a9374d35b7fc09a5cda05ed2a4c1bf6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4b2b85c29bc3cbdd2ccd91d64ea39700

    SHA1

    b23bb50f0d0242219bc689ff25c83e254ffda616

    SHA256

    570ab2700e445638d671860534eb731381ed711eb8f55479b2bcae43e56897cb

    SHA512

    6cf91e62b1db41b840c1318f2dd55dd2593994de6e8e4ce0d09e688bec10f89ab2b26d139264fcfde53a113791f3ae3d79d93a7fa2e561ae0c60b7a98f86bc16

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    929e15f6be16236770c2d91b1b740d97

    SHA1

    0966b1f195de6e3eb630ba85b5080acc8abceb5c

    SHA256

    be9f3578db9f523665ebba18fe15fb4d0b704d90bce42742b7efc3004ec33e13

    SHA512

    8adf2c4de39d604e149e576e66dc0eaa3cc2366981e1e6492b9b1f0ff7ac438e6faece6abe37601722fef1eee79816a3206231fcf9bd804adc95c7118ffe665f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e6cf55116adcc6ecb3cbd224306b15de

    SHA1

    e6e0b8668431d883a2bf0480ac981c6aaa98c5cf

    SHA256

    e9ae6fb19e02079811bdd774c518ff9abc1c422c1d37a30ae7559458d68955d2

    SHA512

    81a64905aa0f0e30e2f50d94632329dba3ba9c62da88f00002058b615857cd7156961ee647fffe899b44dcbee6f6df7601e82fbddfdd7c735db3aa4954d373ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4154e71cfc2fb1787bbfa7ac17131614

    SHA1

    237c0a2c8531aac1328fcd67f64044ea47a228cc

    SHA256

    210ec6c02c0485ca48a4e436fb4031a4b69b28b13ba78bdc8c30a75e9f6bfcc5

    SHA512

    9373cb0b052150f7747e1dd1acfc16b11d2fb67ca38cbe01b662cf86fd478e5507067442d697267623e681c221115e2310810a646db2084ee02bcc22d8174324

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3931436308d344a4969eeccb89c5886b

    SHA1

    483e3ef27e9bf6d8c0a4668bdc84c630ccbe524d

    SHA256

    1693f0916381fd8a6b62c6c2a0ec3f7b367efa76a71392f987369b366d0ccf77

    SHA512

    47b69b023125f2f3dfbe8e626713b74c85e8e60132c9bd2b78cf1504434481cbd2fbddb7b6e8944afcf4b6e32fc04ce89688914081d2edffbc3723917fa3c35f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    682f0579af40a3a6516d951dd12391a7

    SHA1

    b31c06602655dbba7c7c5f35ad69f20fbc160559

    SHA256

    59af30ffc712e33a070af9b9e38b5eef265058a0117e56daea573fc55fa2eb56

    SHA512

    b6c9c16614b2cdd31279f5b8a052aa646e68080746b9208f54fd63f00fcd19697dda5b83586120093af5483c83e0fa05a7ee574d358a70eb9528e55b2f6afed4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5e1fdde4b8acfd2cb371c9c11fedac0b

    SHA1

    636ebf785b1e33bd19228038ad542d09baaf2d7a

    SHA256

    9f886f0a352d8b2b9984215296f672ae9894b6a964d2a58e30697362debed4fe

    SHA512

    de5d6e0ba9f860828176d407bcd3e6a9d12b678327c9418c9c196855c8ed01372a61fd973738d18364367bba4eaaba413d54a5abdd2b68202dc35d5125f4009a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f32111e97ec941c79609efe2ff92bc36

    SHA1

    c9da41324b57b9ebfd9c9a48933283c27890af2d

    SHA256

    fbb378debb1be45197fe841f74e294a6b8d34cd1b8edb0aa35a810e99e385b3f

    SHA512

    d9cb6e56c3ca042c3156d64724af3ad5526c358931391f06c22909ee38d19721dc9bc6bcb6988400824d0883cff89ad101197dcf767587a71d293cf584723a75

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e1d98990d4e6033269c9a17845e8032a

    SHA1

    4fea7e529779eca33d3a6f38ffe550b414653308

    SHA256

    b41ae253a22066a8d00ff41c3d87ecbb68cafc2f00252e193b2e2b7b1fcf2633

    SHA512

    b4657cb4e58bfc0413c7fcc8dcdcc1f3bba68a9acd47ede70051504a9236736857a97c658df3c9eb15b090f15e5a7b057ce122ced8f8ed04c6c14d705ef74bd1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    67d0c63f6ec5b4205964f00ac7067c7c

    SHA1

    bf611ae5179ce28727fc8d3566710f8535bf2999

    SHA256

    d5d38fb5399d17c5647ad1d7302bc87ec772919d27cbee185fdef97362844f0a

    SHA512

    d2007980fc4cb975b545f2c3ecf9a0ccefcafa04472ecbe1e3b576a0ef6e1830c37cf0f3ae858da6ea5ae81ced9b71528e03b9d5e52a583d3d5215082e50436b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4212f90491ad429ebe59118357b6ea18

    SHA1

    be3f8464c519b61fd8b4090ebe8989770f0ae36d

    SHA256

    102a0d5e928b9504870b541d06cf7ef773913c8e4774562d6609e7632f0653bf

    SHA512

    cabe39ad59d023e24b87a3fb6d99c285ad5079b8a195ef44ad3a799ba16f7aeb459e9d5e210216e613ecb266700157460e7cb3586bd84611554391413dd092a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    14c20d6b652d1daf3326d981ba031a6d

    SHA1

    e921d493657afbf0124a30d9d371c501273a2a36

    SHA256

    9f62228e5283f679b4de28e6f629221972f1dee6de7199ee7d9be03459d738e7

    SHA512

    d6721b77827479f9328c38dafaa35835c48322a40d243ca18dfa4743608dd45ba6c0097159c23e12927f48d8eb5baf98f360fb200234697e791ff3fc576ea3dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2147a190873c3d0dea5a02fcaabf381b

    SHA1

    5eb4ef37a34893d6aee1789764b0b26d938ac21e

    SHA256

    98c8cfa95a9c9019dbbff8fab4ffef79c1ea425e62a6143a73953f3ce37d4a8d

    SHA512

    5ebd181782814d2fd59d9b5bc143be2c353ad10cd79725689316ecd4c22b08a8e5b05200e85b05e0b6da2a23151ba2f0b061a9463dec2ad4c9d687337fce5db1

  • C:\Users\Admin\AppData\Local\Temp\Cab551.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\notice.exe

    Filesize

    16KB

    MD5

    579961d94af1601374c82ec65a5078fc

    SHA1

    bc3b55defc1fe6d28b38ba3596f781d851af4dd7

    SHA256

    4f9a9635687f098cdf51ac288f8aea27d90d55c67a8924aa33232f98ef606731

    SHA512

    66cd24bba64f5fde711e7df8819783c4730cdb41bdd65c5ac4c9bb26ee93114cad147165543433226799e47444a518b7e6bc826d705b040e71333dec6ee19bc5

  • C:\Users\Admin\AppData\Local\Temp\Tar5F0.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\RarSFX0\down.exe

    Filesize

    677KB

    MD5

    192d1e8bac53c13537708e4d5d90616e

    SHA1

    28c0f684c8b58c42c3bf9823bc3d831b6cac9b98

    SHA256

    f1eeaff0ee64ee8a8ce2a0fc3d0906b156a7f9f85748fca2f95481ba233f3bb8

    SHA512

    01b8d8376fe5883c32d5b04dc6089a07a608996e6bacc13c915d18876c3b65b5b500c1bd27ff7f507b9fefe01aebd9845c4153d2c717309adaa6db559bd725b9

  • \Users\Admin\AppData\Local\Temp\RarSFX0\tjmy.exe

    Filesize

    251KB

    MD5

    4cfa7e59c42fbdcdae5e42e5be9d21f3

    SHA1

    8e2f7c667a843210798f5b74a298594d564f3d38

    SHA256

    77d1ae5ad595394e14ccbf4a7e3e8f1b46f43ead3f1a92c786584be9167823ff

    SHA512

    b9a54f89ff736e8bec9f6a3d04968780370de5c4a29c8142dfcd3fafb5cac94f722d952d536740a97136b103a4373d8c70ceef4ae018326fa9895cc568e9ff83

  • \Users\Admin\AppData\Local\Temp\RarSFX0\xun1ei.exe

    Filesize

    592KB

    MD5

    8ea4f25d9cf452ffb4fab3356a818940

    SHA1

    9fe4840426265b8f46f9e239f261e2804048f4a3

    SHA256

    c583c1e6e1e5957f228ab656b1daedf7939e310efbcc184411433c94b7bf2ff7

    SHA512

    04c4fbe5731d950ee5021fd1737c009c4d26a01f14388603708c8e2b13551f949a03219ceb473c9a746d6385a3eb9996df76d6fdbe473703e366761eddf31d9e

  • memory/2080-23-0x0000000003490000-0x0000000003526000-memory.dmp

    Filesize

    600KB

  • memory/2740-24-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/2740-27-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB