Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 06:16

General

  • Target

    a5b2affa3b7593a89e59fb28efaad330_JaffaCakes118.exe

  • Size

    89KB

  • MD5

    a5b2affa3b7593a89e59fb28efaad330

  • SHA1

    00b6448f680e3422bf5061992137f0d138427faf

  • SHA256

    c710b6ed6ef05a6dd3008f521153eded98510c59949e3305e0f96a7e3712fd99

  • SHA512

    c5c131f1d0b3e61faebdba8c0006c281a29a367ce814bee31d397fbd6f99a95aa3608b93287f6c14e545015f106878e5482272d269c923fb82b74bd5b57c353c

  • SSDEEP

    768:sWs2lukSlng9TV3orQgw2qP+W0+Nj/r+TbVgtaA9oMNr4fhRACymMGUFuiEZuKUR:flmC2rcPAS9Nr4fhRwF50uKUMXRSz5

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5b2affa3b7593a89e59fb28efaad330_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a5b2affa3b7593a89e59fb28efaad330_JaffaCakes118.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Drops file in System32 directory
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2936
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1696
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1696 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2308

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0b9ec36a8f8855b17ad733cccf15a89d

    SHA1

    f7a4327343a4130947169be80fe3796210d80d3c

    SHA256

    d57fde9a051ff407809cefa5b36ba41950458b74e5e7e99a19d1a76b07cdde58

    SHA512

    de03c61d4d41130d21d853cfd1529a0acd5b07c59ee3af2581f53896f5fc8c8329848870975b6b33554fff76e7e36013c895e251a0cf2e8c0be7e16a47dbcbfc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    09fc214a694e109fe5532c00e991928f

    SHA1

    6119995bffba10985dc1bf4ebfec05a30ff4d31d

    SHA256

    8f490e13b543d4dfcd57061df44f926538199a93e6baa3c3655574d822f2c99d

    SHA512

    83db0a45af3b7694b2ee8de311a16acef5952558c746855589f9794a55f247e12ba210300e4e77022ff84b9b71375a42d80e51b01575e7995d78696b49e23e8e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a1fd4547c9a94bdfcbd65ebe9395797c

    SHA1

    352c93acc8cd28ffbee234f51898fd44410647ef

    SHA256

    bd4dd12d0cb514f5b2222a17cce1a5f4dd17edc151519440e27297879cbf8b3c

    SHA512

    85aac5af7fd531b67774363704ebff6c2fb1a6f25d9d9e5f0d04b69a092ae08e35cf6706f7f547b112cfe5fd566f0580cb298b01ce65f6196cec43a3d309d07e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2d5fe012fdd861b61879a5373bec83f8

    SHA1

    e71c010f1135c4a7aae50e440dda3a36bff1c6bf

    SHA256

    4fa081ea733a0e15e8c93693a619ec157d0ff14631f65fa3a558c82717cfbb35

    SHA512

    7e8240cf859829339289837ce47b2460d39b3d20dde8ce742fc87f4b736db21e47a2d9036969e99d6d97e194ac271432e74979ec9c5a2fac9e0cea88a58152c8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    898899c5648d2103b07232df49b97522

    SHA1

    af3e268067dca4f65cf6bb222acffbd5950be935

    SHA256

    4a8b2a8c3289b6f01e7784ea05497e7ee128a2b9d1dd767267f7100a34b8bf33

    SHA512

    f1f23257e3eba476ea630c6f7c59facbb582348633a76a79c8f1acb96ded15702638126f5be5f567d98b5d81f8168e806eca4a655b56275bd02064c9bbb474ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d0e76956d9bd45fb69fb9af06667d6e8

    SHA1

    a9523cdb379b990d940234e60430f25958643a12

    SHA256

    b2cb3bf2fdcd29fc4283234cc39d27416f69590dd96cba93fd04cc46ca9e818b

    SHA512

    9914af8f53aea844e0d0c2d37eeadcbcb9ab6e309f42b0c99c2b685fcb5a2acc31e8a913d31275a34f1e0e3babf1bf62870894e1afcb8e529881abfe3d239223

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dad76dc5416e793c62f186e025f5b6ff

    SHA1

    d479ca28438f90a819602b320921b4aa1b140892

    SHA256

    9f576159281ee372b9425f9b151aed0c1f884e7a4a9e0df62fc3c788b1a497a7

    SHA512

    cef517e156f81c140f2c4ed2e36c1ce3af2920768ee483cc59cd73098bce5f08729eeb0869c7dc0f3d82741bccdfda130c3ff52fe632efbdf96ad69124f9879a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    706ffc7ae45a8ea112ef8eeecc756dab

    SHA1

    76b3913fb46528b5054955cc2bd4dcde5446ded1

    SHA256

    efa2fc9927927ad7d3f5c91bf096e60fc56d1a57007e54c2a32548ef0f98a4b5

    SHA512

    8e146e396b814ec258bf863e01cf6b10d4f746297ae6c2ecdf74513b4e4fac7019f05843f92967e74bdcc1e77347db872c0df3b9d9c162191111dce49109d4ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e081e5ea12d7e75f79da0dcc4fb56535

    SHA1

    eb22d8df092af69cf6c382b3da472f31936699d4

    SHA256

    230dd283f552f5413c71481ec887aa7de84c90a8363dd69f6e28b1d6d714a786

    SHA512

    6d459fe37358176fd5978843ae01996eb94a8722a268bba227c19da07342767a9d83191758b578721418a72901e8054987ab69b4e52401e215f8c3ea4e487b1d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9d343db30d0e3c3d1eb0f38a1fa196f2

    SHA1

    0fcc928c7718dd539cd09086e0e5360b9adb15f4

    SHA256

    59ccecfa75a71ccdb0d72731e5b975252b40fb6814b0edfa188ad0af577bf723

    SHA512

    4a1156da124c4b15d6dae26401d1ea330d1c8ef8a441225eb6f91414022fab0e57c9f23919d1ab7714c71a7a8fb3cacf91ab684d0767acad30c45a096cf56e2a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fa8d2160dddfc932c9dce73162cb9e03

    SHA1

    58d2cc18253eebddafde03d810cfc6e296ae2ff5

    SHA256

    0d6f940d9075938bcf5a19afff957fdd3aea2c221907179b72ae6403d519c1d4

    SHA512

    3cca116ab454e3327f0a2afd90c67742d5a9280ccfa2a1787986e4f8e074541663972e73bb0fc34a75076ab190e85b4df1bb90967c57be58681dcbd035c5decb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d1eef9d86e4a9fc291e3ef33c0b666dc

    SHA1

    76428f30022f2e6b9314d4c762d785733a7c9254

    SHA256

    249d366b8201eadea764093bd14a617cb250654c95ce2a4788e6a7b356342cf6

    SHA512

    8fa1e34cbc3442070a7ce08fdc04291baa2ceaf38367d9a05555bf6266633a8143fd0cfef11c4e57866bfc24d013f52b4522785f7a498264f07e5b3c4ac174d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5f6101b38064c496828384479a67848f

    SHA1

    8f37e573a60e4093467613737d97ccea315fe198

    SHA256

    3fb22c30ce224180c6a544ce46cae0e66e2393914d43e8e7dcd594a9f4a6613c

    SHA512

    7c80040d711416e1cc64a27ef003fc5f1fbc275c8df16f556c8908ead6270728604d8af0ea7fc91de1d30850074411ef359107ac15608ea6ff818311e7d175e4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    98e3d2b751fd5035ea5ad7a1ec4b8330

    SHA1

    8c1c4001dcced97ce25894acdb552874c9a2b1c0

    SHA256

    27864a2e6892b745602856b1aae9542a5838c547e747b91e09cd0de537ccd618

    SHA512

    0a346f0b25365a97481d2c3809d58a7407f99262cf222271a8407a3c9af5706ba187ba95f00f5259325697cdaff3f6556f65bbf7c46b66e3412d9f9fa6953b25

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c44b55f7a3c2c497921d8ca68b075218

    SHA1

    d31410a512f8cf81b607f3cd66ea3d610c55536b

    SHA256

    544bfb8ba7e3c99081aea88586d641cb80153135e68eebde203559278ddfaa48

    SHA512

    7ecbb5596ba3d657960fd83678b9c2eaa209705e5c9079d26d8c4ed0470a8cca6742cc18bd406142635b86ece794d97e9c92008bafc83508c3a8cea5072860fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    92ae5563508373d351ae670d38be6272

    SHA1

    289c266bcaccc5ec59b953452033be26d2b7ae1f

    SHA256

    23476a389e8e6ac49045090a9b61d3a0acf1ac66e2e7e190944d5677cf2e1735

    SHA512

    4203509e15e4b21c372db493535fcacdbd6f9ae3802de73d0dbfa69e5d34d16adb4739629d03fc23ab4e903bf9900d13edf7d33b847d682a134840a01a199554

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    460c0d575eb1bb2e923941dd0f5df69c

    SHA1

    9f7aac9af0c5365787011d2add4e3e39d2af967c

    SHA256

    f2b71fa3f247fa75726390657fdc654cdc9ad12da65622d382d21b40097d084d

    SHA512

    43c26faa8b38beab332cfcc623f773687cd606b8ab436a31f686533091616b3dca61b8815b235c615012689c479eead1dcc1177638a712a6c22e486b855cb379

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    53f9850fa40102bf741b4fc2af831b1f

    SHA1

    376af8dcc6bd54b8f9a65cc581f83ee643952728

    SHA256

    20bddb4cd83fd7b85d4635c953717be6e3f7e4fd15986a25d729319b33155142

    SHA512

    e0ed668424ed4571c581bd7da8943f303e9f4e03b6e1f9453c234a1e3297cb75a62feb7cdefcaca54aecd6a33f5efe61cd14a68b9e457cf50ff85936213fc204

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    907050dc7afcfd77232a9bbce3c8e912

    SHA1

    73e788039fe0aab8ab85d627c2fb129a2a485a4e

    SHA256

    4d5ecdbf37e9baca51bd076d68dad63e278e036b302bb77d2b482063b02a26a2

    SHA512

    14e364e483e7911f0ad595705237c1ebc2664b7bd2566109b4f3aaf32a0452f87aa09e29c6df7862fab3d883bd0b1d09eeea0478e49495a3eb803c78ea35da60

  • C:\Users\Admin\AppData\Local\Temp\CabD4EE.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD56E.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1696-3-0x0000000010000000-0x000000001001F000-memory.dmp

    Filesize

    124KB

  • memory/2936-5-0x0000000010000000-0x000000001001E208-memory.dmp

    Filesize

    120KB

  • memory/2936-0-0x0000000010000000-0x000000001001E208-memory.dmp

    Filesize

    120KB