Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2024, 13:01

General

  • Target

    137528acd9be93694ab01c418f4fa355_JaffaCakes118.exe

  • Size

    39KB

  • MD5

    137528acd9be93694ab01c418f4fa355

  • SHA1

    c40a78442034a67ecc738b144d1a47ef270366fd

  • SHA256

    12ee761153a79a64cf24be1a024d3a744368aa86c2e04e99bf8ca176419d6dd2

  • SHA512

    ae21f4c92e1e37284f26639fca185242613f3e3fcc60de2ff7b2593fd9deab75855f0e77a9ca0e461ced07aa2f2ec860d7cba2a39c7c7abf560623eabe848173

  • SSDEEP

    768:8Wi44tUqvSEbVkDeCFtkUxucrFtVKR1B9X3A25GnQlDFMdopE5z8c82MTUT:Xk0EmbxuQFtq1B9X3A25JlDFMdmvfG

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\137528acd9be93694ab01c418f4fa355_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\137528acd9be93694ab01c418f4fa355_JaffaCakes118.exe"
    1⤵
    • Adds policy Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\program files\internet explorer\iexplore.exe
      "C:\program files\internet explorer\iexplore.exe"
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2640
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2640 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1552
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c del "C:\Users\Admin\AppData\Local\Temp\137528acd9be93694ab01c418f4fa355_JaffaCakes118.exe"
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8bc9d784ae921ea48e48e194f43bc166

    SHA1

    464829c50ee1b0f1f307f72e53f4cbaa29247bbe

    SHA256

    7b75dfea2cb7ab876d1511ce15595049604c267ffedcd03fb8f63053ef6b2c92

    SHA512

    d2d1268b970d6be96dc1b0a49bced1aafab4b4fb0ed818bccc0392db59de2d37fda0e50437d1ea262d548fd292ef9f55013d5ffefd381c7924ec06338ad49177

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6ab19da54c0996ad021ab5338c2943e4

    SHA1

    c4c86371bbe480def6544bd4edcc3ce83087132d

    SHA256

    37bff24b6de2196697da9373087e4350e7bec7d3ac07d0edf82529d732363e23

    SHA512

    d0481e5285a4a21006fd6413e0ac63bfc24c817b3ff8fd79782555869c1b42e96063c83236ff57b35f31b903ce2fe5a68723f1374c764af2058391f26565b0f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    12864471dba6e0fac04c8901cd9dc398

    SHA1

    1dcd2313863d5ae44c2f2a1e571aa556bfdb61bf

    SHA256

    4369e3ceaa6a66fa7e79568c84442b89e6ee904adeea4ece59d1143a9a4cebb9

    SHA512

    f2e6d6a194a84ee65512a4243548459018986ca176b1fb7678d6dce4217e39c121320025f0f8c875b15c0ddd1408f8b8ce7d7f495aeadeb01833d84e93983d0b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8b256ced866547a06bb626867e03b761

    SHA1

    03cb9bfe7cd091ac6bd416371cb69311b3243035

    SHA256

    f66ae878052abb46d058b9b80caac8a086cc40b5309e6b6c973bfb11a7d95e12

    SHA512

    a6cba4f231473779c9ff9efce2d88bd4c51b8bb13650ef43ba3d8cbebbbf1ef211aa3dc5e5a286254eaeaf58ff714cf570efd6622976ff8493e8f93187096604

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    148385fd191c622fa9003662d3ed54ae

    SHA1

    6240d2031d1e6ff599ce968190206b6be65e8dd0

    SHA256

    f68c3ca8a6af51c762c9a7bacf96afd925694a751752ffece72e594d81c4ac7a

    SHA512

    2ab06533db18f847965d3a9c237416facb90419c301109bf9ba4ce0782841267de21957ba393ab2e7281ff6db617a8076f7e1903494959514b066c2f1f775872

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c2952b0abb67c9ce85c4f9e212c90c4a

    SHA1

    fd432d6711f9421d321cf4634c188323d77ed26a

    SHA256

    42ac4992d8d9f10745932960794c9858862f4a651bf9af9aaa2a79b07c5917fb

    SHA512

    c3f85499ffc19ecea885e1f9520e84459a1c920fb695e41867516349dddef3761cdf4386c45fb9dd9861888ce1db062cbd81699412958d526a189d722a043017

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    371d595ac56d92909c2b3feb803edbac

    SHA1

    9fc31496f6e6b110da5a4ebf93b8cf806f28604e

    SHA256

    b3c701009b065ad3d19355faf51c96fc08f7ef933da02121b5173f82135a0af8

    SHA512

    5a663a7e21f93cf175e43ea99f42b4405aff1ffcc5981c5c867dddcc2f886fdafd753ff9c7605bf111a193ba5f04cb76dbc0524bbbb49df2f9ff78dee099b653

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6af9a7f46257e4109fedc86aabb4300a

    SHA1

    c3818eb6c96e13c5e0c2d95a4fcbc66defba9038

    SHA256

    ced6eae460250af344018a4013dd1bca71711ffe54f2b9a980eedc803fa19b5a

    SHA512

    55d49a1bb83110c489e07e36484b29e7ee678e6804a9071d2a09593791bf545cc05b489d25f01a24fd9c7fbc60f7b2c404f327d7f21fcd439843ac9441aa4197

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    be45601f70f5c7fbe68a576a0db4bb8e

    SHA1

    3e1115f1ba1d3ab78bb40d2a39949adbfd4d4b64

    SHA256

    40af7c4bcbfda16b8b1d5bb9b25b54de2e6bb8526fe3f5c728d693d393981c20

    SHA512

    16ca340b5d82e7faf62994eb61ecb44fd5c48057a8d2d323cf3e6bc712e54d91acce29877c9ca3855016ccc50fe3bda4df100d72369e7ad7fca589d6bec06c2f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    964f7915eef80dc6b8a9a232248783dc

    SHA1

    a4ce84cc839bd8f58d76bfd3449b1e9c6d4851ac

    SHA256

    4a13b03697947e8242d1729d38fc69720f8d6ed061feef6101de4e25b2c5b259

    SHA512

    ab7386ef1898abf0af99bec143ae9200efc5c9d9a2761de9734d3086216c04342021725282fc285946be0e5fe57b0761760fba2699234fc370d17a04988af694

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a2b3a99353bd4e6cd01f1bbb2ef5cf09

    SHA1

    a1042faed65bb2c39d6b8b5a7ec754f32560717f

    SHA256

    e7289305a47a8c46545ef2f2ffa063293be037e6d8db9c19550eada537f02834

    SHA512

    6e7006f29c781f157198e48783a1f95ffdf85ae413bbb1fff41d0ee30b0b821f8869f63a7e16a8fc97f00d7230dee8823501a74c1e67af41546754e6c80e7923

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8df05db36fa953e1ed12458bc6a2ffe3

    SHA1

    a19c3f2f2f0b8dfc61d6aba10e5f5678fdc9e1c5

    SHA256

    50e5dedf7c0e34d4618b92c8c70041255216253f9cf87f8ca3e5e3766441c25b

    SHA512

    a07a40d71516a8eeb106b7350e36709f9ab901bf922b179bcbd64cb09a2a8136eb7bbbbc425e1c4b6f84522f906db00b6cbc21298261b6b859c6f093b53dba76

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    af64f77012120c07ee3392dda23f9dea

    SHA1

    dfc60980a5624e77fc41ff223032c255cfcade75

    SHA256

    c0a81033f2d6efaa888163ed89d2a7b6775a11e7fcc7cddbc72cd935e3f568f7

    SHA512

    050724a9856530b13b7de682a648438876c0ef5e4e81445d71951425fa127c46a6cea6266d83e562bdda6a2f6753367e6342a60ed18a1dce33aeed8daee6417b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    37eda3b7a83155fd38aa52eb0b98cf98

    SHA1

    d8e58eeeb0f59dbca3034aa4f97ff538babc2954

    SHA256

    2ab4f57a007df44393356b7c989fd381dbadde79cf93ae5851e5d43dad026317

    SHA512

    a45f738217440d14b4e832a36ce06c12206205b093bca14d64d5f00fd02f30f87a5375c33f2a7415248439fab9611c01e3264ca4ca3537b3fb347ac87a87d6b8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b6f285d87f42d72608806f20aa2e28fc

    SHA1

    60846d1f4892ad85f9d2bdc6ce5845af499eb070

    SHA256

    15546cb296cc9075129c233b937c9b3fbe87df543eb9aa3baeef7b68f6b5a8a1

    SHA512

    ca625aa6bb74be898427363dc559a1df95a98782b284a7a3fb21143304c83f01963cd2731a90f165cdcc722bf64edefc4d1e65050874c0c4d875883ba4b3d8e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e593e77cbd574122674f46945b1f6f5d

    SHA1

    0e079db9aaaecc0b571855c5f3f47d519c354e67

    SHA256

    069a64951eb717d5e0cab543dda37b7e8dd7f819487f6e5651464a20edafa7c2

    SHA512

    0df8ecf7d6b96681302b6e6f3166a8b884d395d0691cd789574c0a50544ef66a828e68ec92b2b2a1a1ea29b1d9a33f1d45f480dfc907e01f07570ea17a0b3611

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4f53f49dab5fd82356c7b77f71c7fe94

    SHA1

    380aa6c2322601079db908f80f801535e4ee54c4

    SHA256

    7ca43f90c724fd5c6c39d8be51a22f248708d765db379af11a61486e5efba4db

    SHA512

    cc5c281783d05d6d7baadd7163ef95518b15c3afecc027f2b77393f6d23d2771a668ab66b5d6d66ef7e23d28a6414d7636bf8784ba8aa506215a476d32c01aa2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc1bc303b609d3c54a1234c7ffd73f1b

    SHA1

    88374cb3d6b6026666a437d9b8b17cbdc251d5fb

    SHA256

    6729298ff90c30f76442873cadd86b0e2ef78649200ad715adc447143a804456

    SHA512

    3a71909581b1c4a148c117f943693ab080f3c5e7ba711638e674651d678fffa8a0ec637688526583ca1db8b08ab9fbbc9cdc5f8972d55fa3202d3e38d481c5dc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fc66c712c39ee2310b052b2693377fcf

    SHA1

    e152b66e699e51150fe2bfeeb48e4466dd6f0add

    SHA256

    34969224dbeea289447e7d3cfa0c86932a325c053b0afb80426bc22b7aefe60e

    SHA512

    44f0cab31434d87b5763003e321119373c0d1ac2d442e59e170502c582e3b6eae5e7f192f2f06fe0d804554472632f1a639760c6e0ee6fa91a79eff1b296c578

  • C:\Users\Admin\AppData\Local\Temp\Cab1854.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar18F3.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1668-13-0x0000000000170000-0x00000000001A2000-memory.dmp

    Filesize

    200KB

  • memory/1668-11-0x0000000000170000-0x00000000001A2000-memory.dmp

    Filesize

    200KB

  • memory/1668-0-0x0000000000170000-0x00000000001A2000-memory.dmp

    Filesize

    200KB