Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    29/09/2024, 14:14

General

  • Target

    feb335f68e19db4523503152e6ac0c1d_JaffaCakes118.exe

  • Size

    9KB

  • MD5

    feb335f68e19db4523503152e6ac0c1d

  • SHA1

    97feecd614b741f1bca6cd07338300660a07db47

  • SHA256

    967d5f65a1eac15ca0acd64130223128947387e6ea79b709588a1524d27594b8

  • SHA512

    1776064868bed47de29ca0ca37e4df29555f06547676e4fe7d172b14eaa36a70180658a14f9ea4c773be2cf2d2e1f1c85d4b7c8a6700ba3b7e91aad0d6b13cab

  • SSDEEP

    192:FQ0EoUpgTNqG7qul0/WhySt0yaArY5FoqhwqYBX8s:FQ0EoUpgTNqG9hGHArsFthwqu8s

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\feb335f68e19db4523503152e6ac0c1d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\feb335f68e19db4523503152e6ac0c1d_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3060
    • C:\Program Files\Internet Explorer\IEXPLORE.exe
      "C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/vplay.php
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2324
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2324 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4326e0b2b1c45eefd88b1573ea8b7db1

    SHA1

    c2c19a174fb5696437a4d602ff341a4be50fbbbc

    SHA256

    7113a7a5e0d862c078a0eef10837d6e4a13f55370255413df2fb0ae7d03b1cc6

    SHA512

    b3716c82ba7aa9d36179d1a3bd74ef6f0e3ebdcade537e26b8f93c76d801a6facf75596d2c1d1373a6ba2e0a604d26907973104509a79b22155ee33e65244306

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    257efaec65e9612a6976f7860233e3b1

    SHA1

    a689c1dba5a0710fc7afdcf66ac062432c9ec506

    SHA256

    2a7121d8f94e2fed0500f5916528eeaf1611f4e147dde458a6a83b150382ca8f

    SHA512

    856bc91f2f235b830130509958d5cd05d84e4fd3663d8a68951198d481c08bef0dedc6cefae79b96ca8053c4b48e419ed76749d28c10a9386e6300769a1274d7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e7cda20c6afacafcea7141cb0bbd0ec4

    SHA1

    9df4b84780b497524953e593532ac6271b2e2325

    SHA256

    e25b2fda88dcdf226085011dc3d3658cde4c70a72e0776b334d1fee61780ea91

    SHA512

    f21015596e752251ba43e19af5c3d60d3bba8d44d58114543b74bb23a0f99372e6f777560938d8b6d1d88bf58ca1c2c1f7914df9259028e99fb63fd1d2f1dc9d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3dc6344db6db877accb9636d5250ccde

    SHA1

    1b97804b61f7db1a46f3889cc3283489321087d2

    SHA256

    102eb88e7fd634bd610ba3df72ce4f8d551a220c8561cf4d19cddf6d4a2fb5a6

    SHA512

    fd13500e7740949c2efc969fe33ffb5b5a37e5bf4f3ae5e6d6a23b6330b0fc73dba563d551423085c80f39a2f7d2069baad912d99dc41cc8efc59b78417b6e9a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f408185e581f24bed288c3e524004e70

    SHA1

    af7c9ca1f358a106a179ec0167f25f124b23e998

    SHA256

    edb45fed264fb64808ca0b0ebcac12cc89fd6a5fe6380c4b952a9c18d8676228

    SHA512

    4313333dc0f4a0d57501e7a014aa71909569dbfc0a5a4edc61e788ce9c5dc55d0d8de135868da7bcc9c5274ee468042550d2a8e79a2447a4aa16af5cd68ed2ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d36ca83015cde854fa4cfb60ea1259b5

    SHA1

    76a4a08079ffc3fefb67b6ad89c882d5ebe4f7df

    SHA256

    d2b7f0463138256ea4839e00b6f4d820de4f77f66d245202cf4e0810ec84ccea

    SHA512

    ee17aefa8f688f8eef8bd69257207b85cc3bb50b93bd24b29647c3c909ef8897f067b1ef85b845525a7e318494fa5a75733df9701801ee339be911973479fccd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b4f8ffa8f8855d1961049ce4de31fcb9

    SHA1

    2159e3c6abfb9a99874483f135f893e74f17dac4

    SHA256

    b17c11be4ba56762557f3317e6b745609652c2904571ff1bccd76956450c2e27

    SHA512

    2e4b8722ad4ac9e3e352662e3ac3058f6d71fea67a9b9ccfd07b3866f6fd7a464d4519dd6064741f4926230ebe3181ac96717bbbe3d60252d5e97cd1dd35c43c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fbcc4bde61f5ca1f17bf270a51f61ab8

    SHA1

    7831833d926a464f9185d610f0652d58a7481487

    SHA256

    05ba0b001c1303b97b7241659c6e857fa64f719b6c97a7fbe445ed5e15d7dc82

    SHA512

    31039e83d9b5cfa1e5fb12c96159d165b41c4a21aa9bc68b102e91f719303985e800c47e4a1ce14b757e972e29db643ed2b93d841af83461e4eb7069ca6ecb03

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5b7a229c9c55e7759cabd7d62cd1bee3

    SHA1

    49a9efd724a1368b494a6651f31c654118c09f96

    SHA256

    de5ec642eac78b41fa197be6c2ac5ad6f9bee7d891969c28480c445be8a8d958

    SHA512

    3fbd68d08862a930c4ccf55caf993603de4ae2a45316df9b3d7a62fc7acf464102947196143b19e25f970b9d3e637bf50d8678c08c9b0a41a9fdc09122543edd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    95ca0d95b0a396a755506957d9bac7fa

    SHA1

    1211510d7e60103a5e59fd7d44fd173f38d5bb3f

    SHA256

    ca3643ad9769519a732dd300c6ae7c1d257dd254ce4aa009975b56174b2b6274

    SHA512

    218a33dc0bf0df966904d5cdfb6308eaf2f7855aabe9a40114fb884e077bff0a78bbdce088f4656306f70e173ab56e9d6e571aa010d5e4b4c6b98cb1934782da

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    022e98349f8c2173bd0d03f6412c295c

    SHA1

    e18a03b77cf3d06ede9dac3cea0d546d080ad2a3

    SHA256

    32f6b34bc8b2af5179458912475d70380dc73d8052423097fa14289af9bf03ee

    SHA512

    9942f033d741131bd1d083461576d3e23c5f966df5cc58724b11836f0f143f22bd7a4769544518a7171973424320c0e7a0c3fa164958450d444c4f44516f4bc0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aad1f02b10962676180198f9e605de6e

    SHA1

    46e928f94dfb9146273d7eff96659c258a1c7d13

    SHA256

    e27286f0cf6965a093168b2dc1399897ab5a0009ad0193ea051f7310b7e8393a

    SHA512

    36cc6e73e9c515be06c8a9899413240b2b887e9a4c88a6f10c37a6e3e0dc1f1aac0949532791dc31a4556f92b87aff8b30ba51011e72adf1f7809cc82451b2fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    98e4eca1544e193f9ac8d3045e76227a

    SHA1

    6e4e57a90ee04523f12a18c34bbaeec669648e92

    SHA256

    6a3d455e40b853ae3060459315e31b480c0a3ea68e3f648d34a73ceebd948095

    SHA512

    9c4134e588ee6094d76b7d1fa39df3cdb13d1ed73fe931f24bb1fd3244403b2529bf0bd561b3c03967e7b4a0575d748788eb9948e926cb73d919c4b07bcb07d8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0406489f51660e8715d17fabc00322b2

    SHA1

    9fbe9e100b26b89bf36c1bcaa8e40c6a48f152e2

    SHA256

    c1fa6fdf67dae056b808cdff5708a3ddcf0295b6e5d3702b032e8e53b48c44e7

    SHA512

    9829b89bde0810be897f5fff46e4f0f435ca3a31c7074536d5f94f5ae24261d00bbc5e8105daf0c96be8fec29659c3e20681a32bc24253b3622715c0b45cd9a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fdbdbe61932732c3a2c3cb4c56d0981b

    SHA1

    92b6c75b3d3d0a14603123e103b9298440ec2f54

    SHA256

    b6267a55c49e75542e3c1838c50a854da4550a975f4b0b6428fb5d75d487d4cf

    SHA512

    300b79b0468186cca11723407e1d8e8d3aeb48c4d9237289cda51ce474079dfa37e8bd000d38f53521a70816028878a1a62181d32e6442a1933d6da2af543b1f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    88b2258e48122430e2f78c68b7bf9981

    SHA1

    c0e82c715faa6a501a920e42d0c6d29c8e1537d8

    SHA256

    5a7169aec2113225f29e39585d0bdb3aab6f793dd35632db5f6ae693ca1103ae

    SHA512

    068951f4f90e43078969ff6cbe0341489ddc36c57de989e911c91e61fc31a518bd684a66bc3080b3c61f5da1710c9c0eda9d459df941dc0ff867aece4dc1ddb5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    380207ab077e3bcc06a86fc25e1a1e08

    SHA1

    16f8e3608e457435fe23a4282ecbbdc34572a69d

    SHA256

    600935b9ffa6b9d37d8d121984891d3ed4291a85c91b5cd0709b6efeab4574f1

    SHA512

    b84543873cde1aa4c18b68e7276115345fc23cf08b8a1d122155e679b7c53b99f9a44e838b3f1e0f21199b2e401dd30abb1d063dc4bacb37d46b87b4575c5a5d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dabfb52c410b5a973636e7364e989cf1

    SHA1

    17bdacdbe857b365ef66c6a3d7a23f23bb94b75a

    SHA256

    dca2e013bc12dd1bd6838c358ea9754bbf6c98e303a75a43445fc34c52e107ae

    SHA512

    e77f340247190baa00209d1f152c06a3fdc01a616d917ffbe268e38f5ecd4f3bc69ec9ba7d155662cc600de9053cebdc410570492c6807c4cae8d7b58defe9ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    15a6fb1c3785ce25083b66144c1341f7

    SHA1

    cf448d58e6340175a092e8cf623c1284342ba83f

    SHA256

    8ad07fb9a8dd3a293a360629391c1a2f2de889ae059fc709c490e7bae92d0d84

    SHA512

    1a5a3acfdcca77ecdc2272cf38e8b21066bf0ef9cc7cd81e859ed82a510cc4d15ce0dfc911cd0b066dce4c8c4f6e391471c2be95aba48129d655e67ac17b8061

  • C:\Users\Admin\AppData\Local\Temp\CabF4BE.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF54D.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/3060-2-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB