Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 00:21

General

  • Target

    d322a74157a4b84f2bc394dfcb04b1a0_JaffaCakes118.exe

  • Size

    191KB

  • MD5

    d322a74157a4b84f2bc394dfcb04b1a0

  • SHA1

    18056ed5c1edac950224705f31233bff0ab789b4

  • SHA256

    badc5badc9d857285245b35185ca19850e974c61fd72b5e9d4d1771645bcfcc2

  • SHA512

    15fba46dfb2716171f1674b6c0c978f28b88937739a55251f7c11ccf33f19654ad3f0284884715e4993e69ea41b5baa97694785e34fcf61d5960b211407cd2c8

  • SSDEEP

    3072:FdTejYQcRkBtZy/kqtcGxekIQ8bqJLSjDexH0THKLW15Y5dyO5SDLm9qJV8Vd1vs:PWfUkBPyrtBxgQTMK0TKpxS3H8j0bf

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d322a74157a4b84f2bc394dfcb04b1a0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d322a74157a4b84f2bc394dfcb04b1a0_JaffaCakes118.exe"
    1⤵
    • Checks whether UAC is enabled
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2176
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.regnow.com/softsell/visitor.cgi?affiliate=36566&action=site&vendor=9309&ref=http://www.sigma-team.net/AlienShooterDemo.exe
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2252
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2252 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3da5017afe858efb0356f01a32f79264

    SHA1

    5b4b3aca4dce9d8643f5afaccee60ea7fab257d5

    SHA256

    969c36dcda39152e48311d3da49cfd0b38c3ca0898a1c7ac90e50a48a7e3e2a1

    SHA512

    0da03ea957a295348fdd02dee2d7fb31b65f769ec0e8ecbf0da81554c20402ce3f296a574e840b2c403ecf9e0190b6a7c2bb6bedc7cfb2cfbf35babcec210387

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ae347982b7d7afea1579df23ac3f8115

    SHA1

    175cfa259ee5fccda257a1bdd4a0c2a6eb8f8a0a

    SHA256

    0bd845670c1846404cbf0a9d48e49ee5348f8507d12bbf7e348dd22fc8c6a569

    SHA512

    f57daa268122bbaa84aa2006b620eb32e1acab12150948a686b805e1c27d849344fb9a5c65d4483a6b9efa6034226d4a538b096ae2c970e6256c693290c2f86a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    00f54ce488de5554d31b7948f0ec8e79

    SHA1

    10d462d36324aa1e7d1cd2af5de6a5032b4df612

    SHA256

    b24e0b3df16ce38f13f6056a975c20d1cf2c94583e94d8bab321ffac7e8e670b

    SHA512

    bff0df1efce6000016eb13da2c6d89e4c7be4a9ac8c782fca009fe3b647a1736e023354f4352e5cda70a9a48a3e2894715a7318869b867bce055604320bd2903

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ae94bb0e0d5c9140ed0b346d390dd1ae

    SHA1

    60be5f5f149cb0cec9ee1ec5865f7d7601d6e04d

    SHA256

    c5b661cb4601eb4cd4b107529adfc66c78ad51056ddb63f12f075974e5cdcb3f

    SHA512

    11112ede7efb598141607dbe8d02fe2678005f2abc4196c836bc630ae3ed910dc537eecabb47d46b294347844f1751e0319c3c62e24306889f00dc3debcd24b9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    15e02bf0e827b020efc88dbb76944bdf

    SHA1

    c15184b023964e18d57b1aa4d538d530b0fe29b7

    SHA256

    038bb012dd249760bdea3ca6677a43f4cbad8fec8ba3cbef1c82e92d279300c2

    SHA512

    5463dff99f9fdded530fe782d0fddd445ad33c14ab5e7b1acfd27b5b33d4f387a3cee2015867f06681e557b0e16675834229c7ce31d62efe6be0d47702adaa90

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a2041a8f651a1df27ae754c46d829ed9

    SHA1

    3f5e36a5f1167e3a1f4cf48f9fb6eb49988fa41c

    SHA256

    85b2c2484373171eb59c695ea75f5b9694ecb36aa942b0e8dce84e5b14c31c2c

    SHA512

    d04762f1c032693125c739f27107d1362364d28697f48ded2ef8b020ee5270324a3dea2657cebd60590a55a85d3c5e537c285c2135e487a123c36400b6c7218b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d4d54352d1c1f9900dfb0c4719aced22

    SHA1

    41eb11a5e804e534c197e08ad4021ef82a31a997

    SHA256

    165398e65fa6acb27fdb4ce75b82acc7280f174250abb226247db629f36c0611

    SHA512

    2f05cb6ffdfe8d0b13f7853b385a477abf9a14954f3c2303942d556cd969f62a611e276b09d4c96dfc33f7e04b36d282bd3ecce703bf5a4e82de89dc1ef1446a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a324e3deff04bd32def88d47cff1e110

    SHA1

    4ff305ef4b580e63d754eaceb62ffdcdc34cd279

    SHA256

    a9ebc56f574f36bca51b9e6506febf70c2bb2d1c011c6daf736301079418e7ab

    SHA512

    ec3969ef1046e7675ef3baf28e5f1fdce7ddd3b3ccb3a3678b371abf04941ae99165afcfc66c23714e582329c2190b7407a6fef5d30076945d3faefb9c86a316

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4724bd9ce24e1fd955690465dcfa9637

    SHA1

    12a5575902bfbf517a66350b946acd27758a135b

    SHA256

    6ff3a1ac5c89b35eabd730ba7bc69e18f7af6300bf8c4463c598d52da7fb8f1e

    SHA512

    45d9043476c6c72f206461a687c7559979a75621942df0f815e25e3d385354d9e6ef59b9cab4b15558d9f74d343eab9b4d4fb37594c57c8522c5f47c33197d11

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    14aa725bc13c9035d23f4be6173b7ef9

    SHA1

    966551a74f3ae282ff1c89b9ada53bffbf6e3a2e

    SHA256

    71b7bc2d7e01541d64ac4f1630de0f90f15e61b7dca5c639b0efddd9ddb603b2

    SHA512

    4f6e9d5e32164df03cc04aba395907353fa1bc22e0c767c5a34d5f05e80c775e093d0cc445ad23a496666e18e1094b19c5646e882a67902c553d4f6523107109

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fe38e1439f5aef78cff09e6031ccd8fc

    SHA1

    7c8a837e3080c580868c4988de30a67ea799a23b

    SHA256

    ab9a9d00b6c429d32999537033c8e818cd9e6440fbd3875e9532bf8597a4afc5

    SHA512

    231e3d25c252e73dcd48bde4fb8f47f728b2b6c552a0dfa342b2e031c64bc6086fe80fd2c184130f09d62ff6b0ae49e0d95ccf24a808b3dfbe757b1e30d7a308

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c4dd7627821d1c8930a4d8fa490cb549

    SHA1

    641db8774fac5fc928b1f8dee25c615abfe52f90

    SHA256

    697f1cada4705880a88e799e2668a65bbfdf469b5f6c97dea245e8d718d3854b

    SHA512

    e231ab7cf3785a412ded1c92a62160c457b425a46972a2e3b0897dbf3fb746045b861ec2573c26b288dedc4f7f674c649fab05fa46e56e4dd4a02b1f1552ed49

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d032b9c4063c2ae3fa2fa208c8197d2f

    SHA1

    37db7ab6990fa0c8e02204011a2a8899412a7e28

    SHA256

    d8dc5810a593a444754666fe063abc13fcac9a000200a17312f4af588b2d6e86

    SHA512

    491521e4c06c7c74fc1809c1a44457b5fac98b94079a9c40a7210baa02fa0e788c4547c34931ff7329023c424f26607ea96f766ec8649976e56b5c603ad36c37

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    af3f3db0b4239e2bab54a5b92d5a8b91

    SHA1

    d0e92d00a90736da7ed2aec616af4a020fd034e5

    SHA256

    d22f62dd1bb5953c5d005d9d24b40bc2d7c853f76531dc63c95995af24155527

    SHA512

    e29571990f313c0df4fab192063b7a799a4ce90f6dbd1e97fa017fe586c157ef519c2c43d033fc6b6b1852351823ed12770453d925b338457a943730cd9b5b26

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8b0e55b4e481690e441487ca0c757cdd

    SHA1

    179c80c08bd191cc336c2e7a02344c40a7b17549

    SHA256

    96c7288aaf827c645ad4c6f8a8cb678ddd29a21d841904e10b1369cedc05140a

    SHA512

    8ed73028fb7488fec49d59894b627fdb02da82613bfc59a8a81f959ebaa1a6106655eac8a01006a004a52384c35a2bf277c2ed93ebea6c2312662c17b2740254

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    005fc28761c5931aaf26b97e933caf4c

    SHA1

    3fe70b0fa3cd2a1978688d9f0fdc99e293989160

    SHA256

    2b51e0f51c8c543f2756b82420e0f37ee42a6eb401be6b7bf4d09d04594d7fb0

    SHA512

    5a77694374df10395f234d3dde792f2bd753df4738f62471521f2779fe59f63482e3df84a0e9e1be9815c72c1223543b658d97087fe403677ae03c695f148053

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    666ba609e7155dd60f4bec0213b7b7fc

    SHA1

    4210119a342ac750492e9794bc0ccf4218e0d5a0

    SHA256

    a8cd10b8daad83b17a25536bc98905520db2aa33511730a6e5c5f79d8f4a066d

    SHA512

    e74a087b80c7f0e4b38315abb6d2e6fd2f794bb3408d1e9a4ee718744c21c79da2e70465a52dee751c597a11ddb4a4ac0b15d5eb683be9f3180173f4e7f85392

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b7b0b06ac767d5c6ed36d274daa2b913

    SHA1

    38766d9ba1aa510698fbd0582b3f2548ce54ee37

    SHA256

    e5407a37d03d95b8d08641361c5a04168d4d41965c4316b0612a9c7e8c987c8f

    SHA512

    5d1977d7201f090b886c415658df1b492d4ce99e093a0032a7816dfcbdcadeaa6d912ea7e668ca870bf4f42df8efa7f0b22a646b012a09dafd9f685becd1397a

  • C:\Users\Admin\AppData\Local\Temp\CabFD16.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\FG.url

    Filesize

    192B

    MD5

    0fcf82b5a915470e8a79d3516f582a36

    SHA1

    75f81b41607905b231521243129aff3554a58db0

    SHA256

    076264d4f165cef82f0cb07f6795f1d5ffa74741a943fca42cdeac65823bcae4

    SHA512

    adf69ec56756fe672677b039cb44bb13fc3adfac569f5ea4eda4e7b35de5ebe0229c5825ca8337aa2c623a773bdf775ddd3689e9fae03a7af1f694576d954293

  • C:\Users\Admin\AppData\Local\Temp\TarFDF4.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2176-452-0x0000000000400000-0x000000000056B000-memory.dmp

    Filesize

    1.4MB

  • memory/2176-21-0x0000000000400000-0x000000000056B000-memory.dmp

    Filesize

    1.4MB

  • memory/2176-0-0x0000000000400000-0x000000000056B000-memory.dmp

    Filesize

    1.4MB