Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    139s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09/09/2024, 04:36

General

  • Target

    d5a9230196e60a083d108eecc67227e7_JaffaCakes118.exe

  • Size

    576KB

  • MD5

    d5a9230196e60a083d108eecc67227e7

  • SHA1

    5dc89e6a0b3aeb72191d66e83b80d6980a8ce9a8

  • SHA256

    68515491d2afecff653a625b7fc1c0a5fa08e7a4219c5b2c7bf1e33ad9040691

  • SHA512

    b5958b7ec6fc7c4e718b396d290d9865a22fc3914be333d37821070e3b411d65a65a72071369a786444162660720a567bd2607ba3d86e10674a39216aacd4227

  • SSDEEP

    6144:Z0bY3ZCQbCTUbVEv/RCs6GKz6ZRjQxf6kjeSo8z5v8bnoex+2LQKHK:D36So4mx+2L

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5a9230196e60a083d108eecc67227e7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d5a9230196e60a083d108eecc67227e7_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.youtube.com/watch?v=ZvizXaqutWM
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2412
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2412 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    115eb1189e2e57e7db19a830285c6efa

    SHA1

    a1ba5f4095acf1992d3c187e730f3236d019d914

    SHA256

    4daf051f17d456c327e0df8093d37cff753def87daab3eff9259e132a497ba20

    SHA512

    dd9bc12b84914c1b81088b598bd284228eb4347380c70132f6883907eae4055d3963d2065b5f26dd3710f32bddeb375e6a29bd03d6b4eb3619e857100be737fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fd5933ee463395e7e9eacdb8924fd75e

    SHA1

    7696420440911cc0e14ec2b843d0adcdac537118

    SHA256

    877da2efa637e8bd4ad878aec0dc0136fba8f6ef1d5c8a54520353449deea372

    SHA512

    d434cc6693c197759c194789a7720e29154adf9caf755ddf6d8ce56fdafd889a3a40fb1a423f05cfdc68f6f164ce690351f20197cbee7c97f467c66fa3d2707c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    04ed345cdd8edef20ee3fab408b2bf07

    SHA1

    173dae3607b1106f300824b8b4145d3f6e8c3fba

    SHA256

    27fddbfb7b7ca628773e6a4c8c360faa00274483b6cf517dcd713c007e9598d3

    SHA512

    9c901bf0ff74ae81c0dba04e10542411ee53bbcdff96f4ef882bec89bc0df0dde2529fd38dfcbd86b80bb55bb759a48c5a537e2ed791431bcb73f98ec90f21d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e8dab7ea1153187be1cf5176219b9146

    SHA1

    a8035a98950cae49e01df90df586aca9a9c535e1

    SHA256

    41c19a1cd0e41f38642ffe00aa5fd2aa7ced9c049c5577f84d26d21c293621fe

    SHA512

    9f8577c5ee21b4000324bed5c2351fe453f09bfa7f36ff50af95b788ef701c9d5a96644aed42bf166f4ac9252025f4b1341099441855787f78d280049dade701

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2aedf91c7559bd72e9a0865099fd99e8

    SHA1

    8401a33a3382cdeaf35530abb6c17078087060c4

    SHA256

    26c79b73cba9db0f00674eb1dd85c38133a07e76b0ce1b6aa083dbff34893758

    SHA512

    20b289e3519fe362c409900551edf9daa2dfb4b6be806d162e0cba2229bcbf4fa6d55bd7649123a9c463d233f1c319c111bf9658beaa2cf7fcdefdde5927c8fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5efe383f23bed4f935dddf22c10c0590

    SHA1

    f2697624f2b2423058e23c943fb2eb54195696b7

    SHA256

    43000aabd60c0da3d6767f0cc680bb4766734421f4cbed8af651305e52d48124

    SHA512

    969078717bb6288ffaa259a9aa72073d6c5aa8db491c4b51ae2df49b381859312600eb96af079c81e04c2663b0b51092c130adf1bed5953058317ffdf9951957

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c4fb4064397df16dc5f958b520bbe859

    SHA1

    9f3360a00827f48c9d8ece257693763f7322774f

    SHA256

    c2ec349aa8a60dc66604639e54f91c153545ca1bbb227b8fa5569dbdd13208d9

    SHA512

    bdff5be5b41442a02267721f3cbbf770ffdcf69f3c5376f2168e4cf6b20f5d983f32bafac29616ede5f4c948e9cfcac6f2cd6d9d49025f21b3cf7701b4486c31

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e0d98757864f510523111eb13fe78cfe

    SHA1

    570b50db84e8aa2a92f1821c79435b00270b238e

    SHA256

    f9e7c13388a38dabdd50dedf032ad5f1c5c481115cb8501f8c7099fc665634b4

    SHA512

    4b2e3ee42f17b0615612dde6f340c8a5b28fa976b973bc4d16ac2eb54172887324431c022be98cfa1d265c6c094efd7fa0986a8b8b0558ba36ffc4c6603ab85c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    083ade145607915f7fccb42d01173a0d

    SHA1

    20fb664a161b92dd240f744e3b6accbfab2ca8fe

    SHA256

    f8f68ba45ba51bb9ec2b7bad6ca4bc98f93791ab0d040b80ae3bb496c3a791de

    SHA512

    88c33ba52f3357230fee7ef8459e0125eba0500dec7d4ce23c35584d6f5a02a8f4438364d8a2acd8e655e764672ce855b1ba7d6f6fd44528d39117e487c4e612

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    df6800cd8785874e38a5fec2cd08999e

    SHA1

    383d58711caf03619e59fc3a41c6a1d8ce1eb88c

    SHA256

    275a8b8aaaf65b62c387a419bb8cd328c0893176c07d25755fee018975f4b162

    SHA512

    6d2003d18dc9b49c29d9015930502e1ec3d56341465c762e01637ab3ffb76d701aa5c4b4d1555b3e4375ac040a3ea3ba34ea167433f4ba459027794aa4eb1c38

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a78e0682c782c74b2df07cdf38c1e7c7

    SHA1

    e0720f97db99ed3f5a07fd324c09f1e69be98fce

    SHA256

    ee107adde003ff9901038d4f00eb62513841a203e1294ce923f03d71fed4208d

    SHA512

    8a61b5dfb5798207d193dcdf797b732daf32dceb41522af89b12877bb89e1d6e643e424f16e6e397ff81c0dc252a91f92c1f1b3ad535ef31e868298028435470

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    401da6774e71eb15fd2d1865808d8983

    SHA1

    97b1df6d50bfe52c646935748f9f36a54be6421e

    SHA256

    444c252a7e53c285a753ed318e0efa928f2021e3fd3560b0fe63d1dea79c4450

    SHA512

    8357c7b3234b03fd473b41cb743a79eb037c2375e579483f6e3283f06a4df0ac696a30f5a4cc971ae80e0d5c65dce1df9d9b99416dbfd6745da39458a73f8811

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    590a4a1cfaf17e62af1186ef5032034e

    SHA1

    7c66f4518f26f9ec339ec23297e026e0881b739f

    SHA256

    f081dbbb1562c19ddcabfe73d38ed590b9357ef1b3a840ed1ba7853f31ef0c4d

    SHA512

    7edb74416ba8c59fe78ffff3943c698e1cf020d8c374e142f772550b61a5a9af452c048657b87bc6b19f4e29262e8c52781ce998590a72fec318db3739dc14fa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c7a781de13243ab67fd74985e2a0ea10

    SHA1

    648e2790bbdfa8fda0ea325ef5613fd1e439d63f

    SHA256

    a628ec13b209a22b00dbc174046dd370870a8b483a414d3773367e0a5b4d5115

    SHA512

    ac1efcc540c32081dd9470da33a4a7aea9c696bd94eae62d3bcdfa0679bdf9f399cb751d1365c6639b70fb882f08aca701442ca6b8e8ee6c8f5356f9b72149de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    482cfd7682b04547696fe1c6a9f3b60b

    SHA1

    4fbd1b9416a1d7effeda66b5e62e74081b8a2576

    SHA256

    6342f194e465b4e7e1a6bf0ddb9a641f7e04a0832ecd8ac0e0d77fb9e7870ac1

    SHA512

    317536841fb7eb00187ba4faed293a9142b015bbe115677acf44465b814a9596ae50aad38cab7573af253d1141b0e90be20618613ad28d1fc5ff1950b7c06777

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    576ffa11d2a4d1a27deed24cef04e425

    SHA1

    da2a73aec99f313119268d7242f647a262b4e121

    SHA256

    bd1036b8616cc1e0eb4a5318cb94f77577d8081a0976c7a5566f46bc0c6059f3

    SHA512

    eaabbabc8419a4573ae0aab114a18fff6077ced411371b1f09b20fe0e893daa0a297cb427b0dbaaa728ee0bab35fd68f4365cb66790db2f005eb21244258dafa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ce9439fab2f836a24b1294a34034213e

    SHA1

    b87d630db901e2e6effb6e506128a39dc5fb432d

    SHA256

    b110488c7279954705a7ed5fe8b116b625d51726c602ef6bde77f30f3cb2d8b7

    SHA512

    5becc809b1c4fcba217917cf3178464225e5e7a0a3810e860c9ee8692fd00b2105bb1e62e2c56c704fbde7523cf01a8551844cf26b0ee197c092bb111d651375

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2b0a82a078c045df261c0e30780ac24c

    SHA1

    9f5baf907c8545716df97abc4877c3069ce00fc0

    SHA256

    91aeed27fb68933e11d2dc33c7cb316ec6b6669305c86996c7990b57c33b5323

    SHA512

    80fb65e9ea8030035ec182585a5341c4d9521e3880c779582bfd6327ee7985cd02be84e0a25e0a33e65e60cf0bd4c89d361d0cd820708233f5efd3d9c94fe9d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    478c5df38f6f58918e4f626cd7f6e22a

    SHA1

    e4cb40d95053e6e4329e61dbdcf5f84d3f42ee1c

    SHA256

    3f7a9baa501ccb502094f64c86d47e6280b73f5374f1598d64b91f3307c9a1e2

    SHA512

    e2be0554bd720062f3c666d653ab17a283a1fe262b2063951a6f0963a06433056cb3ecc82bc60bc7b0bceb3e70ebf6d33d1391857856a1a5b774412a5514b9dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f04bb957e39ad1e793f815114c5067d3

    SHA1

    87e89170e12d665e43c91d80dd0f6bf694b23e7c

    SHA256

    f07e7e2a71d308a05eb743bfdfc3c438eb243002c5d2ea0c7bfa62f4b11430c7

    SHA512

    216ff687fc2f50419b9d5167c5b1b4ec4f8bcdd2822f5c51fec8483d600107f611e8470ec83415f4886bfe03c9a4afe98b8f6932dab15b790cf1c144a4b94928

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    d06e679d1a64b97823655dc53d2db6c8

    SHA1

    3b3226ab9175db1895bd4213c813bce2094c5d71

    SHA256

    68c36bba8dbc01756bb95f812bb8f02f051dfa16ae41c0cd083aecaa24b213d5

    SHA512

    f05a5e22717621d9798559b6a2ed222822eb80608581967d722918c7a913293cae22f3273afc30edb501d0063b94d3797bb7b8f1c8d331d629ab3bb99133a4eb

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\0qn8gcy\imagestore.dat

    Filesize

    1KB

    MD5

    1835492db6330694d29162800bf0cb4a

    SHA1

    a3e9b999cc257fe990bc871f933e04ff7ff02f6d

    SHA256

    56a33ed2f1370226815732c8584426b92016b60bf0b233da043b418b74ccd09d

    SHA512

    54095a102b623b085567d93ec384ab26ba835b76e50f9b841d5094caf077df556246eb931ae312039c8d7907b255e16eaa6fc42e57d23016bd996013da7b66e8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UQFHO95Z\favicon[1].ico

    Filesize

    1KB

    MD5

    f2a495d85735b9a0ac65deb19c129985

    SHA1

    f2e22853e5da3e1017d5e1e319eeefe4f622e8c8

    SHA256

    8bb1d0fa43a17436d59dd546f6f74c76dc44735def7522c22d8031166db8911d

    SHA512

    6ca6a89de3fa98ca1efcf0b19b8a80420e023f38ed00f4496dc0f821cea23d24fb0992cee58c6d089f093fdefca42b60bb3a0a0b16c97b9862d75b269ae8463b

  • C:\Users\Admin\AppData\Local\Temp\CabC13E.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarC141.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/3016-3-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/3016-0-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB