Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 14:27

General

  • Target

    bc1c564a4b546f05bae4505c5003f9ca_JaffaCakes118.exe

  • Size

    164KB

  • MD5

    bc1c564a4b546f05bae4505c5003f9ca

  • SHA1

    f4d18c5a377849e63049439ba2471afb84fd683b

  • SHA256

    3803cffaf10cf7a0f061a69bb2e63a1f4694bef2d4dc61160842ee440425e110

  • SHA512

    078de9ca2d093fe524eed86c81e3f510902040857bee88e09419d7e2222a6be15dd08cccd01b528a5ed28e24fb6159675a38c26567c00875191c9e9e21afe043

  • SSDEEP

    3072:PQ77Kmv/SRV65tMkCEzySef4yelkRgTmcYx/WFPBcEaxp4SjSiq:PQmL6g8zySefFCXtJ350q

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc1c564a4b546f05bae4505c5003f9ca_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bc1c564a4b546f05bae4505c5003f9ca_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\Users\Admin\AppData\Local\Temp\bc1c564a4b546f05bae4505c5003f9ca_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\bc1c564a4b546f05bae4505c5003f9ca_JaffaCakes118.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2184
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2780
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2788
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2788 CREDAT:275457 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:2744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b93d4643be112b4d5fe4386de5725447

    SHA1

    0e096ceedd1103ab53970e37bff0c9d326e189cc

    SHA256

    30411289593d509cfc33332bb31f8fcde8ff6543a12768ec5268a3665703601f

    SHA512

    ffd50eb0510ce6103ed56e7f0517a8d44ff5b07fdd5e3a8c3bca1d2b5e0bcf356ed25dfc9423cad02fba270389c024a2394e1887372d0bc9fa2e4ae90103a2da

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bd59d147f690bea9a7ca39feb4864d9d

    SHA1

    17c3ff29283003749ae2041ddc7af05ea305a2bb

    SHA256

    327e86f116cf29304da6c868052b9f53ccceaa8f7b7ca1fec5fba43ffdd9597e

    SHA512

    455d9b30cd404486650e8052cffbb3dfb11992d70578bde5fc921666d3c0e104b7de7c4c043dace9e99be38c0c75b616005b42f83d443e5f89bd705b8249eb27

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5d9167230b7d5052ab285eb6cfdc8f3f

    SHA1

    9a1b7ee585fa6df42f012d1f48574cbe0f64971e

    SHA256

    2a035a5f2743327614f04c8b7965e92875661decb8149834da680c614fb0e57e

    SHA512

    549d6fa1688c0ebebe92832e25a661479359138bdd6d86a76d32aae484d0fbcf6128c11863c45facc39cd5ea1ae217c1bf1acaf87268f4c0072596864c188b46

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    19f3c3055296d99a7d2714c9f1c031c4

    SHA1

    3dbb385248ec9aa1cfbb3bfeb2147885c67f338d

    SHA256

    21b1b21e31b7ecc5dd96ac543115a8ffb50481a66053ea43a68bc532982e0c0f

    SHA512

    daeed7484db8031f75baf904f56f75892c6e99b98248f004edb8e9ce6834dceecde7cf459a5757df8165be4e8b0c517aa74802bbb8ca65aedfa727497ba8a3be

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    19f90f49122458e62bcfcc231ed6142c

    SHA1

    6776134daaeaf6bf34ef6970a2bf0b6274308106

    SHA256

    0d96162111e011c16885c9242f27be54ee085f935980c5b5edc0e05060f2922f

    SHA512

    87685ebebdfdbae995023113f634043996f62fa0eef30f101893620d8ec589de3c46fc07a6267bc685720d745eb70e348e662f77f572a482c58e1d52f42a87f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    62ebeafa15134e7111b7c03ed7cc5d47

    SHA1

    6f728384db2f506b3d9eb5153e06cae941ff8535

    SHA256

    21629589d7a00fde299d6842c4005047f1be476c5fd84ad39fc2cc33774e1a56

    SHA512

    11767b87f449bdc5ab66e93067a3f7b90bbaaeedbb39c79de0b707735bc7f0e3b393d43dd6ae325d03f5116bff456733103ec1889cb7e5edf3cd29cc8b4a7d3b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d4fe15de324a2b6ae354b5a00abbe3ca

    SHA1

    d5c7097ba5ca7e446a8d62934cf0b2acb36e0721

    SHA256

    efdc214bed01b38cfed66887c52df7a5b23145bcdaf9bc3d85517c5f4be55184

    SHA512

    fce720793593c614b2730adb5b81dc28dc39bbfc5a028d20324a8d0c11ce4af51f03eeec8eb13ab9e314a3417f2d5d3723487bc49445c44e0689ee233f1da258

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9ca9506d02467910f1d1c20307815cbc

    SHA1

    99920b4ecc3da22e513cb14caa13f73c3db999d4

    SHA256

    32575e7839f03c5e8a599760b6598f1d5193354f899ef7fbdb4819c98255978e

    SHA512

    1d6c943601a538686971e6910856df00866a315afcbb53b6c1d50bcd05044e1bd03c4a76907bc7ba68b313764dbe5e55781cb0060034ab0ed0f08fe8bd824993

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    30c738932f05ee6c71eef8faf4fa05c5

    SHA1

    13d16dd0ac4f9dd501c12acae3affadd4b0479e5

    SHA256

    a6041fd73d511f4ad5f72386f4ec041a903da5ed6d02beaef7280b85f1f767af

    SHA512

    1c804217e51753d62fbdc9304d24bbe16e1c2d7736167f697fc50c91b03ce566a29ca098ac2d8c492039d5d3ed0c6d7e34ec82d27f4cbf439cc412f80c4a0586

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b463e5d62bf016291577ad1b169060a3

    SHA1

    8b0ac12d29f54d8ac4a109bdb782ddb9b9d919d0

    SHA256

    106477d7f460113d10bc354499ec026e6bd0a98fa2d594aba62aadddfe2ad783

    SHA512

    5e7bbc461f67b6660dc0ddbedb078b10584e99b7c92159d509e5ebfb0aaca5cb859e9ea3d4225ffd6f8d58f000927208ebf4e13f90827253252e5bd8e98289cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a6a0165c50a5b2b54b241e6edb5e2b70

    SHA1

    ec89fcd2da9dc753aee9a047978e1961d8ac34f5

    SHA256

    ef0e0957fad05a59498f6cc71089fbd64a742f8610a33b8a08cdf9b9b7d4ce85

    SHA512

    22bc0118d5438359f59ea416605d809d728d11e0bc06c5c2648bfa087a113607e8fbe33bf57729e78fc00c6b7d1022633f3851cf79b8ed1ec3303a7f8cf650c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    28478abaac7e15449b94640ddc42a9c3

    SHA1

    f2127aa524646ac3d93af5097be44d71d027e957

    SHA256

    0b719a402c03eb634a4e9823c1399d670faa6dade84b2e99c8c92ad74a662352

    SHA512

    e88855436e41c772e0d0fd90265b8e1a7c2c8a0942355d5aa7f39b48593fce95c894361b2968eb04428346bcb9242fddcbbe0e131d73156d083d7d9c987424b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bc125f2ea24639f89aa630bf957a752b

    SHA1

    140f5df67ea264c3b6302ffd35c7d63325740386

    SHA256

    46ff3ced52c47993e07728e0436190d63ceb7d3edb5e14c02183aac4a72fa80e

    SHA512

    704148cb31ee07fcee4c3c14f6907ec9f89f4cb4902b993da3fa3f27da21943cd5b7769e531579ed0899007039073fc2cda45c17797d41e4a8962c998eebfae2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a12f252a871c68d37fbb324bfe7e4506

    SHA1

    d31f7b2a0c1eb776e7ba99e8d4908b45d8354efc

    SHA256

    dba590834f1c7c3424d1464feeea94ac65196b8425cd9b44c6f6d6fe6d71d72f

    SHA512

    1d05305acc410593b42ca4a75630055cea9d1013ce5f782de73a288033b09e5209882e52fe017179a26964d12c0daa4f6719173c7ff524eb86b5c187b6d78ce7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8cce4786f284220005ea372e9ff53caa

    SHA1

    cb62f25664a381e0bd118bcd7547cac58d399179

    SHA256

    77b071344854791572197d4278e8a6b743f51f0d2c87c116e7db9dc9fff458b9

    SHA512

    ee42e7f07af7a2a25830e8bdf936f23bfd4a7ec06e9a88872d97cbe788f7c90f634cf142b6bebc831e5cf7e3b4ffe5c4150c99a39134eb32e5a126ac15d6ec0c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2de45142c49fc0736e34316383bf699c

    SHA1

    7af0e236542883ae28ba18a9a25fbcffddd4bd12

    SHA256

    b57968f552e88fafc1b1f8d8ad8ae558ffc0b40cd2e51a6f52ebaf7ffdc55c0c

    SHA512

    dedc9f1f7f036aacb9e2d49729aced1f5f8657498ef737a332ce99c12de8a88c9125ed3012494b555876f35c5c74d38d8e13f9eb46daecbdc5b2027134126d94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ce500848ff3220f6443062d03c764819

    SHA1

    6a78cb48c013b18d10173db1fe7df4486d98f86d

    SHA256

    293cba10ebf685def9b93f3e5868006b9998db3f942db5fb762699ee86404f42

    SHA512

    355b2a5419e5d25d0489b8bab1d6911f51a138a390c81d85400bb5370400892f1a011b5c654bcb6b4bf91d4fcabc0f78c49248807c3adf25f0934947385955cf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a5dbc02afe0e1abcf34adb5398e01c24

    SHA1

    112b380715caa978bbb4cb13896819bd2310b7f1

    SHA256

    75b1648fbfc5bc333b9fc41005db2753ab54d8afb2b9f16f458b73fde89f93ef

    SHA512

    b0fdc85a3837cc9f12fb7c41b1be2add718bfd496c54c564dacae0a8b5e77d161521a2aca27dc9fadbadc070a37baf196464bfeb2e2a3b6d89041ec9d4f90d23

  • C:\Users\Admin\AppData\Local\Temp\Cab5F62.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar60CC.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2184-13-0x00000000004C0000-0x000000000050F000-memory.dmp

    Filesize

    316KB

  • memory/2184-8-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/2184-7-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/2184-4-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/2184-9-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/2184-14-0x0000000000400000-0x000000000044F000-memory.dmp

    Filesize

    316KB

  • memory/2184-12-0x00000000004C0000-0x000000000050F000-memory.dmp

    Filesize

    316KB

  • memory/2200-0-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/2200-6-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/2200-3-0x0000000000260000-0x0000000000291000-memory.dmp

    Filesize

    196KB