Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 09:20

General

  • Target

    bb2806bc11080dd4e1e65e39f4ae9717_JaffaCakes118.exe

  • Size

    608KB

  • MD5

    bb2806bc11080dd4e1e65e39f4ae9717

  • SHA1

    890a48f63d44c8aa255576eec89da6e3f6f59530

  • SHA256

    7dc588c0b7026ae1c4b3e114635d3349a611c2dd44278715b7e00bd199c5266a

  • SHA512

    d813e344d871591279bc491f6c087946b3745da20e5f42cff7a2b8b9d4067629c5ac6161d198147791501702e0dba5f5a598957490aa05482ece7a2c5271cd42

  • SSDEEP

    6144:7Z+HUV3G1fapxcIRqdnpF5DXuIIV/XxWszThv84YLrcokP+mIOQBwsA7LpwT2LE:740k1Spbqlz56IIV/hdCc0mIO6tA7G1

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb2806bc11080dd4e1e65e39f4ae9717_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bb2806bc11080dd4e1e65e39f4ae9717_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1504
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.97tre.com/?fromuid=71399
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2368
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    452913372cdf8d98ecc5e490ff252bfc

    SHA1

    9745b04654c2f10cacf8d581899d62eeb6a19fcb

    SHA256

    b3f215cafe463d7c5cf55fa21a3469c82a0470f79bfe4f808c6d006128f8eb7e

    SHA512

    615ecb1078560745c9b96c385a98c66fd532a62a00cae7a0476d505a83d250dcb67dab58c169cbab63ba29ae0f15c009f2f7b08e8e75f19f14a183875e8199c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    10fa1f9bd3ae97749eaaff6c370ed823

    SHA1

    54862885808ccd7ed67cc78a7e28715ec703c836

    SHA256

    df98ceb9955be876d4aa1bb63ee5faef52cb0ab102f9275f525a41e49645858f

    SHA512

    90f92a4697a549f8bc9285fc3bf56191a6bb3ab25cce8db638565dd47285255b7f2ea1b2609ac7a87b4232e7140b21ab2a2a2b074bc7bbede1afc9feeebfe49b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fb13cad4d7f58612c101eef04a6dc4f3

    SHA1

    4865aeac2a03cbdaa006fe37606bbb9ee8549bd9

    SHA256

    c9a1f39a0f583a031e5a1687c76fdb9e596c6489d009fb144adbd1956a398375

    SHA512

    95d7ccd8b4691564d68a5516f39e2b933929857f969d893ef4f3b6a53901a7b4bf268da0611becc949d5968e804839acb89a8fc5005151388c6db77798b3214f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6a4a6d36aae0a30ba160c0a6c92be685

    SHA1

    0dff5b0511837272a02192aa2c0a472e58d100dc

    SHA256

    50e58eac7594bb6b371f9d1640c8c4ef7287efaa5d3dc8dc27fb5841e4a18eac

    SHA512

    b9da82737aa29cd34015ef77eae9eef39da17daa22b9ed825b8b5255fb39e6fc3e98e927f6435d01d01b9c0f3ee88375ec781523243efa88c4409ecbec79a083

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e7b03906cdcf55a67ffc836defe9d7df

    SHA1

    48c625d4e5ab5fb9fdd340f19f1a80103b98fce4

    SHA256

    75113ef0961efd6f6d478b6ad7b64d9879c0ddc048185d762413ab0eb4d6a522

    SHA512

    9bb33a27d1ef8850fd52fe00008c33854f36a840e051bf679bb0c4241fe5c129b3551a7f6c038324425b38e0c8af911d04bc79ee7541e06bf467a381ec6e6587

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dfa21b8b23deda812a39d6faee7cb9e5

    SHA1

    a51f4c426edfa00e6364addd1ab7dd0e8737cfc4

    SHA256

    f0e5f443ee36ed53b12ac0d28055cf15869e2e17a8448bf1c522eea8fece009b

    SHA512

    fd1fff6586eef5c2ac85c9f40a9497f2faf943581e8924af063bf8f0366963e9f524a4cdb25c2f08cae55b42032ea9ad0c7c031815be69f5e8467b9a575de77e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a5387d3b459bab6c66c6ad705ff23c2c

    SHA1

    998b7ae10a5a7cdb186a7cd015fb43e884fabe5b

    SHA256

    e1077d7e498d4a678976f1e5cd0a73e3c1c5507511544d6f7d251b704ac3a811

    SHA512

    101d3b1f8f849e1159cc0b5b55eb0581ac19862c6b7a974f70c0d50cf25f6bb069d7cb37ad05a739fe6bb75ab71231c4274943298e00d54857df9f24a550cee7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7ae8f22d2cc583dc7c9204b5a0f75daa

    SHA1

    97dd8aeed55d538a5e101c0a5b6dea5203b6c9ae

    SHA256

    430825d93117cccf49345d7ab3acede8907a850a3df04254a2cb220ab39af57e

    SHA512

    64749694f6c3a50c2692d08f54e6b20ad7f57238cf64116ef353e9fdf11f6cee1ad8928046924be16e4d352dd456779e359e1454f0221e134688f28df368be41

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    85741c924019211cec88407904313afb

    SHA1

    ff40fdfd2065ae206ebd1d44f85aaa572ed53c98

    SHA256

    012ebc5b2971491361b5415e95b22bc113a2c9c8409cebca675ad5ed54d8fdd3

    SHA512

    7bb281fe2a836feae674e993b72de4a8ead3e3476eab3d1d9f6776e3287c16f21e413daa40935373e50f02644ae35a46b5e4d33cf5836e96b2dc9b573e4c02fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0f4354e0453e7eb60d0997a37370856b

    SHA1

    3d3ee7718b9680a09ac52a562f76ea90eb04b94d

    SHA256

    4e5f307dc3fc07863b654630d1a5242c5cf7f2822f519dc371584b0e35be66fd

    SHA512

    b7eb18787f438de056847cf1333ded45dbfc7a3c41d12d4bc8aea1caf1d79a3410f60192f7dfcaba65932f7c0f372576251a8051eb3d173299aa698efb8a5a6e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e173b8329a62a55748d19701a8e5d1b4

    SHA1

    edd38d5957a32e2a868532ee369fca209953652c

    SHA256

    91f707402d1e9e9e63e1a6bd0b81837aaa0a1e29db5caa161db3dfe4d22ce978

    SHA512

    92ae1428aef4354a41cbd9c7c62f2218db0cc6d8c8eeecfe894a795c171ad27dcaca8f1e1d50d75d2c360ab158c49ef5edf5e9584005e91459eab49fc1d446a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6537a4431bd89396b24703a0ae6c5ef1

    SHA1

    7a04fd2aa1d01c6076d9e718995dbeb0948505fa

    SHA256

    08d55d402e58bea7d9cfb4f016e4af86e8dd82e152e8a0bf1ee4246b63f81252

    SHA512

    0211148ff18f472903cb9c339f56540f978609f75740be92f62f51672cef82e260c287d99338fc3a0576de11dfba5973449295bcbe04f213ae346d2fef5b28a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d6ca568aaf7b6dbbbb0224bb9d92d5cb

    SHA1

    31e25fe28eb0814444d4f3219990ea0a55f05704

    SHA256

    c0f81c10628874e0f0644a9bc7961cca73fe0d9227f3cfcf21b3581125ce3cfb

    SHA512

    6139d2582d42ee25a925cadfea00f75ef2949561e3f7131d63ba3d0e8f39183ce8ea8ac0b77a4eb73275d0743252eb0eabbec0139dbda28a69507c71e1fc6f44

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    89f4b35c2aeecfcff6c9bc74f5fb5082

    SHA1

    4c418ff1f831395235d7ad20b8af18176ce8bf45

    SHA256

    e7306a908e75ac1b951719064f22b8345efc15b4065d676cdcc3f6cba4a87c82

    SHA512

    9291d923d8d76bf8661d508a11a004d980f92b1400f42c7e5234c9b925f93e7decfcd1bf794789e22887812a06ea7b2511e9982320844000c5a52034ca706817

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e04ad97bf515711af3944fa6d3d6249c

    SHA1

    3057212b758c2071602fa525a8d482e1cf1c9c95

    SHA256

    020d226fe6b6f3e5b797fe3dc1a09b7907f05ed4ecafe86291410d55314477f6

    SHA512

    7751d46988885946a435fb7354eb86db60bad875f9863fe8ff60dd9d9884b9300fe8c7730d971be15f4ae190940c293ede27509c0dece810e780af561355099c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6e9998dea02204c801f04221d0210dad

    SHA1

    593a0e90468f67bb5db24ea3c6e0665465df6fa8

    SHA256

    7953b41d6727a3c2e181b2567499fa54c5220d8417c4b59fbf73f781d364e2b1

    SHA512

    d104082626fb8f6f07253abee3efa6a334c7bfff4be86babcb5771672179e93e79b4d085c95d636a7d1e54afea7a04af9818f02b7ab1b79ec75c0fd9263c9d84

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dd13f58276cbcd32fa9b586dccedb3bd

    SHA1

    e2661573d324e0ccc3fcfc301b2065c1d230bd69

    SHA256

    43fc5efab815a47925a7b8471782381a8cf9179d70e8eb1575a008610bd34150

    SHA512

    ebedd82b11fbd7cb8ee6e7b59fc973b3d65e67ee23b83b0dbe95055266f8ff069315d90fc8f99800fc3e5b9125dc856cd4fc15539740aa23ec0cc8a5755ede0a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0c2909954ae1cc55d11e231c6059cdad

    SHA1

    7e6ce51886180c94d253629d1c3f1aeba637c1cd

    SHA256

    269ccaa570eab1ed1863cdbe479e7f46c5c076eef543daaa9b33b284ffe58ca0

    SHA512

    9b58cc766418065bcdd38f2c0a2f4653e0b49fd86095b8429303a7921b75354bca90a905291ec4c2eef4edf4f25ed8196fde3d6fdbb4da6c51054ee27d8b123c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7b2416a4bb24bf015cb2f69bddbec272

    SHA1

    906874675b7b8a74d94105a307bad22a171b0ec5

    SHA256

    5df3936be604f243e92ac71ab207079549cd162e25066e6b23550c063003f759

    SHA512

    666198b37b456140c5d5794a6029939dc1d0c002f595fdf56d0087a00faba756d330df9325407a3850b3e7f1ee8fbca799f66ff3ea628b22481b5cb2e6f849d3

  • C:\Users\Admin\AppData\Local\Temp\Cab2F7B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar302C.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b