Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 05:53

General

  • Target

    eab4cb97f2c813b16803ee9713d51c76_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    eab4cb97f2c813b16803ee9713d51c76

  • SHA1

    102717aecf985006a2411522bf113f11c71ff336

  • SHA256

    74d6cbcadd56c8e3baf4f422d70a1cf2cb19a7aa397af4c5fcc43198fcdcf765

  • SHA512

    c9c69d347480500af39a6f85a78502f24f7a2ad27d64615b0b643488ba650710a33ba2122f9f55db09fa9e4a10335920ee27e3d6586968bb4aad86896d588ff6

  • SSDEEP

    24576:XPwFRM75Z14EQ+u7dmmfkk1xAMismFfvjq+AMzg6Ug+:m4r14EQ+uZ7tYMiskjq+AME6H

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eab4cb97f2c813b16803ee9713d51c76_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eab4cb97f2c813b16803ee9713d51c76_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.ahqbt.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2120
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    696a9862b6a57904771f52843a6092f3

    SHA1

    eab6ab343d5279598cd92cf6df11fda5244d9b7b

    SHA256

    07a6768c737fb828a7cf6c676100c82c1d02de3352732d758da04aec77e7d4f6

    SHA512

    3b81c72a8a9bb12839dd0c8807d6511a9d924c2610cdae17620280875167564e6fdad604a1d6990a24dced89b04964b23d354c33d063743228814020edd24c36

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    438d92754b5883bc79dc9f2648e05ccb

    SHA1

    c06ec47e419c3fa2f57d5c7c0853f52d3003f337

    SHA256

    e6ccb617d9f454b63033cf67cd191665a3b097fd45cfad9478321e7b41228ac0

    SHA512

    8c3fab76e31cfe811d56c5c3c0c6377ca31ff62b1336dc13417f62a8bb1e75537dc85871f5a292d30be82a13ca92a4b1ea8437bcb72b83906028318a7f271802

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6e2ee13ae12c3892ec85ae8919364f6c

    SHA1

    2557bb1e4bcb6cadce58f4779a6e1d407159818f

    SHA256

    055a5baf307eefd7fd92ab40ddd87674b231d8bb0dae01e1bc7d3e7413f4d6c6

    SHA512

    85e5bf7ebd3d1bdda008131ce64268950121baa47ef80d7fd7d17596c3f3df4b8c6fddb6b7c64ea2d1e2fd3d88f4e3526b5ef2a75d406b75fc41b71c42f6c390

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ec1e9b49923efa50b09906f3f3c1cc3d

    SHA1

    b76ced3b88a1b815db1a3437004c512a91dd2adc

    SHA256

    47445b1e8d5f2498128722a78ba9e1c3177723f7313d9be8539374f7a2cd4239

    SHA512

    58e2abdfdc22bede57018cbba4cc2160a8ebea5f765d32af92b3638a7423995f3ed1f31ba0aebca1f69d144c17606c97e4ed2de4b34ed615ff37bc49da0d9274

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    455278ab19a46a192bdb473a6fe27bbd

    SHA1

    1adfe6c1946dfb230c080ca7238e0b687ed72c98

    SHA256

    3213bf32d62fc5c97920203fef9fd9270bb482653b2ba1e57c3430d62cd84648

    SHA512

    58028af7b8a13d88a5253fe2d1d151c6a4a43f820f3bb9fe4b7b0b18530c74d5f3adaa248e8e72d4994dd9e8d169d43be360ecee859776db2673e3f1221bbe23

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fac656ae387519e622006e3257d15657

    SHA1

    c07f7bbb4ba23de06b5202ea4b26074eb580233c

    SHA256

    9a9a5bb9495d7cf9fa36cfa974bc93ef0e0cd34765e5e8b58f54d40a7179b460

    SHA512

    7a131001cdac44f0fbe7baae62dc0c2c90fbb1aaadc7d7a3364bb1f9c8b8cfb0f264eedb3c06844cd9b3e7d684d455b0b4ab1893a06a396e23843b513f7d9c30

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    750cab96fa7d208dd29a41a68ce67b58

    SHA1

    56c9e98b36b59bfdb4842cce454296c0e9a1785c

    SHA256

    0290df18ac3b11a14dedb324c0c8d2335c4435af39b9262d13e3f426440b74ed

    SHA512

    8ce8e56d61922d4eb2c008fbb309b1bc03f685712021c516df07987cd59694bb102abcc722c791fc9dc42c239666d34fbf5d430532f84afe451c50b855c69722

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a7aa494d52f9c0d70640b035e9de3abc

    SHA1

    226812236f56910f871973fa57d71640f36affd4

    SHA256

    141b0a6a39ba103ebff13e0fa8b9b30ec75a24b4f08e2342c467816d3335b6ac

    SHA512

    49531967a3f8586fab930c5930735b5e54047773e4e597d56ba5b779460c3dd3db90f3c5ca4a2677113869f33c11c24e1d5bc35ff47fdec50ad1b37a3266c543

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9d9b0d2dcfa0aec3d02fce7ceb7ecd46

    SHA1

    7390e3ce4478c40fc8ddb7420ca947473d228385

    SHA256

    736d5d9cb62df5e3aee3d1656256c6d3b306325499f01d37d6dfd083f85b6246

    SHA512

    3750ac3a386a02fd2dca2cb49d3ca5aa150edaf116d325c50674595a695e47e41c69711b3b734fc93e3ba68c5973aed8eac0bae0ea753a7be6c68d736c5812ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a77418c7a8eebd8e7a0c48b88140220e

    SHA1

    25c1364bfc556d88ab59259b091246b2129078cc

    SHA256

    0738a277c76e3abfcf1434f6eef39a504eec75f5a3f3395d05727f47655584bd

    SHA512

    fff9bfbe8d5946aec03c5cb55c40480369fbb0b4d83c1bd8950e550b73934cd8fc1cc8d79a91473a3b5bd2fbd94c6b131bb79fa6a68d526d67351f0fe9fa68b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    20337909fd135ab20cc43421a5f10567

    SHA1

    5a77d1f64de8461aaeafcd7cfb6c6476f089f658

    SHA256

    039fac250862e439264ae2beaeefbc811d0454c852e44bc6d446d1c94612e389

    SHA512

    3a7fbed722cc5e4ad7008aa7c25a0ce31bf95c3a703f025006c2a2b0266ef0322159431fdb6b88f013e259f5da68d60bf6b4592f19c69d682d98be4af20278c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8f60e55b94c76aa40c270ac4364e9315

    SHA1

    fe2d2981b9a0229df395efaeda5ea8101994117d

    SHA256

    76af8e2f7a2cc648bf6140a0fca7568148bb52787ad575698d4e72f05a293a73

    SHA512

    2f14019cbe210e8ebf5a143012909237a45a35e70f184381d1d6eca69fc40daf8f2a8cad4c37494aea03bbbbd7b753329096d356c3e420e6ed4713aceb81b22d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aa09764b8323f63022c2d81ac79c56bd

    SHA1

    da837c97697c8a28b9b9ba7b106108866398f3e8

    SHA256

    05442852d30f69940986d5d4646a149f31cd912c4f0e69ecef06444bfd689556

    SHA512

    a6f522a443dd34077256b7849627e0fa2698f81ce401393bb5c10c0803aed1671fa93a52147f7d5640fb1fb751455b1ebc9849f71a2516fe5f614e42c4657fe9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9c3100f423b04808fdcf1bf271a7caac

    SHA1

    793f70171f215fb5f147826e1e17e34c3b61808d

    SHA256

    870a3031c3ab2fd101986e39cc0ea788865557707de61287a0aa2d49d65d8b65

    SHA512

    5c477df528581d3b6443a1aa400911601bbe16d53491e88bab88d7e386622ffe794339744f0896970727c19dd4f41ddd1fa6c661588867a21a04f5b92d22904a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    53dbf4ff61218352884d1e4ffb53cb55

    SHA1

    e8a8f09368f284136d6ae7ebd53736394665a5bb

    SHA256

    f06a5c3926c3ebe0858e2c89f5741aa0b8a2c50f24f8e6000587a0fc8d59ee9f

    SHA512

    1468199e37ce11d2c921880260f91125a1323b0c952f509fc63d7c2ae0579fd18db4b97a80ddd60decc90034478bfef8fb646d96c04794f8ff78344a0dd44e1f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    790dac05f8784ca06ee64953b042d5f4

    SHA1

    c9668fe1ceb4f3a2f7e065c41a61d21b5ee8167e

    SHA256

    4871d365939118333537aad8ec5bf8f9c377ea9c79462fcb707245d960139f66

    SHA512

    ef6bccc03351ca23162d0c5bc62bb9ca15d54fa2237232f19052c9e65a7073ddd4de75bb9b38b8d92cef0c211c3c539ef3de64f1c9e992789f1bcc24b5938d6a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6dfdc93ef1756c2f1550407088bdef2e

    SHA1

    17cf1d5eabdae0686d678cfdf5db968526b30b7b

    SHA256

    0aedc0fd8a251b3ee6ba4ac5c6fb98c8e9b66685350cd73de3e711ad8d3bcfa0

    SHA512

    8d2c0411f16519ad4c008f9ede53eece447bcc3bed0ef4cc5d45af9a0d3c2186ab15dc36d678c6df542345baec3097a0b978825d9e2a462692c45641f036199e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    14d354689dedacdb77d0577b93cd6b53

    SHA1

    152a43e738059f61dbccd5a12168a77eea359b58

    SHA256

    dbf1dd084eab96b249268ac8a13fa59e9bbc93ac2e5971fff16f04155e185fa2

    SHA512

    1fd11d268b1501e121c518449d756e5fcb73e7dce2d139fa5fd90b91110b9a0035f919812d8bb1f88a6b08568bb94f40bdfea7055b57d95772bbdb5d52697429

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4264db150a29f72de9095fbc4fe0db06

    SHA1

    67a52ffc98a86ea4a0589e6bfe4c8cad1ea9c8fb

    SHA256

    a21014cee9adcb264dd044c23ed02c13cabb71e191f525c4d638a4643f7576bf

    SHA512

    9e155ba06694fcd6be77a05215771e3b9cd9171b5436399c7681d99b7990be6a811d68bc7c63237cc1a8669e33170e969b436edece757c957716c70ea39a16e8

  • C:\Users\Admin\AppData\Local\Temp\Cab1B7F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1BF0.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\SkinH_EL.dll

    Filesize

    98KB

    MD5

    1dd2a4a0f4d21eb65db5895fca2ca489

    SHA1

    b0c0617f6f66b35e255ec9824cde41f382a60e80

    SHA256

    7a7f037bab8024a9d17fb225cc4aa04133081135ecc4be5bbb889c0fbebd7e0c

    SHA512

    214e7aa56e820ebec87a778293871672f7c4e92d06bdf5ba18a2fc536003b2e15ebdce65c1ae3c927a16fcfe865c1720a7262e7a700459c66b4ae563374518ae

  • memory/1956-1-0x0000000000400000-0x00000000006D0000-memory.dmp

    Filesize

    2.8MB

  • memory/1956-0-0x0000000000400000-0x00000000006D0000-memory.dmp

    Filesize

    2.8MB

  • memory/1956-7-0x0000000010000000-0x0000000010056000-memory.dmp

    Filesize

    344KB

  • memory/1956-9-0x0000000010001000-0x0000000010039000-memory.dmp

    Filesize

    224KB

  • memory/1956-10-0x0000000010000000-0x0000000010056000-memory.dmp

    Filesize

    344KB

  • memory/1956-11-0x0000000010000000-0x0000000010056000-memory.dmp

    Filesize

    344KB

  • memory/1956-12-0x0000000010000000-0x0000000010056000-memory.dmp

    Filesize

    344KB

  • memory/1956-13-0x0000000000400000-0x00000000006D0000-memory.dmp

    Filesize

    2.8MB

  • memory/1956-14-0x0000000000400000-0x00000000006D0000-memory.dmp

    Filesize

    2.8MB