Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    13/08/2024, 02:55

General

  • Target

    9155a190fc16032dd6173a6776ba76de_JaffaCakes118.exe

  • Size

    322KB

  • MD5

    9155a190fc16032dd6173a6776ba76de

  • SHA1

    fb3f0c8c1f0acd700f0adfe51ea5ea4a47f5f5bd

  • SHA256

    1310d03f7fd1698e1e4e157e75cf6aad4aff2fe4056ca01c471ec2df7ab560a3

  • SHA512

    90dfc8872a3dd0d7fe3cbafed287190f5866cfc677d5fa5fe48ed7d3c75ff773a80ca73ba64935591cac65fe708114d7aa3d4cef10500107281057d71e853337

  • SSDEEP

    6144:Rs7cv/q7pvB3u8NM/Mq4e7JV0BPwA4tD5wWjmmmX5sQA:0cv/q7pMhB4OtD+Wp25zA

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9155a190fc16032dd6173a6776ba76de_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9155a190fc16032dd6173a6776ba76de_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:2288
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.dl-xvid.com/firststart.php?sp=NO&xvid=1.2.2&s=4475&data=
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2060
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2060 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Temp\OfferBoxSetupFR.exe

    Filesize

    173KB

    MD5

    cc93e3b445129a7fdeb017e790b7bce5

    SHA1

    bd0df8d3f5a26082723689f2e01bb451fb5b8384

    SHA256

    e796ca74ca89994fb41cee2ee9f31bffe2a2c6f6976b1590eda75150b09a618e

    SHA512

    9e9b624f8b2f0a519c9252cba6f51d340d89d4b6128da969410a3c8a93213cefa03cceb932944b632d917e170ac5cfcba0d9f2effb6da1c469f6ffd9bfdcd03d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9e7283d2a1f5306ae34c5cfcc405d0ac

    SHA1

    8ce388fc781b8a5d3abc32b5bc151d49b3742faa

    SHA256

    c830688bdf78bf56fb5a036222d6d84bf9a5e4e8d628b4c752380be15a4dfa4e

    SHA512

    ae48eb6cfddd7cea7b33667251a19d8becb9470e2fe71470201a7452bc2874ce019cb13f4fbdc09cca9dbe5c5ce3e4ebb754851d77627c34f148649e56014709

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    842bc791cc414d693a24e6bb7fed14f1

    SHA1

    c2e900992c6c461b090bb69e0fde7ca18aa0c128

    SHA256

    a8c2ec1f131502cd767a3a5301aa6dc8880fbb25433e2dbc87b16f58961e75e7

    SHA512

    d50c93394e88ca4e07d8d0875ff1a811dff4bd3d9be56d2d806d7592b6c50d0ea3b867e5889b6cedb10b994823dacc67219cf4313c89753ef88091df12340741

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    183877a4972963c13f9b6358601da41c

    SHA1

    e1fe237b6719a309bd38274e733c7209471a5841

    SHA256

    c1332f217eb185b4df91db8f839a020bcb71254a540e620b63b5afc9bbabb120

    SHA512

    9dda4739a7fcc819dc6a4931386e9ad5fa86b384415589336a7727753d1e08dec736ece8b117ff9aa2966f511968d693206ac0ef67fa769ddc4fddaba7e4dc3d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b1b2b25543de204e5222d4b62b68e413

    SHA1

    ae9d78ef10773c7fe6086ccf83c802f45c093565

    SHA256

    1491960fe8565ba8fe4962d71f092430e0cd24a4a9d72e4d84282e8a1a3c723f

    SHA512

    5d58a8522ea3bcf252547d7185285381fd411af34937a777fd5e9be95d9cfa0f86fae2f84a91e5a712176b1c93e858da67d620dd4ec5f207a0893d15bdc64a8d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    39dd988aeed360d1bee6d7354ba2a572

    SHA1

    eed70c6d6d6bc9863b390d6d5829cfbf9bb0ea56

    SHA256

    691526447fca382bd68246f59bb6bda086abde0f0fbd0b51dfac486d4f7aba49

    SHA512

    e7d04a585304edfbb39c984f6e588da150def9d801b84fdbdbf9ad1a7893e0ffe90305000083f34df6924694b40090baca0fae43a4168bf8db330fe2ddade9c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bcc4e19a8b2f12f8e9a441b629571aeb

    SHA1

    ea4663d2828cd70f55eb829395bb42fb5a1b5e0d

    SHA256

    e658f9206484a299a8dc98d76e9b679579a95f12961baaff21d756bb7ae9902a

    SHA512

    15f40786771d40e6c2a599d3deccc0592fe0d18d88faaf4a348f643e9324c0b75ae872a8e3728e5b9f1852c65eea8f78414de841265cccaabe3ec0496745567d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e9cb9db21ced6e302aa2608ed9ba8d5c

    SHA1

    11e52862af1d26b2eacd61365f94b0d8baf4d36b

    SHA256

    00ae1c7fe774c44adc6b861933c3bb55f565336ba6e3bb1aca7e6740c31b87d2

    SHA512

    5f00ffb87e4c19f28e01ce0e1cc0dd34aafe0078cdacd45f29b701c6941b186e65108b647c52bba8cd335b924abbcd5e59bd56ec5eba12c7d8624a65ec862aa4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7eb402f567ff2f2e24a6f1d36722f276

    SHA1

    a398be8fe5f66aa1a9b955664205c91e4568b6c9

    SHA256

    b27f654a3d2f36761a2adb318f966de282345106ff46ce2ce427ec95a66594e3

    SHA512

    fb8d753d24942cdb0891f3a100e79ca0367e3b93ca8bf2e8d9d012594654cb731f846a657c6c7109ad5d622ebf7ebf2e15389c04237e6315f235c1dacba69cb5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c5c2d87e0c8a6e38ac1538d27d5c7bb0

    SHA1

    158579ed3eb9e1fe8e921911da88afb1061297d4

    SHA256

    08d2d7b10abbd8eb8a12d849dd28105cfd64a2624ebae39f506f86e0f29ae7b9

    SHA512

    b57c84495814b94342e625f580c76e4e3bf6fb16be5547e0be5550f1591589c3de48fa98cd2cfa759cf021516ca531a226891e54006c4b35d8a1af19c0d567ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ca9cdcdae25f77d0dac1b4983df8c86e

    SHA1

    a1ac539dfea785d6dcc6361e1c80d27247b6bb21

    SHA256

    5ff9bbeb9a30637889a537fdc82615dbe09bb2d3c385fb2562328bfd6710bbed

    SHA512

    48dd425e5c49f1cc197060a9747093bdef57adf05d4a8ba390ec8343fb5b1b04ff546da89d84dd0dbc06e40834878d56e42a136c2245364bd49a690b9063ab73

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ad275b547223300155f6e4a6e1c5b5ac

    SHA1

    30cb3c757a209c5350df7c0fdd8dbd8cea863ee0

    SHA256

    8166f7ead3fea7e80999df16da9d0e775bfa5a56a78bfeaf1640ae7a8675153a

    SHA512

    492cc6cb6d963f87ec359dad9196cd32c0db66ef22a068fdbd95d71de8742c408016dadd738abd190dcdc41acb6052fd7c23f20261b3fe40ec3e80d1005d0766

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aa46f4069c8c7486f9e94df4b3c66435

    SHA1

    2f3be5b490e7f6cc87b1a6aa323be45637e75f12

    SHA256

    e2822fbcd07574bbb1eca0d73cb5eb756f9140ab16d05228a80ede1809a920c8

    SHA512

    c79a9705efe1a76c5f2b58a2d8d2074596eec52a4aeca8d8b10c68b290665d894a4a2a56d8ee6154ca715761d7b7d36741977264561c9ce62ad84db7a78dedbe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1bf42af21f832fc5c5ee1d97435c73c6

    SHA1

    6d3f92ec840d297ef6ecdb912ac27b41f0899051

    SHA256

    4a9a526772ba57540afeae2e5140495241f4bf6664c7a98fdf34065bbd28b8c0

    SHA512

    6a1d3f1e64c84cb1ea14295967190e5487ceec2845f03184966dbff1b8c2fbbd72265729bf1c7b9fa841c64a70ad26ba545a6657bc19716abd0757350a2e8242

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    48f0c9700787d2e40a3282f767b9edac

    SHA1

    ff25dd6e705384e6f78e605fbcafd2b4dd197eea

    SHA256

    7bd96833ac170e1a3d7849a53d5c5a00aa63e1a13c6b078ee49e8ba781e451f9

    SHA512

    f145bd8edb052f7b55089a8eefa9f36aa6705afde9e48807b88e5b83470a54999ee47a0244519a63ed462e0af26060f563e4b168302f57508f4b511371745d13

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6ee3b08c77d1e9c42fbde2f00eb2cdb7

    SHA1

    e6f5c345c0505ae6c9148551144e5dbf2074a3d6

    SHA256

    92b356e997bc2feee70aca860ba32a8cf0cddb6f8d6987a1aa9656d71b8565e3

    SHA512

    28d446aba98be286369d8d05029789650e8a6c89204dd768b080e42c90fa32fd80ec48d2cb98c2dd5a888117eb8996c755b419c99c7c6f58737d5482730700e3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    28473d8f6409957a5c6fb1624d5d6a5f

    SHA1

    0d39a0c5e113da6a4ffd30ad136b171fa9786f46

    SHA256

    b6b046a3dd96750f8553a35c2a97f35417b07d8f056a365ea3631b6b9fa650b2

    SHA512

    eefdc86a821cf6e3467cfefae2de78462d7c7dda256d0a4e76bfddbf106d10d454d261d95adc2e2cdd9e0e0ed4f872431d0330423b48b15a819f6b79cfb4f9fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a76517d19bd479a825ab310909ffd997

    SHA1

    ce4b089398d7d7e69418a0a6e1c8ebd39f198cbd

    SHA256

    2cc144bdfff874a480a55af48d915bf6e3d69e62cf2e0c2c77e98fae3b6accb9

    SHA512

    be441e3a126fe1081cf785e6a8fe7bb8e99e9b0b295e2447fa106b42f7a9a3700ef9dbb23c0a788d7e9c0c3e5790c0aff35c2e630f813bd94c4359afac7698e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d7d96a18f64476361ed0f92648456d1a

    SHA1

    71358860805794839a5e6d9862c07d8fcde52276

    SHA256

    434df3657a097acaffa2267ec869db99e253442c928873755d9af5e06ba11bce

    SHA512

    9a7c5a266ddadb7297a71f5c698c392cf68c34d936029870ad9b488076f15f4d6bf5135861fa1e891aeabfefda638382225920e40e8e38eed76b3ce0a48dc36d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f8ee116acdb7eb95891516033d2bc7d8

    SHA1

    1245f3f8523208b0fc43ed95bad98a82438c3284

    SHA256

    9dd47a64b445eb3408a461cb0d72c619e7bd57d542867f3dfadfacbfde282280

    SHA512

    6ab4d55199fae6db52f56119197e1726ed624e5624883ab249199f047b236f08fb543a27f742ecd4abf3d6c56288d9267c1f240256f3942deca030129429dc25

  • C:\Users\Admin\AppData\Local\Temp\Cab3C65.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar3D06.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\nsjEA13.tmp\NSISdl.dll

    Filesize

    14KB

    MD5

    a5f8399a743ab7f9c88c645c35b1ebb5

    SHA1

    168f3c158913b0367bf79fa413357fbe97018191

    SHA256

    dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9

    SHA512

    824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977

  • \Users\Admin\AppData\Local\Temp\nsjEA13.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • \Users\Admin\AppData\Local\Temp\nsjEA13.tmp\UAC.dll

    Filesize

    13KB

    MD5

    7b71d29b9a40808b733b111cffa2185c

    SHA1

    5d113f9fd0049711b0cdbc116ab098b9050b88de

    SHA256

    36503fdeb35259158c3ab2fc0e18685943803e9ead4fc64a842ee09dc855713f

    SHA512

    1b49de3975d066b9447d274b7e3d449b9fcba60e6f4033d6ca9a38ff77f8f2c08ce6a780795db48fbb1da659b10c0bb3da717986113afb61765ffe06cfdb3599

  • \Users\Admin\AppData\Local\Temp\nsjEA13.tmp\inetc.dll

    Filesize

    20KB

    MD5

    134b93f8bd1f82cd2f1b06c878580703

    SHA1

    29cdbce7a2caf1f7e4d2a139c42336d490074665

    SHA256

    45153adf50541316468e2b189a0f8127be9fb29e2f920e7eeaa6aceb438db8c4

    SHA512

    f970c38debb6631dab7369e2bc96237f16a8fd328d9d35a2b54cb688e1807f62cc6d63230afe89ce5c3945097ae4466872c72929a9623adde3ee57bddf54b692

  • \Users\Admin\AppData\Local\Temp\nsjEA13.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    c10e04dd4ad4277d5adc951bb331c777

    SHA1

    b1e30808198a3ae6d6d1cca62df8893dc2a7ad43

    SHA256

    e31ad6c6e82e603378cb6b80e67d0e0dcd9cf384e1199ac5a65cb4935680021a

    SHA512

    853a5564bf751d40484ea482444c6958457cb4a17fb973cf870f03f201b8b2643be41bccde00f6b2026dc0c3d113e6481b0dc4c7b0f3ae7966d38c92c6b5862e