Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 21:59

General

  • Target

    a860f955f983c82473781d910b97c1b9_JaffaCakes118.exe

  • Size

    39KB

  • MD5

    a860f955f983c82473781d910b97c1b9

  • SHA1

    43f57e56024cdc4d1beda1801d23fa45ec288e6a

  • SHA256

    2b61b98eee2c4c57471cafad207412b2f30c3ac4193b50a33e42959a66158128

  • SHA512

    4819540e86240df9b94688168c748d05ffccde8eed8f9214b0b2c05e328d2f6be3f9792c76fe8a284ea2d9f671fd620403a08cae494d3ce9db7f90b3fb965164

  • SSDEEP

    768:gfpCJOuJsRgmLmLCk9d8dJTLizTqqHw/wzc5DVOpcgetTFBGa:4CVkZmLL87inZ6F5hJPTFsa

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a860f955f983c82473781d910b97c1b9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a860f955f983c82473781d910b97c1b9_JaffaCakes118.exe"
    1⤵
    • Adds policy Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\program files\internet explorer\iexplore.exe
      "C:\program files\internet explorer\iexplore.exe"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2728
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2728 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2772
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c del "C:\Users\Admin\AppData\Local\Temp\a860f955f983c82473781d910b97c1b9_JaffaCakes118.exe"
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\jjjydf16.ini

    Filesize

    108B

    MD5

    5eec3617b4ec5cf91ea621104f6c0c35

    SHA1

    cdd901d36843080259ab2930178a7edfd2dd8582

    SHA256

    6e2f4b650ad4a26a69cd19f5d324e996154fecd67890f3eeef62e2264c324063

    SHA512

    413d38456754e47673ada0327bc294dae7f3e70d957f4d7ac79ec66537c4249ed2fe6c36decebc70b7723ab51f0755fac48d82eb2b7ecc075d20546a94149ff9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    546ea81ebf863f95f1d99b80645517b3

    SHA1

    38271e45cc813598f574c970dd41cea8bf94d00a

    SHA256

    d2ddee6fa8049943fd3797703141f22823206ec216913bb322143a83e5c146d4

    SHA512

    2e8d4467f23977fa4433c791047539ebf56bad10bd9f7e2e07880bf2d7abc8b62b92a1383fddebe5a2c2a9b19e47628fee122109044c1e66dbcd33e92f4024ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6805fe3f75376594aab73fa40f1be734

    SHA1

    eec0f8f491cc5ec99581d43f0707d2ce463dc678

    SHA256

    df030756c0c76366497ddfdcf398c56d09f3f70eaeb2d44df622f0f59a8be5ca

    SHA512

    1998644c455038de3926a7acb209f5cd71e51148645e9fdb5cc2cf12e30411d25397551d8932e957bee1cad58f5de28863b238277c6d73c9a9f46afd4a452a06

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    270ff74435a68f86fef77ba006b43e51

    SHA1

    f48c375fe1a638c671649d8474d4a7650924060e

    SHA256

    0b046129001f6a81145a7a1da73d68a9c074ddff6d30209a844a66f2a6bcbed2

    SHA512

    59483e7655c35edc9eef547d3b0347a67ecd685f36f234a38e7201afc683cf209a82af1ea20278704fc335a08307fcc3372b9f80c62354c6dfff2c50949e20f9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    498b48132e2947f8824acf222a1b15b0

    SHA1

    0372877b82b0f0aaa7d6ef02e48c610ad8bb7441

    SHA256

    e075a450b06229374855fd7ebe9227f55048902861d9be03bb36eb84ffbae398

    SHA512

    76028da6963c608290c15e4ffd763fe2c70959bf4dbcb10df3d036a418be1bb9064cab651499326776895af7ecf3d26ae22eeb5d8687a28a2fdc8ace63e4515c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3d39ebe15f970231eac73b950f1d15ef

    SHA1

    5ab88c050e6f2c382287c09a4d0791ef11696b5f

    SHA256

    b0e86455c16f789cd8d50a040f89edf11148e6cabe42884dcc43766c083808a3

    SHA512

    3ae3d53bdff5e81d648d0c3427c2e24e6d32d9ef25c7b5f60d81be340d9233e6c6f4c867ea2a721ac91dc046f7a4dff985bbc8376277ce5d9d7bf1cc0dc637df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ac3360681038db8cba102fffa2bf0435

    SHA1

    3c34a33b5dd0bb3439df78bbbba8ef9619d4e52f

    SHA256

    d9ef116c0f212f7a55cd930e39c2fdb67ecb66b506c3a37f52c8130949c439fa

    SHA512

    bef510066c45c9ec11da044956dcb2199c15b319da69ed77231c4dff65ae602d35550111451af3a4492164615318bcec7876d76c190639e434f25d20192c714a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    76fa7de53c17d568cc419d54064a0066

    SHA1

    3775e469788dba27b15859c179a36c34362d03b1

    SHA256

    d675600b7f03de7bc9b0348886cc20acd61a07a689275b33b0fdf447aae9459f

    SHA512

    10c0cfdb08116ca263a152c1345abb30ffda6c54cc5a3ec6007e38a3319677beb1d2175cc849e4607e21c41ea277335cdbc5aea33afac9708fcff961c529618c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fa1a94e08be1c47b299d660b2d91ef07

    SHA1

    6829bbb98a390b0b3a3b3677df01b98246c448d2

    SHA256

    ec69d8132d627b925a982e9f7bf24ab1643809c64b07477a5844292e540f5764

    SHA512

    6c9c9cc9b832e20e3c0af378ce673edd85713f3316d25eb6d42890d3703c44a061a7f4e92465c5c233dd970f212031f342b39785f9fcd6199bd74001712ffe58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    59c18bbe5db804f9da6ecbe8aff87143

    SHA1

    a9fe9af0b53489e07e7db41c07d32bb2653bda7c

    SHA256

    59279b81afe29b6547baf9d9e50ff318f2d207659c4654ab074aa16d5041831c

    SHA512

    19b2ce9a28082c63b97d6821d7bd73b012b4db544ddb5e31a51e8e08f180cfdecc73fae39bc7f49e5374b59162e2ffd47740f1ad81649d61338812c0f2652bcc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    50aeb0c94edfbe4c3649648ac6516b84

    SHA1

    af175a9686d6c97ed9c8515d975554cfdbe7242c

    SHA256

    9f78b85b03a748d8ab475665802e1e527e559d10d874d86694667b954193a13e

    SHA512

    92a33fb35fb332bf2820c94e68f8af0ce49607140d68d2e5791e485a6d16d73278731d11b5ae9385d43588dee78139ac66905c619caf5e7ae84da5e5dcac4909

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4384d1f5996959af09a1efc816bba1f7

    SHA1

    9ad514a00072ca2b41284ea38cd5750dd7a4fe6c

    SHA256

    861f6df67adb4d55556b4662a69c85666123b6eef0fb9e2bf8a2dab48afa47a8

    SHA512

    eff054b59ba42da9e913c94fe99b2d27b8a79166ebfb792a66f6f5ee51dce60d3b8c3aed6de4d136b484431b1e00e1752dffed374821819fa47dadcd91cb225e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    eff13c8a8a97bc29c9669aff93363e43

    SHA1

    f520103e87b63636b084bc3a7ddd7c949f51cef6

    SHA256

    0f343a74685b114dcd8a819856161127bdd8a8e1a7150c7994afb8ae68bb13e7

    SHA512

    e87b6a2fbf49cc7e1678a50bab4a657b64465cabcee2a0c103db229f4e06e352fe0371658c9d4da2a150074f5bb7f6ee73de064af39fbddd6c2b207e6bc2738a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aa156330671b0d072c7a173f551267b2

    SHA1

    9bf4b7ef118e4b0f8464f112c23b66e6b3802a0b

    SHA256

    78e88e599e1f6208e31f41079ec2fa9920e9541b921360accd771743e245b8a7

    SHA512

    8707936c3cc1cf1ceaaf29c37eaf9d3c0b0c53e625fda241d79edc1879551cebc61333e2a3364070f7529cc13a4139ec6ecaf96cdec803c2be15837a1b4e2c5e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9fc58af403ca96a926c28ae7863745b5

    SHA1

    051579da4e5c07d39098f2986b7c6115b540e6f8

    SHA256

    2252c73d74d87f47d20e3b5f30918deb1189f26ed439dbdaa274c7cdb5f8e7d0

    SHA512

    3f18acfcbe01e9bdb818bc790057c0b8f1dac1e32648be164a2b2ddd1924efb4ed3dd0aedc6dd1c09a5c2f542e3be5aab501a7de923f7eb25b889e8b0ddb4252

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8042b6e78f848be2f5cf4ae26c4b0ca8

    SHA1

    67a7a5c9c966de51bfc08bd6985728f8e187c920

    SHA256

    93f1353acd12905bfa7c1dda87d0b1e501000c8e37bea82285fbfc3073a832ee

    SHA512

    2a7e9d653a006e990e2b353b3a76076851dd8dfad90ff80c83c9ba40a331374da8f35eabdae27ed33bc9ea85ada129ab4ef65c2914603c70d476a3a8d997a33c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    44a840c92d12ce05057619628ad2eacc

    SHA1

    ab3249575be3c4754ce6831c0b97dce7d3cf4edb

    SHA256

    e9b697bb6ca4bb5bf593d535d43c4ad1710812d278f0065f338f4a143085559a

    SHA512

    2d822b266b04b88adb81a8149ae230b641616f17b3e623f1af561a0f9719fb08d81f86ef0638f5e4d0b5f5c801dc13acdfa4b42186459523b626d4d1ebc91090

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    21c4192ab7c9fdc32d90a0a12aa7877f

    SHA1

    ef3915d9376cab962be4689a1fac552ead67bead

    SHA256

    62a0ac23d7d210baded02c36181e1ce4e083487c23db564ec9a9c786c5c656c1

    SHA512

    0a92d27317b1b988caf97fa22caeef9a4288424c181c2c0c454cd707fc303d9770b610fc3c23114a29e2b0c4d23c767f9738f4f452c1382e8d7e17e347fcfeae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    13b996f6e9f0304ea09bd4961141ddbd

    SHA1

    f20904a7cf1a56e3b1d18b616bbc9b3f9967c233

    SHA256

    bf5066ce0f05188f907ed08590179f8ad88ac2fafafb1584da712608b1995249

    SHA512

    6d8a49e2e6b45395d65e38f5d8e0331f9fdfcdd43050deab0137d7a2d8ab61e2847c16594a626e585c125b192a5a80f151fdee21c6a1670c7abe888ab70aefaf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c2e08402baa01c89fbbf3a874d88bfd3

    SHA1

    ac5f8da9187f3e185098107c7990326d627589cc

    SHA256

    ee542313f67cea20dccca24343a24a59a9832548996a764c4c0d9e263be9618b

    SHA512

    6926395051a20bb0f660ab8957f62506ded03f46d2cc04c1a7f71fbf07615b451a00641d5e63386a0aa7657061d133eec9ba37a2c057ee409122bf4d535ca77c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    32970e373fdccb56c0979b8872023b5a

    SHA1

    bcd2b0ef4ffe6d6618c26fc2d60665836d38c51b

    SHA256

    ef7902a4eb2a83e21d232c9bdb7d74e845b3ecee698d27e1bf1d7680939072de

    SHA512

    abfc36850be23d3ebf9afc3c2bfb84a326205cd9971276879dde25ee7cfa8a38254eb94f10e471564154c4e523b0a57fdeff0c1a7d1b61081c0de8e5c76b0780

  • C:\Users\Admin\AppData\Local\Temp\Cab7A6F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar7AD1.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/3036-11-0x0000000000690000-0x00000000006C1000-memory.dmp

    Filesize

    196KB

  • memory/3036-13-0x0000000000690000-0x00000000006C1000-memory.dmp

    Filesize

    196KB

  • memory/3036-0-0x0000000000690000-0x00000000006C1000-memory.dmp

    Filesize

    196KB