Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21/08/2024, 07:28

General

  • Target

    b297ad1a0106fa1f8f6bc521f0e2c5f8_JaffaCakes118.exe

  • Size

    113KB

  • MD5

    b297ad1a0106fa1f8f6bc521f0e2c5f8

  • SHA1

    707d2a4480546f481d0a6f59b6c7c2500466187c

  • SHA256

    5592187e11d9f7ddae8715ce3a70e833ea6acf56967ab286835d902403e19adb

  • SHA512

    7802cb3f30b09b96301c5c6a9453bc12f5694f025485b804e38dd478673067447d0c4d4360aa7692f6e980ab7e2fd917fee776d5749581d841afdf4f2f522037

  • SSDEEP

    1536:E5juZfssKlzSG3ZCW7y/Jo65/msfs1WHr+24IoVioAIWFf2fQqbwXw8MGR1RPq5n:E56ipJg7mis8L+2DoVioGufmwgq1

Score
7/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b297ad1a0106fa1f8f6bc521f0e2c5f8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b297ad1a0106fa1f8f6bc521f0e2c5f8_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\Users\Admin\AppData\Local\Temp\b297ad1a0106fa1f8f6bc521f0e2c5f8_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\b297ad1a0106fa1f8f6bc521f0e2c5f8_JaffaCakes118.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2856
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2696
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2788
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2788 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dcd32b4f39823f5aa237f6d86e17b6c2

    SHA1

    8448371123db623f3d8ff38b2cd6b0f3f66573b1

    SHA256

    f7dd8a061e2032169ea83ab504a9f3cf6f79eed86ccfc50733fd2eacfaeb401e

    SHA512

    4c15bb5a16f4caf399061d580b05e9b4578eed6083e84d88d3564d00562ce307fc4e4923b3e230dca35b6b7f2c853d7cb662e646cfc6d6f3cefcee27773444c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    81d5782e0c00be210f98057ed3e9e95f

    SHA1

    1a3c06887165151e4a86760450d309903018c820

    SHA256

    45a566d386a97b5d903c6fa5507f3063234c4a7a5833b8f480644b7e2902a236

    SHA512

    50fd880494a9b0a11aa6ea68397bc0e179df9a34a788e140332d43f4cc3c93acb3b62cae677b410aa9b1c34ee30aa790e9c20f8493fee88041834f40f6e0afaf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    af11d7fd71be74a300006eee03d4a92a

    SHA1

    24328c885fd0ea12f0186b2aa6895e88f5ae6456

    SHA256

    9149b945a2bdcdd1dbd6aa873126779dd376aace3d5bb65821ba2bde94e7ee7e

    SHA512

    ada647423430d06ffbf56cf92f2725517fb9ca6df0f88f22b647dcd1398c95aac4721f5667c03d2a42dcaa16065fff144d26193d19c683ed0ee299952410c2e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6453d183bd8be617a48a282390e0543d

    SHA1

    b9c48a871641a3a134a128d5520f979e2b49fdc7

    SHA256

    5b6ddacf0e9898cea1b48da8cac9f612d07602c2828c909471d28a1428986a52

    SHA512

    e884ada7b3efb03c3a5baa01eee2fc39d23d52254515f6a9cff5abe276bdd2304d7c7f6176dba0b90c318b1b7df27e929e91dba36d78eb3b947eed528cba56ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ed4495cf7496fe040d1de42fd9c0bdb2

    SHA1

    df8786333d896c38718417d97b1e07d4a8d4771c

    SHA256

    e69b5aa232e55ababd5dea71c71f0b2453697cc585b91b8b016aad40e48ee934

    SHA512

    c5743c2e5cbd3be2e29e929916a4abc48348aae3f4c022c79c9b75e1d219acc67ea5f75a70649c8c390010ffa9a72e4b9d7b96948af6f28377bdade2da59cb9f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc2294beb7747248c998c747ef6b8de8

    SHA1

    0abf3d81cea2d9cfcb189f85dea4e634a2082571

    SHA256

    dccbec74786d314ac41f373f4c928a218aedeff3498fb7989b9f53ba144324cf

    SHA512

    4971fa464fe2bed46067cfd541913cf013d4a77ffa48e7269a5fe5759e491bd666ae574a0fb418c88213bdccb7d73f693321e4011280c8e8f9866b6955bc6272

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e6f93a422a2eb34a0da24abeffb59374

    SHA1

    5051410a9de6f2d8fba5c2f5ff5c98b5f1fe4230

    SHA256

    90596fad52d87b6043fa0984b8a1258d4b19ae5308d95454ecb008a9b253aac0

    SHA512

    1308e5ab91866da4454ce5f356ad0941efce29f7fbb7fb64ffcca389c3ca41bb33b37c7df46209be8c9eec5ea6b8bc3f1f688248c711cc0599c62083b5d5fbc3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    58cde7db048446831c45b6d5113ae62b

    SHA1

    2059849e925e4ea635b94b23101aac1ca46e844a

    SHA256

    88cd12869143fb9cf78a8adc82b9f973e5861f54af6082b361f96d0b3eb8ac35

    SHA512

    90217668d0be9db2e59d023c13d18756e1b00f752084dc80613046dfd91e3ac00eabd645edaec674aff6c173fd673ee054af572da54f24ecf0606793c765caab

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    38f73806e2739d827d1e184e799ff440

    SHA1

    cffe91b0912f094836efb7f4ef9582d9a4b2530f

    SHA256

    c7dc6c4b01ed8eb410111c6c3e213174e22e58e3e1c75f030047db0a8f159694

    SHA512

    afbd254bc89df1a40e9ac631e754e67d5da0a644d3ac6c0eb9554a0020deab72be202a13f998c1d840fa90328b5e49f0a3a8ecda1a2feb8f01f73d4eafbc7588

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3826e6e0d9de9d0ada85a530eb2941ab

    SHA1

    dd416c3807d12892912956a2daebc2708522570d

    SHA256

    095abdb2256fda7982ae2e2f5aff5d8bdda6710b218147b962e47a54a02c0c1a

    SHA512

    99f9ace0551a8a387793527c520e5b9fe86c6f4112e0aa8ec20afb29dd2225e46bec292e3f6efcd8e23b4588d662d4052317e1e50bb895d09655309402e40b2b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4246df49af8ace6d743377eb609b238a

    SHA1

    0059534b4ce4959dd1688458ad256e94d8a624d4

    SHA256

    e9a0965124abbeefd7e8f1920d75e8888b6e7756fe3bf7b43df7a20f0db6b8c0

    SHA512

    bf855f94fc65553cf6730698a5189c768461442dba4088535029516c47a4e459acb41276cadce09717c45ac84598bbceff1da83e033aaae0c0acd4ed38ce5ba3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    760b90958023cbeb2c1ce264e6d932dd

    SHA1

    506c2c45fe8b543f6520ff0a3301ba4af0a63e47

    SHA256

    1e13a67d257ddc16fd7554a81c21b73d6797a8bfd14bfaedbe53f963da760fd4

    SHA512

    bd70c91baa43c5f5e98d757323d5b39ba316f6baf1199e9cefc86735c611f81246b6faf5f14e19ba007519760237225aa6448cd74ffa86106cf8478c4393e0d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b51806792f538640f40984ce403bb09b

    SHA1

    9e79860aefbb8cdb5948132804a0cac3ee68e8ba

    SHA256

    cc849fa8bd572702cd6e56a3e62621872da77c260621f154ec28be65dcb088a0

    SHA512

    20aa7bca4eaaeb8313eac79aaefd85432d8e8e485ea7b36c6a80b2f3106fd2ca5c41791c3b41ee8f36eb2d3235e343343f9afc65e7cd5f777731d2805c946bee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    820d51c74df5c4e759cfa05ce9f0a838

    SHA1

    4afd0bfe03d67e2a56dfc6a343be8a0b64fda761

    SHA256

    c024bcceff2e56fc9c85ab198c97950241668f931191e7f39395a789bf8ae101

    SHA512

    118433b818079d8ec4ed6b3a1e46884d66cb2f866406cfa7b6b3f5e528440ea575ad23e3e89eb69dddd78b2a28671ef7889bc3dd54fae0702422a7015de86be5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e8c8ab27b9277948e51e442ee810834b

    SHA1

    b396195ef9c2763e435ccf64c29779abc39f7a6b

    SHA256

    4a47f0dc8842098be90e5bb530ed252a06e8a99e16891f5c8fcee8842f79f801

    SHA512

    61de21b5dca3baaeb46ea5cb7a77c136e781525d5b5f47be0263af84849dfdb98fe5b58c9f7472f608582fd572d62a85bdff08d2cd81f4f62bb0d7e901204b21

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    50a6bb712f7ee462a14c629cce9a9d20

    SHA1

    347a723d618ae62779db0743891d6b7d8cbf8165

    SHA256

    13742630c894e5338c834a59af4de92d370e476a4de5045bc2b0c6c830d79a4d

    SHA512

    6913f7ee9dabd090a1e237f740eca367504ce4657fda0c100210b436ef31ddcdb7303d516194443afe9923d083545a0e4875eecd3211221c458b2eabdaefabfb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4a1ed79f1f9eabe7cc4ac1569cb64a01

    SHA1

    85d2939045cb35929f2957259fd41693507fbf57

    SHA256

    31e75b93fa216745d3d32fceceadfb834e7ff5eea773a9dd70027e2b6a1377f8

    SHA512

    0c1111a10fa4c115b47350507670ccefc25fe2449c3a20d7203ed61456ad98d438183e8386ef6900d2915c031f91b0c09d1cece48539342c511f7eef1db5de3c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1a1e50fe0841cede886ed064d057ea37

    SHA1

    fcf842602c4e826cfce4e1f047d5c3e8c9f766b8

    SHA256

    927efbb1e74c4e72168236e4896439b707a9441305f786688de14afdf2594d59

    SHA512

    fd64352da2cd4f318bd873e49d4e06c979ad2c82ae9ccb4e72851f2aa096d35e9795cb8449aad061e3ba1dbb924a301767e7399fef227e0b93db7bf658354438

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c2f7c7af6da1d637d4f8c221a0dfce81

    SHA1

    bfc95e5bed3bb10918cfbf816a07400d57b38a58

    SHA256

    a005acb927bf33ab877b019a8f6efd5c23eb5ecbc0c53ab6dbb57b6ae3e1972f

    SHA512

    4d622a3c467b5f7e6f8a84b4c2ea274319985ea31c2768e2f1d1b7319a1f734fa65f6ca45577928c6f8c6f1a649ea084f50ab700a1045d0f58ee4fc35edb4c5b

  • C:\Users\Admin\AppData\Local\Temp\Cab432B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar439B.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2672-5-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2672-0-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2856-3-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2856-7-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2856-8-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2856-9-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/2856-14-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2856-13-0x00000000004C0000-0x000000000050E000-memory.dmp

    Filesize

    312KB

  • memory/2856-12-0x00000000004C0000-0x000000000050E000-memory.dmp

    Filesize

    312KB