Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02/10/2024, 14:49 UTC

General

  • Target

    0b3555212b6dd9d9d768014a3c4ef337_JaffaCakes118.exe

  • Size

    40KB

  • MD5

    0b3555212b6dd9d9d768014a3c4ef337

  • SHA1

    e898b2b60c89b799d8686129e48528867ac20ab9

  • SHA256

    ed30babdb2f7c3c3d8dd0c21be1754312bb0e2bf8d79cfba92f5d003c7257adc

  • SHA512

    5a8df120c018613fa5bdba98c6a90a1a7765e07f91cc26dca05e64a0184ed3583c455bbb74b1e1250c8dc144775f01bbec818df926490e710ef04f1fd5c518d7

  • SSDEEP

    384:/T9AKDWsvu9KDwzhEPKDlVwSwQuPhdn/KTD9S7/KDlZElKDwz5svu2KD:/JcVzhE0Vwaeh8s7kZEtzF

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b3555212b6dd9d9d768014a3c4ef337_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0b3555212b6dd9d9d768014a3c4ef337_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2272
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe http://www.xpock.com.br/os-10-videos-mais-vistos-no-youtube-2
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2476
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.xpock.com.br/os-10-videos-mais-vistos-no-youtube-2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1564
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1564 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2852

Network

  • flag-us
    DNS
    www.xpock.com.br
    IEXPLORE.EXE
    Remote address:
    8.8.8.8:53
    Request
    www.xpock.com.br
    IN A
    Response
  • flag-us
    DNS
    www.soasnovas.com
    0b3555212b6dd9d9d768014a3c4ef337_JaffaCakes118.exe
    Remote address:
    8.8.8.8:53
    Request
    www.soasnovas.com
    IN A
    Response
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls
    iexplore.exe
    747 B
    7.8kB
    9
    12
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls
    iexplore.exe
    747 B
    7.8kB
    9
    12
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls
    iexplore.exe
    779 B
    7.8kB
    9
    12
  • 8.8.8.8:53
    www.xpock.com.br
    dns
    IEXPLORE.EXE
    62 B
    124 B
    1
    1

    DNS Request

    www.xpock.com.br

  • 8.8.8.8:53
    www.soasnovas.com
    dns
    0b3555212b6dd9d9d768014a3c4ef337_JaffaCakes118.exe
    63 B
    136 B
    1
    1

    DNS Request

    www.soasnovas.com

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6213c40c7611d9fa917c85a12e2bfc05

    SHA1

    2281b1e30d1e83406916b5b38d2b7a2dc4885898

    SHA256

    8dcc099416f7ac8116c1bdbd884e70e0c8e5d87a6fb29bc6e86c9300973c5225

    SHA512

    97e77c3cd1a6596e3a883cabb11dce67c3200f855d36f316550f0f8a38ab86f58bd2f5dc8d836d30f063b42a9e46c1a1376456693d74684c001900285d985c52

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4c0eb6ab402c787ad9602122a9a01ac3

    SHA1

    ac7e356a1f0166579062f8a70b2ecfe3ece74701

    SHA256

    dfab62b27b90693c35ddb06b6e95c070b946583c7fc470a035e6a524869bc6e2

    SHA512

    bb1e20c5c6f59c05bc23d684f787f2d7e1fcde3e811cb57c39eb5bb32158ecdd84e44cc6bf7158a54c5e2a30ea72c119ace2fd4e8e3a6656a3ae990aa83b1f5c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    75dcc9b8d1027caa02201156e34f8319

    SHA1

    aee9cfd988126365f8cae85913f0c9809d7af3cb

    SHA256

    81a08f82e3848e201daf2c84b6662cc621fdf342c02c1037dd44b7d61b31f188

    SHA512

    32fee1ec344f699064d61731cd0d9fe0ad10061518750c5f6c7323e2a8a38822fb0ab2eec324b4b704a5824806bbd3d91eff0ed77a64da7e4e07b98a48f14dcb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d34ea6c01d6f10f35d49f03c775c40ad

    SHA1

    adec0bc70844521ed188fd71d4ed526197bab48a

    SHA256

    0520f093248de08f8b50f34f30c3cb84cb86f66dc6666db7ea76516d31ced3fa

    SHA512

    c627de2c8a759f48271286d7e1aee5c969677e0e69fadc5c6849456c5a004dff5a2d0e0eacadf08585437fca50cde2f965ab2456cada75977a3876b783ebab32

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fb6b86861e98a5541a4ea5164cc923cd

    SHA1

    10646b708bd55807203d399a4ab5fe1bf7a067e8

    SHA256

    af0e468f25952e1fe887a50a01bc58a775455c98a64dc210dd55141ea230ddde

    SHA512

    8e75d2b6eed92054de6c9c0ea3b2d6389e995d92e338e53de9fa561d31ca8c80fd3beab20199dc77a50d331fea378ce0b12ed92dbbac5555ff4b35f42b7f33db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c036753a65a0b86ba9964ceaca48bc22

    SHA1

    16be384fe8a259378765c02a2721ffc23ad211d4

    SHA256

    9ed9d8f11a98a7a2ecd1bac7cdb1ca6be877aeacb0a52264aafbae89244cae8f

    SHA512

    3eab42528f7fc4fd476c416a32a8733a8577f5c30fb5f9f1c6d850607db730245dab0544b38a98a421e8ebe9bc5170c2edd318a8d6b82b03d3bb71375c16513d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6fb3a77e0c746da6286362dd9f3e7f70

    SHA1

    6046b6ac436e7990430721262f065a260de93574

    SHA256

    1bdf8bce66ac603fd5f9d703255cd98c3cc798797c1301d1c4ff6c08d3779ab9

    SHA512

    48e0ae34490969944229993b7262b1d5b6b909f4217d889b25b59341ebbab5c1e6df9713b8c98fdd81237667460a0a9b634ab1d07c14bfc9a0e26358b3eaf2ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e4585d26a873b782c5d397d869a10036

    SHA1

    5fdf647dbd070bc2b5e109f6d3b54b6d98bdc939

    SHA256

    ce8a560738f9ca1f3097149c34709acf86074fc9ec0cdbd178eeb50f0cce89b7

    SHA512

    7a51d7facbf4166be6e29e8971ee0fc14998b67d4ff83941523ec74b49255fe9f2c22c06ec27204545717072d1ecc50cedd2fe58c937196ebf93ad2175371d9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cfdfcb65579dfb9f3c8968b59a20a04c

    SHA1

    3a3eb465324fcdbb0399d44689d9395f89c8afbd

    SHA256

    620711d1368d5b17a07adbce4f722b2bff5c01b41f4935987e3a06129f244ac5

    SHA512

    b7b22826e37cbcfdc3aaedbd0882332605bea93f129f388304aaf7235ce6a938560d3ec3ca74c5b2d9607c61392a991c61a688d41d81c2963d7c6cbf495e6681

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ca8ae8afa026029ec083ca067b3b9071

    SHA1

    387833b7b80cd9d18890caa1c87433f2437499f8

    SHA256

    f31eb813950b259db11eaca89cd5970ebec22a0236018748e92f6f415730e0a3

    SHA512

    7cf134c9ce846abe17e46874249c58f38a805d666f6961c62b33b632a1c62cb0afdcadc4e2c43d6b8f4405273d4a06219a5a136e87d40632629749778f4ea666

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d73600bbb51a6ab8af68663590066833

    SHA1

    d5d104901b85a723bc806601e8c909046ede1dc3

    SHA256

    0995340a8f7ffb354dd24ebb99090ab6074f7e74a49a33816ff78c09971b8d8a

    SHA512

    8288f26b8a635760d78986dd94f945ca42e170eeeafa47798d80f28ca9b5d268df616d40a54fde798c4be0bbb96f9b26cfafc0147acfe5cb87e84e0e8ff40287

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4893c709318983f2cbf8e4a6cde31206

    SHA1

    c072d18942c7e884282ebc079e59be85ea36bca1

    SHA256

    6601e22b7a81afbd4d3613980afa2be680a0edcacc34006ccef2fd7b94021181

    SHA512

    7f357d1ad6ccf5f455882b5c2fb5621b452464cd2ee583447e6278e72de9d625d772954c8a9171a68923a8e338b69810cb04565b3b16e8f9d4ea4f9b6dec64dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cd472f8f08328a8caad211670f69fa12

    SHA1

    e64542369ceb7592e76c080bbafe7a9e649e1990

    SHA256

    398bf4ff16c60a18f2b8b87e0a853446ac661240cc4644b50cad7961fbe87839

    SHA512

    5419d8452f4302b6911275b2f363afbf2ad9076135e26e43865d6442b7ad1c3b5dd6c9d9451e43d566efceaf8abc7603fcdb60164ef6be14ac7c86e8ecd3fd2f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ef6804aaa66ba596bd44e9ab71d53c7e

    SHA1

    313d2df424e43acc46e42afbd3b2d2311ea59910

    SHA256

    450ea2575741d8bd5dbd4be4ac0676862907a064bd8911043e9f3f081d9a2d1e

    SHA512

    9f9038ed83ebd276a50d52c438eaa95d5edd5459861c4f22ec95aa44a2e743c36d48a776c33ea2b2ceb475cdffd769e309e1bf56cfdbaf0c8436b608552591c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fb9af82cde535f7011ba4e825616e80f

    SHA1

    2dc7cb55638bd74490b8257f21ad8bee1afaf1a5

    SHA256

    d5dc12a90a7376d631719ee061ec7421c21a31fdd8254cb3ca9e53d4e3de9e51

    SHA512

    4bb23ea3d198e215302e9049b71a695bd081582a3c429b73753f1db93eff42905d1a50ae87a50afb92790c19813aa69d81d94fd14b78025864bfded6d302900a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b4eabeb39edb197c47635a512e8c7b99

    SHA1

    595fa8a5cd5e1d8f5ebd425222bb58d112e218f0

    SHA256

    3f9ba818c09b89f18e78c86a064f622dc7265a1da2f32dcd75e4ef1dfd135b94

    SHA512

    294a6139cc15178994c49b91deb3a3c78e9b7816ff9721dd551138aeb1dc540c1ecf157f6c60d41f95049f43c33a68cb5770b1fc65ae2414d210643c57bf0634

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8d7c7d828e79f81f9a32f9e84ae6dca0

    SHA1

    29bdb9d92ab868acab78b5eabc166bee3520ba6f

    SHA256

    4be8d7c512e9a717d22619c5f63576a0b87effe418b13dc98b99c76783f465e5

    SHA512

    3a4d18b7aa6662d6246a9726aabe0ce34ebea0f4fcebe06350c87049f4388925836baa5b950850ba6fc7ae6cdb485c71d63158f5289b5503363fe3b1a271f649

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4c0d5848f2da424a504f96a6f5733c90

    SHA1

    20c3bd1958ea9aee8d34b9dc466f07042b254d5e

    SHA256

    7ed51e47415d28ca2b14f4c6b040baffb1e4fe9ca24fe1d21c04c1d99398802b

    SHA512

    6f29b87835b8189da403fd699448ae5e3de073d37c7b96ceb37db37dbf05aece8446b89963c563755b8668ebfb8b97e13ba78834983ab4fd411479edb6fb01b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    29e0c327637a45dbee8fc981875eb2da

    SHA1

    8c9d5c7b8a92de8e1338d16f7aa5f488a10ebbc6

    SHA256

    1e35acb5a5e718a270cfd6d5d118cadae1d02513a3aa84483279784e2c9982e2

    SHA512

    52c2f2b252f071620e021224254e2a4c9b61b38ee0aecfe3424f84f0f829ddc0e5abf4e2047733991d80af2170f63ee5b1cf277c1ca3e1f28fe900cf5ffb531a

  • C:\Users\Admin\AppData\Local\Temp\CabBDC6.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarBE37.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.