Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2024, 20:50

General

  • Target

    36bd2a93f18b19139564904ededa008f_JaffaCakes118.exe

  • Size

    495KB

  • MD5

    36bd2a93f18b19139564904ededa008f

  • SHA1

    a83180a69b4b06d1d482f2311cbaa1a734b5da1d

  • SHA256

    bc1e43d79968ab8cd31b28c30cf02868e4c1139fd453175bf002ef5639b00a8d

  • SHA512

    3250e8ddd0a3ac0c7aa147d832949ea0b5dd8eaf6556ba23bec26d317e357dd750a442baf0a8d4a6d0bedfcf3f9fec00dd0b936f9c887af9c6ef8455118245bc

  • SSDEEP

    6144:Be34R2QYNzh36dqXEVTrnCRZG/t7FTBqTzP7n7O7L6K2Bfo7pn:525zh36VVTGf0ZTsnz7O7L6ju7pn

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36bd2a93f18b19139564904ededa008f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\36bd2a93f18b19139564904ededa008f_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2404
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://pf.phpnuke.org/s/5/4/54423-54424-powerpoint-to-flash.exe?iv=2012100610&t=1728679833
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:264
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:264 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9dcf055dce8d58cc97f41d583f9b64b5

    SHA1

    1c7c9434c98a056fcebca059a91b6e2e7a213b82

    SHA256

    10d133571779cbc4e6e70fda41f79c50b899c35563a64a40ed91218444127feb

    SHA512

    787dcf98511b6e3398235879c1ea003767f567a8b01b4bec5ef197a24a0f564fdf41f5ec9e2edc74fcbfbc6d43f33c3175ca3ac7e7f021adf5a9de628b27deba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    392ab226ececdcbe7443c3ab80a64290

    SHA1

    88250e57f4d15a469d9e6026eed643e23c532025

    SHA256

    3e55b15ce4b8ce274cd85205a72cf72ab30a3d525e9681f094083ed0cf5797f1

    SHA512

    427d36665e822228f6f6a77e1ab52ada6faff73c21b43567dd6e24bbd22736303306fe789263ae6ed3a2ef43c0fe2729b2e52f09979da727e392284800af7e28

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cd8dd8405756a071e78d2ed4735b6888

    SHA1

    d29836e799a23c13cf653e5f2b42dcd7c52cf3f9

    SHA256

    c49c521b3f946085dac51bebd5e81e2d3079b3e0af33c815fbc6eb444d0322c5

    SHA512

    9b02796269b3e895a976a757af2d7121a32c5e24727141587c572c015d13a0d415dedfcc274855dade47b9fd17824f3047f1431e2c9f2c2bcb83bec990aa0437

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    89f04cc14c2625c21f7f6065892c0d7a

    SHA1

    1d5dc1556c183e23f4fb03e202484187ccd6572f

    SHA256

    da09bec45adc13cd1a70da87697fb64dab4a224b70f8973691344f2a5563ad53

    SHA512

    d081875f65f698485a1012745cbedf801c13663a8377098076b799f17bb41ac7c6ed9c25219a52b243f83c8a92460c41363535912b587385b38115535fae1ae8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6cfc1daed1310b919aa392342aeed6a3

    SHA1

    560f5a18b8a1ae1ae323fcf94af576c14d54bed2

    SHA256

    5762ad8e566dedcd5e058f66d5e18e8f7d3f8f0228f4d2571e8171b66a2b1927

    SHA512

    9866b5267a45462792ee44aa6f26ca2e968dc21526b62da0920b42039430a62ead7fc454924bee670cf0ef4f0aa946d9b84c63ba0befa6c85c4b4044cb6de9f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bfac41affa7d2fd62339dfc4bdaecfab

    SHA1

    d006902b67df393af73b85caa7aaca33b49aba52

    SHA256

    1365701eba49a02a631c354bd21603216e47c68daef31176c4b7883e2502d096

    SHA512

    62884dc4d158f6d03337c5b797cb39d35d67b6ec6891e8b5f42628a71fa845a7590a73ad904fd9cb8f26d665609145a6c7f9bf00325e0903423a734c0252ce2b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6b92738739d4e8a8591956903b6ce32c

    SHA1

    9f8ea6477868a6a33beacff184ef7267d10c2e89

    SHA256

    9e25864517e9fa036330da2c6ff0474134321bb6cecea13907570f10c0572e07

    SHA512

    b3be595be88b1713cc8512df2b2be728af87f03ba9f52274ba2eea1231f0a29d3f52ff508c17c4b9d3135048345a86dbb454e8325e2a5897f9fc6bea76943eb5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    20a3a6fa5ae2909ee66b7a4156f5cffd

    SHA1

    67efa509473468b5cabbbe95f480168ce50553b1

    SHA256

    2e5c565eb84120ac5c93be293e008619018de15726501fc52a0ce6b54beb379a

    SHA512

    a14f077eccb5c2797c77ea0b36e544ec7c30e6e8edebf0aff5c672fd66452283d572f77e4e4b13faaccf2a70705574d60f5e1cf00ff3919e23941667fb4ff018

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d42a6cac36b40e36d13ac85d7e2778b3

    SHA1

    42b76904d8e3557d2c5a3fd379cf8338ba703a40

    SHA256

    b8fa06e6beaa374539bd9fd136897c8caf7c4a5330e15bf4e38e9eb6c02b11a0

    SHA512

    f4ed9625885b4f6a197aa21663bc973bfbf43dd1cec00f8377e937eefaa66b8c69a1975795bf32e0b57f4efeafd2929965e4f1f02b620b26c7dfbbea633b8c91

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9d00600464398c4ddab4578d9e8ad8ff

    SHA1

    94b8171f56f865bc853050f2ef3b37d6dc0b9e5f

    SHA256

    a0575de937c98cc95fdc436a5d8032e6dfc4714c4683ab0b263fe377eba0682f

    SHA512

    35c2f0859c90cf7cec8a3820f7d4856c99701ce59a5c030a7cfc162eb91957dd79b011633c454fa7162337fa9c1ad624adbccf5615c924b20701412cfbe8a571

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b4538a35a07fa51391c9a993d6dea39c

    SHA1

    07dcc995fad1ac6f411e6bb9e2fb56ca9589161f

    SHA256

    2c90dde05ea44965d1fc093304daea74c2ad2727549cc3e354d3c8dac2275ff4

    SHA512

    6b2b0dcd7d3a76e0ba33185a8a8c47dc4af7961a2b72a986f99b750f368c3a0c36f2a8daf7776affb34e64831686288c73fcf0e01640bb07ae7b4af0ab1696c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    99441d7aed2982b8210ba379ee0da23f

    SHA1

    7128c91905e7844b01b83faf05b9e2c9e7405e03

    SHA256

    f96b61935be941bec61f6e31cf77a97f7115096551ba7495ad520148184adbd4

    SHA512

    ed3f6e999c1259ff253685174add6952a8a97d3fc71353a1020e1186ad7705aaa0685e53bba1a2f2dbbd3384373d0f0f00008ef29007afbcc9c59af5a6eb2868

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5586f19ce08de06662443b78270a1fe2

    SHA1

    260cd6b7444d1d34878e54995662427cdb44bc70

    SHA256

    ec73e10e194bbf8bfaf13f4017554d3368f43f14acc6f54f71acdaec32978c31

    SHA512

    158eb17bb8797b11a6e46baaa0f5787d0397b176837086983c109e9132dbce594120508af5821f18d42639fb8d08e454d6b2587513c55ae6e0b23f2659b4d499

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    79f24fc1449f48f7bbbe7c33117d7957

    SHA1

    4fa7abf6dfe72c230a7858d44202d758827bc3e1

    SHA256

    0e3ccc54520043a96b79064ca5cf3895898eb110c101fa93bd58529b4df6c4df

    SHA512

    107711342b11437de989c49c541364c5aea87f52e80e44f79e5361fc1d210d30690c3459e368530b27fa95d08e472185080a2f5ab397d4438c87f26dc0787229

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b7d170c844f54243b6caf92447f6585b

    SHA1

    35950cd5c06b92cbc2ed94bffa282c27d7feabc4

    SHA256

    827e85a8df89085d75225dfa5fa410c47479a0b94699495081864ba97f8832bd

    SHA512

    b841bf02507ab4be2738dd50fbf08d5a3216ff0c76887d08f0de53443993ba42db84f1490814a154f85dcbcbee0b048b381a07a60954bb51a8091322231414ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bb8c82488aeb6c932ea2e8305797ddcb

    SHA1

    22c0e6db329403e949035c91fc2526b2016f9f12

    SHA256

    8e4cfecb36a21ab134e2606530bff66e433531d6af21681c25d01a70f66484ba

    SHA512

    9d0c21c282c9dbcfdba40263a6e851877c298cae451f59cf6e3e94215083990605ecca8579af2b6eff56a0891ced6b0393b5c0e32f7159aab45c70d57a5415a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    59ed104b37489a5b7b34739c383e8bf0

    SHA1

    e409e2c381ea07b87d9a6428389937481772e231

    SHA256

    f1be01a3c206e1a4b667d143ff497ab87bccd1ecba4c89bc29078a1de3e67665

    SHA512

    09a4ff9239e565c3e5ae5c030316e0c866b6a6c11fe7cd586e18058e39ccc399b8a546948c3c5c2e4b9b53fe0afea1b8ffeeef40567b6a577de17c5002430a31

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0f3ccf797310f370dd5870765004612b

    SHA1

    30c967b39c5140454266a1d97fe373fd5e141521

    SHA256

    f6bba643687e09b814dcf9ee88ff16aac2a86eca48eea1b5505522401eff5e29

    SHA512

    799af3a0fc9d2652a1c66c1cf323dcc28dbaf2e93f1921901facb56defd9a77a84d6eac639ff5395cbd52c7778186ce9a769bea1d5b3fe6e5182b541ffdf891b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d3f9dceac25e62dadfe790e30bba4d75

    SHA1

    c7c3828475da873f1d888b24021b48e8ff2d2366

    SHA256

    812f98e77033c6f45e322129941f8fe37e4973d04a359350eb18e487949d3e59

    SHA512

    44843f86a0b4f6dd97fee497b70b1e500cd6867a6f9f93087c99c274a30114195f77f52dc3aa5bfee0fb0e13588e99cadcb35c51a3f599b4bb819358d31f0b35

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a306b93baccfa903bccab8ebbcad28cc

    SHA1

    9539d8e22066fb5771b6181e2c7261e5a85d1bdd

    SHA256

    24f678ba8a5f5954849aaf8bf48bd636d3d53e433ed06c63ff9c780ddb0b8511

    SHA512

    209a01ecc5867baa55759471717b4db7478527bb6318debbf44ae418a9e84039c56044fa5e62af73b2935e73818fab511f991239dfc9ee5cfdce8d2df37d27b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1db292093022df363e16f0e03d99f8a4

    SHA1

    241301be9688763ae34ee654c58bc3bd76eccfe3

    SHA256

    4aa92600f59e34a3e9393e121ce8c61b4f867b944c42c5bbf3717905ae85ba51

    SHA512

    cd8f216b91e6af124861ffe2eb32ac4df327cb6f14e8da87256b43a7c7dc262c258c4ad0a7550c629b2df5ecfabb08c6e0793fab027a1f8b1148d54133baf7a6

  • C:\Users\Admin\AppData\Local\Temp\Cab3852.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar38A3.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\nsjEB4A.tmp\ioSpecial.ini

    Filesize

    1KB

    MD5

    8a32f5025d7c88858aac0b591fbf236c

    SHA1

    22183b5018e8005500d37e8c97e8d8bce8e8fb5a

    SHA256

    cffb143246d362a2035dcb9411efc6ddf8980514703f0520193c56157c73d401

    SHA512

    5fc1e7d1a1633e245f1cdf13513731acb8a50a46bc54e20051c3552a6a12bfb15f909cfa0a25a2c1dc7363901f3161b659b3cfc00fb17563cd3f6cca57cbcadd

  • C:\Users\Admin\AppData\Local\Temp\nsjEB4A.tmp\show_page_toolbar

    Filesize

    1016B

    MD5

    de86f93cee23f29c4146d0490847826f

    SHA1

    cd01e4525e6b2cb3e6ced0589af4be9c2d0a0826

    SHA256

    b7b742ad61715e695a56cd0d1735d969bc7fc2c68899d823fb3ccc677a966ceb

    SHA512

    3b00c9aa5f3286e963c0ab8e3a827d7382d847ec68313f1a40088d68d0f6eeee61d6a56edc8c45f0a963c80afc9233acaa6fe75123887647ea88ba1aa9222565

  • \Users\Admin\AppData\Local\Temp\nsjEB4A.tmp\BrandingURL.dll

    Filesize

    4KB

    MD5

    71c46b663baa92ad941388d082af97e7

    SHA1

    5a9fcce065366a526d75cc5ded9aade7cadd6421

    SHA256

    bb2b9c272b8b66bc1b414675c2acba7afad03fff66a63babee3ee57ed163d19e

    SHA512

    5965bd3f5369b9a1ed641c479f7b8a14af27700d0c27d482aa8eb62acc42f7b702b5947d82f9791b29bcba4d46e1409244f0a8ddce4ec75022b5e27f6d671bce

  • \Users\Admin\AppData\Local\Temp\nsjEB4A.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    325b008aec81e5aaa57096f05d4212b5

    SHA1

    27a2d89747a20305b6518438eff5b9f57f7df5c3

    SHA256

    c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b

    SHA512

    18362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf

  • \Users\Admin\AppData\Local\Temp\nsjEB4A.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    9384f4007c492d4fa040924f31c00166

    SHA1

    aba37faef30d7c445584c688a0b5638f5db31c7b

    SHA256

    60a964095af1be79f6a99b22212fefe2d16f5a0afd7e707d14394e4143e3f4f5

    SHA512

    68f158887e24302673227adffc688fd3edabf097d7f5410f983e06c6b9c7344ca1d8a45c7fa05553adcc5987993df3a298763477168d4842e554c4eb93b9aaaf

  • \Users\Admin\AppData\Local\Temp\nsjEB4A.tmp\NSISdl.dll

    Filesize

    14KB

    MD5

    a5f8399a743ab7f9c88c645c35b1ebb5

    SHA1

    168f3c158913b0367bf79fa413357fbe97018191

    SHA256

    dacc88a12d3ba438fdae3535dc7a5a1d389bce13adc993706424874a782e51c9

    SHA512

    824e567f5211bf09c7912537c7836d761b0934207612808e9a191f980375c6a97383dbc6b4a7121c6b5f508cbfd7542a781d6b6b196ca24841f73892eec5e977

  • \Users\Admin\AppData\Local\Temp\nsjEB4A.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • \Users\Admin\AppData\Local\Temp\nsjEB4A.tmp\UAC.dll

    Filesize

    17KB

    MD5

    09caf01bc8d88eeb733abc161acff659

    SHA1

    b8c2126d641f88628c632dd2259686da3776a6da

    SHA256

    3555afe95e8bb269240a21520361677b280562b802978fccfb27490c79b9a478

    SHA512

    ef1e8fc4fc8f5609483b2c459d00a47036699dfb70b6be6f10a30c5d2fc66bae174345bffa9a44abd9ca029e609ff834d701ff6a769cca09fe5562365d5010fa

  • \Users\Admin\AppData\Local\Temp\nsjEB4A.tmp\inetc.dll

    Filesize

    20KB

    MD5

    50fdadda3e993688401f6f1108fabdb4

    SHA1

    04a9ae55d0fb726be49809582cea41d75bf22a9a

    SHA256

    6d6ddc0d2b7d59eb91be44939457858ced5eb23cf4aa93ef33bb600eb28de6f6

    SHA512

    e9628870feea8c3aaefe22a2af41cf34b1c1778c4a0e81d069f50553ce1a23f68a0ba74b296420b2be92425d4995a43e51c018c2e8197ec2ec39305e87c56be8