Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/09/2024, 07:45

General

  • Target

    e2020e241cbb3a02d40b297905a54062_JaffaCakes118.exe

  • Size

    528KB

  • MD5

    e2020e241cbb3a02d40b297905a54062

  • SHA1

    617ad78197778cb0263c12e358cbf3ae1e370c32

  • SHA256

    e023338a637465a046556a6f67700007e67e78431ed87349952b6d1cfa94a839

  • SHA512

    7f0f1bb53b372ce37d5623e24ffe4dfbe8d6b1883d06be09521f6c5d1a9d0530b081c012ce39b41cda23414d6457fe1e129282b9adacf9c645fea900d406d838

  • SSDEEP

    12288:SP6ys+NgzZhkDjh9rmxf5QlZI+5mmBbylA/cmFhyyly1:GBNUfk7kfDU7byW/cmVl

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e2020e241cbb3a02d40b297905a54062_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e2020e241cbb3a02d40b297905a54062_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1508
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://6l.cn/s/tj.html
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2108
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2108 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    481720a7b9fdd46cddefe05996c5b04c

    SHA1

    2ac18484f15a771a23e3f2a8cac6c2b426a9064a

    SHA256

    46b4cf1ad25dd2be05de88c3c48bd95bc21a40be4d50bd65a22ae2c38f534d86

    SHA512

    9f2ee9e1eda759e0c514345078e21f9977bae0e026712c13dfd3eca029abdff5e09a0dbf3c599c2837ed1f5f3d0e63a476cdf956fd9e8421212436c2cc17b559

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3db54934b7f86ef0da066844817d9b30

    SHA1

    545443b6ebfaed5b5d9f828364607cbab11eac4f

    SHA256

    a724d82ab20b1f022d21d668996a0e965f2cf31b4083f801150d00a3a9f70b42

    SHA512

    6e8ab7581e188d73f5495ed02b98d4a4905d3cc46272816b7ab68072683eeaf759fd2fd06e1ceaa0e9a0b6c1829d0586a7ef016496eabc4c73ae1e4d2e9e73f0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fd96cb2d0fdea8086c1e7bf4a56c56ce

    SHA1

    e553bac1057805763f492402beb160d2d04075fe

    SHA256

    76e1899cffbb52334ce8052f1d391db93afc9f9849d9401e31c03450e4480a2c

    SHA512

    d84af16d4cf19e9ceb7f509b816bb6378c7569cc54928af9e60185ab3ead8ade76b354001af41083e33e13a4e5fc7bc98f59e9957413b30722ad650207ef9aa8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    30e35ec1874a777a2feadb556d0df835

    SHA1

    b6be97cf11c1da75044d52e853798fc5ddff45cf

    SHA256

    2a18b621538de27244b440e812b983cfa5b2259d2f1674888a4a0d36123dc2bc

    SHA512

    ae2763cf741a39bba7759c8d018da2e4d148a2fd4bedf3057929d36bd15b58d6e3e742c8422d9047b9f2776368e71f96ad4c44a78d71b06dc10f9f4492b6124d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ea044d675c8951f346321cce20614759

    SHA1

    4d8319b55b6e518da2ee79e9887ac8ba27d70667

    SHA256

    fdd72e746297611bda31b36be88f75c9561cba970f53063d072062458a773460

    SHA512

    635e95eabaf1047f502a0dc00cb2dcb19833957e50d81498cea8ae288a370d55da0a808be0ec3631869a8fb3385bf18e9a1000b2b75f672c1c1e4e8d14efc466

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b2931ff37bfdc73da18736c86e0cfe2b

    SHA1

    7f4ee4114b97b5d3211b7afe70759935a224cd88

    SHA256

    d8c390afc99ad2b13d85fb7be8be0f87922a6c947695fcaed2b9fe81496bde7a

    SHA512

    648ebff327351b6c9a210d490ea53a5a150023d9178c5912017b42e2f77d1ab3de2a1a8770b167062a391a3d1a74a7137b3270a3392f15d0405a7e2faa1c651d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a2ec2af9c4f7309ae07938a53e65520d

    SHA1

    2723146262a97dc1d38d18abb48c9cfaa69f9dd3

    SHA256

    54fb1459b83747807fc66f520f5d8d48f7f106cf367609d7c920fa30824822d7

    SHA512

    4bd78d395d65b15eef03a3307cc8a42b802083e2915ee320e5b4b6dedf5403cd7a26c9a5e801ed8605471dbbcd5bfbc4ee1c8d675979f21329e53357e34878e7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0114e9c35a832ea53056950f8450ca06

    SHA1

    3f17376d06e879a55ad69f25f5e12515b8b9d719

    SHA256

    8dbd81bb7b38bf438817c9be26014eedfc2bc372d9bd9b0873c1ad4aa98986c5

    SHA512

    0174f6457cb7caff913ff58fbe4bcb14c8264c1153229514461cfa11632e73c4018fb9bc6a2113ada83c21e600678747f9f8863a6fb58d166546b6c80b071206

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7c9ee7e1e8a644686c6d1057e7af9ad2

    SHA1

    c6a74fbf4118b406c30a470c9d20ce8b3d1bfa39

    SHA256

    b2d656a04e0c76ea5d61980392573a66ec15df727458ea0e1f2814cf2cae795a

    SHA512

    29bf564a9e25f1971ed332e3b5043caa8aa9c6c3786f2c5636b9f8f7d94235c4cd10cc495bb83c315d4e1ed96374536b009f4a672ce522d7e98be8e5fcac83ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    16061d2d92b5277f7752e290a8289b4b

    SHA1

    04d28658f983f58c42795333356cfa6a060b6609

    SHA256

    9d9e88ec6940bc6484f376ca91314bb41764b701dc85a44b76a3945c4ef3b772

    SHA512

    2cd5be71f861f70731fe36240934633335bdbad4f71075d276316518453a43fea993fb516b0f3354d4a61aa769f6642a6789baab0bbf9ef9420bd38a245c7848

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7b101d2eec32f8f5e66081e2e6b13728

    SHA1

    acf96c1d4300c532d3f55ac79e831432fc84a450

    SHA256

    b9caf98f6101031dc8610b75a8127bcda782a2aae6bf75744092906c23a688e4

    SHA512

    2bd398d3607e65d383cf138f1c943fb44e52b8802a0f903ef8ffb5497c31a42c6ba542a7b15358089e890828e40b733677ed6932811159864234ce8610682c09

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6bce64e1a68163359260a58f3c6c6faa

    SHA1

    dcd4c7885da4dad3f2c55b093cd4a6fb4ac21774

    SHA256

    c6944981ee764741c1944ab7b2e1e70f4d0da6e88c29fa765a4a40ac7b17e829

    SHA512

    54b7bc717a9f686970af9cc7834e3e0d87bfd338bc2930208b83206f9ae773126a70349c0b982ee5b908802a84e94cd9adc9175e11255326314c7adc03e31163

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a080a7e8cf5f9bd6f42ed1f9d452e6ad

    SHA1

    d96f9ff8e3ac66182d386b57ee4254b8bcd11127

    SHA256

    2c271ce36b7fb75226591f59b7fdf6097228c782fb15aa56a93c4294cdfc069b

    SHA512

    2a9fcfed9f7dd19a8a4987bac37f20282de69553807a67faacd97a435b62db52987e3e3337dbd633b725cb14255eb04d5d34ff0b3fe418b44e8175bbd987bb55

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    be8b5152b02171d84d8e734bb7890721

    SHA1

    fb62cff08e0ae874c9d65615d19c11e004a8de32

    SHA256

    da1f5e299b0d4953e10443ce40653f34c247844acb2e14ebf0dd879293adabf8

    SHA512

    8a998fece28e6b15eefa4553a8c111fd783761ea8a294a0f65179b45e17d5b6ca89d1d3d003217fab15e931cd86bb8f1a33a65543cfac53c40a5086da9933503

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5ba940a106261ddcaa6b64627e68e476

    SHA1

    1ac909c2a206220af5dcd15e1e137ef08e4ef717

    SHA256

    1cd39dd082f95ea79ffa793b87ab5cab823b2606be0cf252e5f07782c796a8b4

    SHA512

    378e196d04a9bf5ef76cf06278da50cc8477bd931f43137711cf19b1dfc97c2f789482197fb067f5288acbfe351af96353118b060b1fba9be6eb7622b44b0cd9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    90bbcb14e9ef6884c1bce8d9fb47e19e

    SHA1

    ea4e7962bddbe97f14bf06bf9351e9cf6a6a4da6

    SHA256

    3508a89e08f7bb710e28c059a55fe37dd313484f094512a50fe7c3835b5369f1

    SHA512

    f0bfcc5a64ddd173596cf8caf54389040f4a89fb0bacfadf3354164163d053cb9d839127158fcad13ef8c66668255304ca07c75089c3b3484781cc9cc4d9eabc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d7969f84846e75b90246b857e81775ad

    SHA1

    5152912e32d61dc307c114eb378a85c5849257ef

    SHA256

    e227102cf479c87608ac747b5920b004b55ce2579c70bfb2a06c8d8aa3587959

    SHA512

    773db0f7736bbad0b6c2d803e1e40f56d55fe0af09086afd52146fe7c5e2bf0cc741187cdbbb1c47c36f1a68c8975e5bee8a8249c38ea589569eb75e3e7723a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    78565bb385b09d8d624963e2bfb2aca1

    SHA1

    fd5715f8613e5fe6d057d1d4c727348e1120b55d

    SHA256

    2acdfbc2d0a57b8df04f5cdd60a9952700050253c40260b394233a966a53da3a

    SHA512

    fb80489866c51019cc24d970ad52ea25af96e6b2f6441508cf672ce52840c7d8e3a53230a3891f18293ed60c757312125b55da9a5a01696a1a35fec67d4bb086

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b95196b21e39e43a7c70bf1acef94023

    SHA1

    c8610cc71308ca0e99219995676fade8daca9144

    SHA256

    debc680215ef2343028f172588616ef1d82c575fb8da58edb5a9cdc22dd326cd

    SHA512

    15ad07e381763e2c4e7cf0ccf1dbe5aaa3bed6cdb529c0d661d6e9f5379cfd6d7443dc647c81dd4f14393a9e9e7b2eed23bc8c4df295579ad5b4153da21309e6

  • C:\Users\Admin\AppData\Local\Temp\Cab1133.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar11A3.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1508-7-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB

  • memory/1508-0-0x0000000000400000-0x0000000000484000-memory.dmp

    Filesize

    528KB