Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2024, 17:02

General

  • Target

    433e41e1e3f88a3f7a22452f2dee350c_JaffaCakes118.exe

  • Size

    560KB

  • MD5

    433e41e1e3f88a3f7a22452f2dee350c

  • SHA1

    ba7ba63d55cabaaae39dce2264ed85c4b609cd5a

  • SHA256

    9b3e785280227f40fe9ab2b373067c7d05ddf99804cd7577528a27fc3e3069a0

  • SHA512

    407a31ff764c5f30b7209606cf8d76ecc2a80281e8191453c95b00a1771da1574585d33b94b912545929f26f7ebcb89794c90a9424289b88c12da0f860d7823a

  • SSDEEP

    12288:9vD+lBHns62Ou/35l9SUi4ZoS2u34ZLqCl8NQstfUh:9vwBHsJOu/BS/PS2uKqCGfK

Score
7/10

Malware Config

Signatures

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\433e41e1e3f88a3f7a22452f2dee350c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\433e41e1e3f88a3f7a22452f2dee350c_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2312
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.wmqq.net/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:560
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:560 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    55446ce4240e49e2772a2404ce7fffba

    SHA1

    4f499989bdff1e81f19463118c75e5c81860dd72

    SHA256

    37171e488a68170e35395bd41de7084dc3204df61b2c916927b0911715e499a9

    SHA512

    6ca152b00e1b966b2ad064e8338cf73e6879bbf3287d1de8d1f53ae98a2e98741a001968b89ed1713608ee4d9cac627defa9aa3e7dcd74a3d89ca0062e8861c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    060cca754ed891a64cc6db666a657120

    SHA1

    6678013804ac0fcfca9cf4571fb7b0b0f476551e

    SHA256

    bbe1a3edbd322f2e065b8b7f482d6ccbfa3b37f25977f2590443e65cf6f34088

    SHA512

    0f25e52551846b2ec56cb87fe8dbfe3417799ad5240329505e0d6a5f8c0e948047da71950b6ff0bc46d09e5e8ab9ff58679ed06aa15cd2c3c09e7adef9e7b6a8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a162ea2fac87c1c980d2871690aaafb0

    SHA1

    42c33cdac917e27a30fa49824785945006277654

    SHA256

    c0526c664d4f26f36c12df519e5d13c71a028a2fca53034decfd927d3d05eb52

    SHA512

    4c304b38bad24aae75e3b49a75554e35be4a8213b99ac0637d00084476865287ed7cd16068be1144cc5cbb7ab3ffe8be72305746dc3adaa83eec590f6bafdd26

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3fc27cd14057f6e2a7740c4bf9d5f8ea

    SHA1

    5413489e5447ab0c5998a5cadde494a294897f9b

    SHA256

    dcf4858edfa487cf74a575ef008a90640f430c06dab8eabf3bfbff1c37383caa

    SHA512

    e448a37b3fec3a6e305c868725cf8ef76662c8976885ffdb6effd0496c91be03f8af04b38e6c8f983e87e63e4475c7048688569066396edc9f23afd2e6b41974

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b5b2ed23b93bb40255bb857eda22daf3

    SHA1

    a8a8936c2a0a4380dd423c89a9d8351947f2dff0

    SHA256

    36bcff29e8aced941a281c0bea47b331dd5b9704eb53b620a341556b0b75dbd4

    SHA512

    c854f649a3fc6262c6015981ec2d2e5a65873304db313cf4a60477880d4c4cfb57856a1b79778cc311916ec8efe523a776664b94b48d8ba640ac0a486e0e8aac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    aa6f35ac2b9a37921c5702403d57135b

    SHA1

    7bfb003e12eef58907d2665608430846f7ac4707

    SHA256

    dbe47815e1016510031623c183f6b66f5f58f3389f3e7cc70e6e2aa0456bee04

    SHA512

    e13459a5ac3fa644571518d4b43908100f99c52c25cae4d1f339128ab35df4f0f7ab861534bed97e137a1afd8707d82941b5c794d04f43b5ead012f2f06c2c3e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e2ac45d99c8553f43f94a86a25c2390a

    SHA1

    6676c629e8b2a91c09f2ddd0853b50f09893d5cf

    SHA256

    8136d01e374675dc4af5de03a9f0013e4ba0556e9006e402d5845a3d31a493c5

    SHA512

    e883898a48ed5a49548911d7ca1d7955f92f3dc34d5534283f8f33992c3ed9ab689e7acf41ba626fc5f7eac05d28bb2e68679b530e6d98a078d4c0ee554f6819

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5aae00245dcb54a80f73e9384152b090

    SHA1

    4605a2cba4858ad5a659744575dd70c4b3ae201c

    SHA256

    6a5fe5a6c6aeeea05611d7e86d6bddae3a85f8bd80edd99262e9a53031099bdf

    SHA512

    309734f5096f5b1300e5f0f840d0a8d386687fc845ed2548fe9af66b1696cd2ae5e235016a6f566195e7f5cd12c9b17746e0c448144d741bd432df02eafc2c25

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a4853e33ad9462ddbbd496fe1cffda12

    SHA1

    2e61905d3a76156934a73fe095219bb2858b6b3d

    SHA256

    2ec49510cac7acf1f69451e21e9794e42ebb0299bd4c975b117f6fdd4a5134dd

    SHA512

    dfb723c9f500306296a3f2939b474f98c2d3a9d4675f4da1bcc5739d608f8c86f9c66712dcd3075abc98aff039056ef70499e9277c8aab42113f1fe5d24e2ca8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0d6321c1a52d24930946cbceac0f8165

    SHA1

    6acc61b579b99c7772174bd4cbb62c996b4001b2

    SHA256

    76180cacbdc5318d389ae81c73f6682bb52b44b00e47e565ae7e8487df7f2268

    SHA512

    5dd52440acf44d895d0a26822f46e691d684c7a932091b95f9c4dc548a0017570aaf1cc38ec2c8e2a98fd3080a6b4c16d3d68160df08e62babcd8e396dc21094

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    57c4dd4084ab1017861450545c420b36

    SHA1

    003f36a700bfc6142f53a1f02cbf94e2a5441195

    SHA256

    b066f50a2ad34c8e449d2ed9ef90c91379be1aec05b3163b28e1138dc4d6f694

    SHA512

    dba0684bb54acd5f34b13673d4c7d0899cd43c19fd8b599009170adc99bb3bbc1efa23ec134bc01e5969f0c6d1551bff8165881fd817241530949bab932bfc86

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ac9f6c0a255a6122cf26e575edc1c317

    SHA1

    461da930fae8a025fc0ff3ae74f3c7ef20dd23eb

    SHA256

    a8c96ec825eb4dbfe34ad75ebb27dd6308c1b67ad2c6828cdf9846224aa05272

    SHA512

    113f15a209e4daf0839cf85f85c295c37e6b8fac191a44fe6fd5cb76bca8a191a6ff8b9485684e36fd2b193b9d1134fa8c240522081bb119739f7400000659f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    152502977a08c4d6f5f95b8e6166f421

    SHA1

    0ed960e00f9ac5b25557093332fe1a897c662c72

    SHA256

    d10484a9b5b30aab9c6c9e1008e931b0a553c21afd26a2488816f282783fce9c

    SHA512

    feb1f43f094e422857f0e879cae5b66ffeefd6bcbbb56d05ffaf64c374f363532ed314e95dbfba8e3a03cfa5dd431f212e301e4ff9905706b6a78b1b81ff7e2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5f3d4e7cf89428e97884cf500dd2adbf

    SHA1

    38f614b0d2cb73824f17755658201ee21c33d491

    SHA256

    c99db0032762e81cdbd01a16e36c94f3b045e647e5b9cb926304ef8e40b8ed20

    SHA512

    18cb18740f7eb6c1b167058def047bef4081a7e652e303f23cfb0d7f9214c437e00bc86353adbedd5274019c09459bfad44723dd32557ce19604e4404b71180e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    fe893d3d7239a5cffe655af5bca26eeb

    SHA1

    4ec25ea257445c017e037eb4bce2e75356b6c276

    SHA256

    b201cd478072a5ebd47c61eb7957bf6ecd9272ed9d0be16e636a2276942a5bb2

    SHA512

    5da0fe6aa7822007c7c8010737c85bacc2e74a81c1bc4840a6608d4875a9f60f1aeb2a3493084d8ea37b732a8eec1dcb82ee5f2a31d7e50ecc30067e7356aac8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7e27cbb9d0182629aa2af6f96b870c0d

    SHA1

    5e621f1049f9afe561092f98ac469aa0c01020f6

    SHA256

    7b95994a8ab757ad72cc9e77dd50ddbc0e99ec2ca679ae84850ba8f85324790f

    SHA512

    cfaa349edd34165b7e08b82b6aa20903979900aa29acc40300789ac5d104f9b0fdcc388442c87ab01c2cfafd2c4b2246c467cd52aeccd163ccb9f757860a0294

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5eb10eb1f2c64bef84a1d29c26e63172

    SHA1

    d7f8f6a1491e55130558d69fdc7aecc97929957e

    SHA256

    6acbb3f98e3f59cb0b3c640db72c3864b4e825867063f83ee0653f3b3a1b45d5

    SHA512

    be3539e6f57da12c86f148fc4b446aecf434443df30818e7d5308ba83236ec2ac50c7d7c8b099780843c69150311c408f9ac4584295b704b9c1a8d9332044874

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    36d1c4ecc7ff28982069092e43ae11b8

    SHA1

    924164e028b9500b2aea44a5ce1a6f3b78107a9a

    SHA256

    cc751b421414a6a5909fe86f0f3018f374378265afda87145a81506840c14893

    SHA512

    374198210b18e32222d5bdcb1c0944627c09c11b8c48ed3bcdd315bc366f54c1d787faa6eeff8d7c38a54eb7854da9b14702fcdca8a878b46608da21d606fa8b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0I0VVMWQ\lander[1].htm

    Filesize

    62B

    MD5

    aa660faaf73383f671697abdfadaff79

    SHA1

    068fd9414c02499d8bdbcfb04d0369ebd1cb1127

    SHA256

    8619c806c0e0a29ff25b7e1ce9fe8935e9ecab6a34ede332197deabe73c5c4d6

    SHA512

    a743e3fafba878010dfc86687fcb82aafc9da0d7a4b212c107e76f13dbd88b02a8d3fcd3f9078827c8d3ad9f1e200611f467068f20114f30eca4a7fe609d9a9e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CXRG2YQS\qd001[2].htm

    Filesize

    114B

    MD5

    e89f75f918dbdcee28604d4e09dd71d7

    SHA1

    f9d9055e9878723a12063b47d4a1a5f58c3eb1e9

    SHA256

    6dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023

    SHA512

    8df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0

  • C:\Users\Admin\AppData\Local\Temp\Cab11B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar12E6.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/2312-0-0x0000000000400000-0x00000000005BC000-memory.dmp

    Filesize

    1.7MB

  • memory/2312-47-0x0000000000400000-0x00000000005BC000-memory.dmp

    Filesize

    1.7MB

  • memory/2312-1-0x0000000000400000-0x00000000005BC000-memory.dmp

    Filesize

    1.7MB