Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 09:49

General

  • Target

    a2124e3bd8be252fd6eb28b6c63a8ca8_JaffaCakes118.exe

  • Size

    45KB

  • MD5

    a2124e3bd8be252fd6eb28b6c63a8ca8

  • SHA1

    685eb27a708bdd96f496c36757354a7253cb33f5

  • SHA256

    de146bcdd9c4654ed46720326582ec46ec34f37bfcb422af9b726a6ffe533f19

  • SHA512

    4fe6ef741d424f56c521a3eb43abd0333af400d7e7ba99e6504e6afcac2ef5f355bad5e4bd8e13b6a382a1b49b29af655f4653f3ee3af8405bc720624e590d58

  • SSDEEP

    768:3urE8TCXx4KvmWaZG/sRtn1Fqd+gbor/3pNzpgZ76iaeMNmOne4Nw6eEVzTnr:+w4z8nk1Y+fr/51CQihBOewLeYzTnr

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2124e3bd8be252fd6eb28b6c63a8ca8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a2124e3bd8be252fd6eb28b6c63a8ca8_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Users\Admin\AppData\Local\Temp\a2124e3bd8be252fd6eb28b6c63a8ca8_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\a2124e3bd8be252fd6eb28b6c63a8ca8_JaffaCakes118.exe
      2⤵
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2684
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe" find404.com
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1440
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE" find404.com
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2520
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2520 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:2264

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2c470dc8bedb1c2187f79bc4a461f623

    SHA1

    3c06b3c93ba16c9aaa043455e3758202d23ed092

    SHA256

    ed79b9084ba8bc0ed6c082ea44ba6db55c8546fdb505f0256dcb0638faf7b4f9

    SHA512

    6ce9f0c163d646ba92daba79bd4740ceaff18f78733358b93df3e715482a9ff2b5a1077a8257f7a45cab2b65e9e80b54daf3ddff6d3d3d9c62c782c8a06b4360

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    857b2cabe0749151b5cdacb1319f258f

    SHA1

    75ffff9ca25d2733ecb535acabe2f4ec99ceb222

    SHA256

    347d2d6cb62bca92f38746c8e43d5bea4ebb93e39b741d42acfaaf93ee56dba4

    SHA512

    78f12fc558806b400416ab7143c0173d4e319b3b23efbda53fa6b1b84eb41d84093d5331b377223f4a63b69f96fbaa028cbaae50bd73b873604efdd1b725220d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5ebcb2db974e2af4ea0d111eea7a3018

    SHA1

    ae4d3c65375df35a469c392a122f62343912ef66

    SHA256

    6d4b4f492f13f98d2db5dfdf9249310ed949f7aad557ba216886a00e6380e563

    SHA512

    d238551bbc98822fa24f88da71f3d9c8630cff2d4d9e19ad5d6145e4721287e96e7df104f72ecc54f630af46e87e273f18e9aac32372e14f538602de013e0606

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ecbc0a42e5e074357009c144cbe340c0

    SHA1

    5554ec53e536563d00708e07470b4514e3f680d9

    SHA256

    4d8a7bb4f256d5dc4489db617afc922bae8cdc94530b7e8e62115f2cf16897fd

    SHA512

    c123a2c6c5a7d79b7a6421d7c6526f4403db8d2138451cb93dd34f32933e29cf93862731c12aea853bc1acba02d8818420a5e5b86a1a5a6c848136ffb3fd5fed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    217f93622df39ce42cd0d227330ee734

    SHA1

    72d780af199149ffbecda8111a6428e2595e4cd1

    SHA256

    f871ea8bf0f594eb0b5b94ff7fb1e061fd9bec5892e4a66f227aeac017d311c4

    SHA512

    53d74befeaab88b29945868b97d1ae0522cf1d6be74b458a52c815179d302969d673c03e3135c67c22cced2cbec3a7a85feb002d30a34d01b647e89f4c9ad597

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0559ffcbe45011a73399481c2019f652

    SHA1

    e9b4c1b1e4742108c936957ff690dc8eb7cfc63c

    SHA256

    278de8f137f04008beed3dd6874e71500b40c738199176ddd8f91b3670e2e4c5

    SHA512

    f4a5cf8e4af4da731ea183bef045a47d56f8308ccea079d3a27dd818170947f38140be061f301d249cc305e3fdc4d11dd8c8c3090a9a161c8a6f2cbe652bbce9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a6aaba425eefbc8f3f2096f798214001

    SHA1

    5e19ef5338bd96ed45dd719a3954a0827ffd026b

    SHA256

    dc4d560e59b2a12eabc59beb2ba4ae83ac3ef43bb7777054ecee9f5a12180d8e

    SHA512

    499d68254b6b533a92016aa8c2f42b63586dbb5c04f17b01e2e3de6a4488b55bcfa9b7c93fda60c23825acade74a59754bbb220db72d259162390b4ef805687a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4f5858c60ca6b88a3e8bbb006a899578

    SHA1

    7fb795df2455a8b252c58cc305aec8a50437bc48

    SHA256

    4c67fab4aaa2e1e215b360a1fe5d9411d603bd306e96d7c85771a17f46598cdc

    SHA512

    e59ca82b13eea9012cfd4a6865eb7acfa035cacaae679e8ed42f7b5b5331c26522a3a1ce4260164554a86970be5d852cc74106466b5c2acd8ef38e67ab9992e0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    65bc6a653af0492438d9c1c724c88b7e

    SHA1

    172aa05a97a8345580ce1d28ea060c2b69881237

    SHA256

    b0ba30376ba091fdf54a895e5339075b5ea5d4550c7794216069e5593f718cd4

    SHA512

    551ffe9a4269a38f07c905fd2218d44e3b24e5f3e65180adc44af26b3a46dc8006d136c8f683db4ed167a144ad7153a65f5cd89984d36209d59f2a2db6c25df7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e28c27f93a59dd98f4611eb063d93dcf

    SHA1

    c288d0c16fe47ec3eb6760db18482d3174a34e76

    SHA256

    5c04834b273e9bd7403c0d6b4da3e03c7b796f15848e689b4d3690642bda6c93

    SHA512

    fc37dde9a3ea01fd7c10b49bb7aa0c16a81d0422f39e238189b310cdb0fd7b0145b6bf82ce0656f0e3e31ccb957af038902d36d499524a9dde75bc5490b11ab7

  • C:\Users\Admin\AppData\Local\Temp\CabDDD3.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarDDF5.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2372-3-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2684-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2684-2-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2684-4-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2684-790-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB