Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2024, 19:46

General

  • Target

    1048ca1c0a40090f33a95791b62eb70f_JaffaCakes118.exe

  • Size

    73KB

  • MD5

    1048ca1c0a40090f33a95791b62eb70f

  • SHA1

    9ddbe409cfae4e667daf1edcfed9ae3693052293

  • SHA256

    662d7a58fe91f3203929dd095e002bce2f16e4b9aa13451829f9b43ddb5b307c

  • SHA512

    136276de4220c0eb72ccf18ba6602ea7d09642827c30d957c86c3e313ea280588ecee909ccde76e5791e7f7cca38615232739b3cdb160aa521e872df9c897a6c

  • SSDEEP

    1536:ttS8HYI9PB1W11nll58wO3vjbZm8JF1BR36NSqy4:ZYIhBSlllRgjbnF3B6NSqy4

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1048ca1c0a40090f33a95791b62eb70f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1048ca1c0a40090f33a95791b62eb70f_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Suspicious use of WriteProcessMemory
    PID:2332
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://cumtv.com/go/page/cams_view_randomcam?pid=g242237
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2520
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2520 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b878009637e05e5cf6030de15ff30ff1

    SHA1

    a7e5ffd0073ef36db03923fe8f741e09a5041d63

    SHA256

    d15ea7c2df65a845a5a87b43938b3eadec3e051bf40a799e691fb0acc0574e8e

    SHA512

    949355612b2bb3f96b2bd640550b2d515bd2e5cc24be94a494efe1e641387ab01706005301a0092bc11ebbbe0c4a995bf0aae4fc3e4963afbf72ebc85c1339a7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0e3425a354be53e8a855cdbb5f0f606d

    SHA1

    5a250c6da5694d5e19c4b8f1d06749b2688671fb

    SHA256

    10c29dc09c3515652b13837ac3819fa06bed75bb40635b0c0924b193d9f4c5ad

    SHA512

    4977d62fc63e0c3a38f66f0a056d1a9e66e657880b9ea099a70fe8714bac478e64dda099f65c992a0d37b2f53a708421f2aebf9d18c26ac5d0460640dd690427

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bc1882f3c814bb7032ed17dc59419909

    SHA1

    200d8e2ee13475223e9cf8338cd52e853845d006

    SHA256

    7293b2f5ad51c0d76dcb35f9d1c7becfd1d6c0e00571b8b17cede06742002c79

    SHA512

    5a68a4840cb308400a6a0effe4b698a8194ef1740656fd4896150faebd6e16676e8e347561dbaeeeb1f7f3066207bff124810e51d87204f3e152b67bb9a73dd3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f9cd606bcb4d0e17206c97ecd8af0533

    SHA1

    b7eaa97c5ef733c89ea44ca05e3221450c0b6854

    SHA256

    d0cf002d3e3b4e8a70ab0a2ad76b0d0ce8caa3ee3f72d656c5d2044d92491d26

    SHA512

    8b4c726edce7a86fbc5b1565be59659ae820614761ea19826afbc81360123635512da6ea82998bd4decfa071355adc0d8c7d25d7eed99c97e2cf2bcd8405231b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7157c0701d7ed86ca242e14be47cf3e8

    SHA1

    01fed3eefafcc20ee4de0d1e127f71cca65dcc50

    SHA256

    6aedc5ed2710869d0417b1486ea93f925a7a9221f233e6ec9449f885867ef6e5

    SHA512

    e359336c1672b12959b018abcf44d70e16908bfe2fd343d14c04f3d72fb525cfc7b09b5b91d890591aa67dbef3a5457db7da1c05618336985363406668f70e92

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    530779f61433da3cd42119579c5a9a8d

    SHA1

    7ec17d8edcdf7806c3e4e87b3c0f68e8bb98df62

    SHA256

    72560ae8dd6521e76abc871761ad0674c33f6595f3c8f56af89c610c1b16ed63

    SHA512

    44ffda80e6a3c6d53f38edeef07f6144e097228a8d60c259fcd9b9df353cc080ac6c2320948352fbd7e3d5f74aa95eef7eabe6c4efb27bf7aad78e6f0883961a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a303c543fda376fb4c76a32803ea6648

    SHA1

    509e8971f4e91dc16ef900d6e8053cfd96d6d8b6

    SHA256

    dc7bfef9bcce31501aaed1b814e7bdc7f3c5f05f22e1f2cc9044f72252ed6e1f

    SHA512

    bba55005fe2a8dabca84c0eab5332b1536b34bcb41f5de9340d08bc879efc2699a9ab7dadbd1c14f8a3b6bd25e110461fd1b06d8791558d6ae55c357c9f1cecc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    27990e3073622506e494c9a5e3fa96a8

    SHA1

    6b06a8b672c7e6516cc3471d32f54b1c2c819b48

    SHA256

    7fd58676931845ed73837afc9002fedc1480bb6c05ad4c7c2376ee5ea7c34004

    SHA512

    0f9b65006f607f454732fded6406fc7a10775997aaf472e453cd7176b537c1d32913d58217bc6534c4ce1118bb17879f35f36bdb7891399f7174702cd5015bc8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    49410ba25cd6c81aaba8a3c26bee8137

    SHA1

    2ecb7dd82a29c855fa4892a425c90624deed9d92

    SHA256

    41515b7181fd03b439d960538518f7631998438205bbb67db0cc402001f86b59

    SHA512

    872e509715a419b2e273f41a6941118a8c59b0c2d98434e90fdecf7d9257ee7990a600c0566d02388db5024db752c7f1060eca4d902526fea2ce069699d52bd4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a8dbb22ceda90ca20177936993042d9c

    SHA1

    8df6ce88206bb94aefbcefdf8265f0cdcb7d0a21

    SHA256

    b2edbde4902cc2c1f4d5622eb7726e14026a84d00e881853fa1f65442c73bb68

    SHA512

    9065ea8b3c20b9ce0d4027511033a62d2b480d3a5ff988b37cf909f76c10fbb43b3e65251914d9138c761001b15cfa2d1599355b95fe903946f749ec8eab7ed4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    07c47a66c23bd46006a491e40ab691e5

    SHA1

    1c82a143583efbc83d3ac02588eace44d411b716

    SHA256

    61990882490daaf58f2fc25829ca0b424956276a1af7f45645d5098e1ccb65b0

    SHA512

    800139d9683b89596b5717940688f26a2a64a145315a0635d95bc2795690ce595568da74a3af78eb2edb8b25a2a7eb399834f3bccc5645c223e831df3f0aa363

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7a4f156a3e0c6a6843c255a4e7e6053a

    SHA1

    af83d79665c9acb33659a70a5ebdfc55a96d0668

    SHA256

    b86ecca544714491a5a2d5b495a8f187ed515b34d6129f45080d1302fedbc510

    SHA512

    b4600ab12f2eebadfa538572036e4aaca63eb8101aa932479496456a7979aae7f4a381d75e0df1346122fe8fba36fcccd0d29ed75effd4a7e02c225bd5468043

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ccec5c1a1923c73657a68845a871bd28

    SHA1

    a7ca2bdd51507a0f3e6c7ca53757a3c54ecd6cbd

    SHA256

    ffea711b14f38ac9a94e55d4469349d0c59720099a6acabff223603e67257d07

    SHA512

    00bc72a097d2eb01d1cae99d857676d4f18e7b64234d9d73658bd0fc0215d402ea10a7fb0d55eb863448aac4ad957eea19ba592b02cc3244a03e5c4a5d1d308d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a5d874641a4b568f59f7624e5e20d381

    SHA1

    bc1fe88996a2d4ce91d49241c5e29ee4c13db42e

    SHA256

    9a8638986da7422798182c29aff1282f49cea9984445de06201a8a909f58b3ef

    SHA512

    7acb7e2b75ea00f470bd289662da2fff0e08f7fc6f04f6ff9570ff6e8881a89c39387db525fe3b586a48d69fc2452ab5b9c8015abfcba3e246fdef1fd79a8c5a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1f17aecfc819894ce1d753921ed45fcf

    SHA1

    0f8b122088f3134642bf8b3a67779b10931406c3

    SHA256

    c11cd0b49678bd55421f93661d286e60334989f32458010c2bf4b3a04d8b00c7

    SHA512

    145cabfb99e2e27550a7b2598d51cd0ceb3101fce6f1dba0601f8eb82697b01ed161a5c2b534d51bbdad8e2bab6777cd235083eafa6af0ed2e3dcc69d33975fb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aeb471294901fe0f7254e7da9b3341f2

    SHA1

    1a2b312b7e564c666c99eefd44c2b9568e977954

    SHA256

    9c86d32be8f6652291816402e17a77e261558bfa1d4da885ac22b9b299367a09

    SHA512

    08805b91fade7609fa5b03c50035226269ecd0d9751c812d6c8a7d8e921213a0fdd031d1fd15df49b5252251f1247a73a17c759aea252d2226acc601c6f87968

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a484cefe0b2645408a822f9f7940e934

    SHA1

    10737ee31894caf3c6831586700f42d209c7f6bf

    SHA256

    ba4fcf8ad276e760f064a76c4d76e2f1c52793534661ebbb8f64037e15774806

    SHA512

    8c2284d40ab150c69e3587f066135f0bdac5e555b7f7fc16c9354264794e615562faec444252a44d5689f9f331ad083788746cefa312ef8ba6bdb6f1369c929d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    591af80c5f3113c1326823c1a9445628

    SHA1

    3febe77249336ae3b8d7ea4e64188d15d313ef0a

    SHA256

    cd19bd4d9bf4f8a715c469da0b2e873813014ec62eabb96a1027bd3643477e0b

    SHA512

    9529926ec453d67ff29f4cf728da842285261f19e1763df36b117f4ca39a1d1c9a93d5b22e4411f38b3387f813962ae0a107e5fdee7fe4aac6e29a4f66c52a2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    18b824ec5d281cc7828e04244bc83198

    SHA1

    63237d8a304d9f4c3b3432a603cd632fccf05225

    SHA256

    5d67da5fa3808c19f7dc22212a7a1b2ffa953def8da6820513ab9249d83af2ea

    SHA512

    80777bb48ab5625fcb292544cbfeda19c4fa2c790dafea6591ccf25bfe00907218cc30149d20d1925af8050ba6773b3b5f630f341c8e96d08a812976ce6ea70b

  • C:\Users\Admin\AppData\Local\Temp\CabF327.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF3C7.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2332-434-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/2332-872-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/2332-438-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/2332-435-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/2332-436-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/2332-437-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/2332-871-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/2332-90-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/2332-873-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/2332-874-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/2332-875-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/2332-876-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/2332-877-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/2332-878-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB