Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18/10/2024, 09:14

General

  • Target

    569dc1d0bc47c22c4cdaeab7f9d37d9e_JaffaCakes118.exe

  • Size

    1.3MB

  • MD5

    569dc1d0bc47c22c4cdaeab7f9d37d9e

  • SHA1

    d023a19e8c7c0d80e23dac92c04cc7ff2b9f2224

  • SHA256

    1e9ec92879970e96e72258019c88fe3ef82ce6721cab7d524b94e2129c76e78e

  • SHA512

    2e4d281500935e8fe39217f3de1991bd0e58ae8c75f838f33e40a66799206af1b2307a21a1a33d8c9329e04e729fff138c1ce6ba7d7ca81398e56bd0a92dc54d

  • SSDEEP

    24576:hrJKUKRvzuei/bc6EGn5u5TtyJ8adjCzjyhhcDkPQcKiwMH5yUKc5thLfrXa7sju:h1Kbxzur/bc6/nRJ/aOheDkPQcKiwMHk

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\569dc1d0bc47c22c4cdaeab7f9d37d9e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\569dc1d0bc47c22c4cdaeab7f9d37d9e_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Users\Admin\AppData\Local\Temp\crp2492.exe
      /S /notray
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2668
    • C:\Users\Admin\AppData\Roaming\B1Toolbar\hpet.exe
      -home -home2 -hie -hff -hgc -spff -et -channel 162341
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Suspicious behavior: EnumeratesProcesses
      PID:2812
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.4shared.com/mp3/6-rcykZZ/tribo_da_periferia_-_aniversri.html?ref=downloadhelpererror
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3024
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1492

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    9c32a26b2a40cd978eddb4af42a1cf7e

    SHA1

    dca008e905cc14737f9d78fbae6b3eb9d537fe7a

    SHA256

    81d256f5161ac3cdb0d799ef0ab56db485c07ef0d1811af02aebbdb33e8ca6b3

    SHA512

    69d2bd67577b74332d3cbbb96c78e43e302cef620785096081d90e3df52564374796b86584edadef7016042f4f1d0a9bc71fbf7b8c816f45033dbc1934a12b36

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d4eb716dcd125481ca89b637828a376e

    SHA1

    6bccfc87bdc04391fcb63cbc3120495bfaed2532

    SHA256

    f1d5cac0b0eeea42f17ad339c8fa68c43502d04cd59e66947a9a17dfffcfe4c5

    SHA512

    6deebe36209fcb6ab74191633c6f8416039519ef0752be101a2be6dc14de39a2dab4716b5415faa51c359d606ce572ccff42a559d0f10914c3dc383cd1c5d6ca

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d30eeb033b10a07e342516e82807f652

    SHA1

    e72da44fb15bfba8c1a9b4c6e35ae61ad2a86180

    SHA256

    fb72afcb58ee53f7c6191e12e7e28de969b2cefd0258bc1b46725543cec5227e

    SHA512

    d3fab133f988e5453a92f00066e5755dcc009ecdaac34860ff9c18a0688c07450b35d0ac688e831d853ae84990adb9f550d4fcb3b2a8c8a2c7ededfd5feb0c34

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4951e02074513134a2ebabaad71ae448

    SHA1

    dbc6d8026afe578d991029da577acf9ab64b55d9

    SHA256

    8d015510cfb52f88bf9210cf9d93ce77566e8ee53925c313dc115f23cfae0940

    SHA512

    5f20ce4d0013de2f5d469389d268359b701b97c5f655ebd73b956f387478b856a2bdc2e3c6842182df6b9de1006234836dd9f9c2b8691e17b784109fd1cbe67e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f9ceec9eb9ddfc431300cdabadd7db43

    SHA1

    b73868b4581916aa47c9e60c24c7c02f71297578

    SHA256

    d57c990eb3dd69c18ffd5e83d0102416e730ddf60ff0b1c7b2ee2af0c1f336b2

    SHA512

    b90f7d0572fa7c0d745392431e2d98f1a2ad67a88729a394d0a515d5c91afac7d204b386fa74e43254501ac0a038f18520b3d7e207ce4174747b2eacaa304257

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    00b95898a0f7290db69e3b397d733e7f

    SHA1

    844fca8ede69af445740d7e8301fe2e4b2999d98

    SHA256

    f91ec2b13a822f39dab881d28f815679dcf3182ae2f0cd506ceee37919bc542e

    SHA512

    86bbde1794f813d0b3877cb13b087fb9844cc95275f7521c012a5cfe57899affadf1d9d74e5112709023f8be5d44e10bbb8b3cb7346e2bf1187773bda42bc3d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4f07d44c3d0662bff114055b52eead37

    SHA1

    78d38043b82e5f0ba19e0764563dfb19b6064449

    SHA256

    ab4a97bdd34b5da8fbbd775a548744a83d64c1a69f6ac0363e4a69bdb420b241

    SHA512

    e7f2f7c12eea7a2bd340c46e2d8df6580b36c8a2ed2159effcee4004f77bec496dadd89e98cc97ef8696c1691017e629e1f8367c564789cb0a4617ff5d444378

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f2cf9485cf6ea07fbb1b7168b9e3fee8

    SHA1

    284d5ddbd8a41020f18c599e10778cfdf9f050fe

    SHA256

    240d37d9ec6293961259c87e4ff46454c6cb4c84095f69b3fd04bff27af71d1f

    SHA512

    8bb853e323038e709fe2a15f44e1f017919f362ceee65a87aa1bfe61a73d7abf3872bff69e4e55dee5c192c955b965aa53a68bd49d006901dd879759afaaef49

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    09ce31f9820d422d2a8cfe4c7ae557c5

    SHA1

    e805058b5df849c710533a687343a6969d6672c0

    SHA256

    e1ed3ae727cd33addb54c732f0b9ff972f0582d4a832784caeec5b52d71a9307

    SHA512

    d7f92dda26e915734ed6919c0e47e35a9165233927f078a96663c6734ace11a8f59f4e59b98e1e826bb7394a3aa7b4de6564fdce097309f8304852bbfbf36d86

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8c1d702db6b9fe5e630df5a43829e159

    SHA1

    1e680dbdb7bf3b2c0c6874f4c3e626a50c081d8e

    SHA256

    93c8777d52c1bcc3aa039741951a78036ca8c3569cb3221c466a7350ecc1f4e2

    SHA512

    92ff50e3f452377e00850ea5b6ca154d9b062faf5d2be1801292b50e4055ee725ef69bc3209d5eed823b3b0275c46c2d5affc7b2cdfb5f8f693f4ab4eb802798

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2a66bee05868b60c1d944d9464f79b48

    SHA1

    6082f90856b3553f1b7184c0229b5834aa94a52d

    SHA256

    6c3f5f8675fbab7fd2395311433a9577444562229cc435dd13386be7b14b3801

    SHA512

    be8d3532b87e98caa6fd0df89094ae12259994a758cc7da543a020e0e41a02638ae5516cb372fb9085107dce7b3718dbcaf7b089d9ecd6ce4eb9766fe1c7278c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    49ec9be76b263c6d7dc604b0c7158231

    SHA1

    185ccfbc3a3238ac85c3420806abc9c2637de8c0

    SHA256

    7948ab353cc3c4c6467bf7944ab63b31703ebd647033a081bae999d2a6dc3b37

    SHA512

    dd1856e2be241e356a9622134b9916645c67fc69bc5988f48392330c2f7572e80c575bd01c6cb1522e5134c9764f9063b24c87e38f5832da94a79b067d04756d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    42760cbeb26d2fbef852770a26b02526

    SHA1

    43837752d22afc52e8d84242ba387f39e23919b0

    SHA256

    335c35ecb25d0440b61ad6261faad172b039bf984b94dbd300d37568d7682288

    SHA512

    6a0e97a30645c577b37b8849ce12cfcdd8bd526f0b30cd005835c1588a9802347374089b096051a4c71bc0e03d17cd6e2a86f71ca1ac06668d60bb2ccb7fc4bf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    91ad152a191f324665bfa8ad728d816e

    SHA1

    18615e29e099f3821b1913fe3aac89b088185433

    SHA256

    fa4f78df521f7fe0cc68d3aa2964d58169caeaff85abcb5103abb5912a1c10b7

    SHA512

    684d4fa9f5714981fa4425f40627b7945541fff6f779141d6a94353386c3027db5d1b0bc23cbe1a20bd97a79aac35429b986a59e0e106aaace8970093299e2fc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    15a83867f9631f4269b5ad15734e941d

    SHA1

    f2444c2d7aa4f62b46d47e5b080c02da8c88ff77

    SHA256

    9b61127295b77b3c09011bc915d09bc5c4970f977348a2c81b31030a75a090ec

    SHA512

    952125b5731e98f2f0f90df46941266b5de37a485cbb895763a125beb50f0ab1d683adec83fcc387f66330bf0b6d95e64c696def2d5ad09638c9001e1780b639

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    7b2e6fd03116f91ab2d60f3af813b17e

    SHA1

    f50ac58dcea8e3acce864343581d1233a69a6a4c

    SHA256

    3e00ed2bcea5725765eaa38aa82c35d56ddf0184fca82e3e04d299b32bce79b2

    SHA512

    85784bd74180ba01a639adc019ae2a63fa9f9b9e622ce79a17b14ad08228b8211711a80fd7dafee44080c6bef4f408af9d26041c8eed249e23cb860950b96bb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    823f1f117e4efd141062a10e1bbf6214

    SHA1

    4b1b78ae047bfb2d2614566c97759532996200cc

    SHA256

    47b9801704895ebcc4aa517d932660c8e440e4dff7b0e154e210609ed6d2caac

    SHA512

    17c95d8639222ac1a07f4b162559951e1d700412ddc532523478713836e7c61bddc8f4e5dfc8de7fcced25a937fd17001b18facf63ac07c2b61cb52a53938e52

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    535862d1a1af160bc4cd7e33c168acaf

    SHA1

    6bb7ea796d51d59508a95a29892862d5b9d4be24

    SHA256

    2f91ebdcf72b5135a1347e4227e527ba76b8be6f1a992efdf6945f211dda18c2

    SHA512

    3fe83dfc0f0b50fff2e07f58886f3b60bbec60ad4ad354ebc4d68dab85da1125b8176aa4fa8e995d49e80deba0f59200eec0cd7d31a21445947770fa9b66fbba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    85424d4a0ab03bd3a68c756fdd600039

    SHA1

    521388966b900016926075be26d6503369a16c62

    SHA256

    1e72090d39806b0be58ed34655d77437ea1c63ed97a14f007ab6d8fe6284ff2d

    SHA512

    4a6dcbded9ace1dbe68f4e2f6e8f568280191c3bb573cbb4a67d7a3336a4361c141dc0d0c70ebfda0d7654c1b77c8670f978d244f4617bd8bde836cc8fec1ea0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4856ba1db8419bbb5dd83755458d2caf

    SHA1

    34809d0269328303f52ab10fda2dda04b89e30cd

    SHA256

    ed97bed261f7b9edd36c5027f2dfffa77dd9a86ed2895d6d521e7075144de25a

    SHA512

    6b372efe0c175013befa98a796c00d1707d3cf44f1d5d8a2bb34d1d29501a2c8bc61a5cb4f85a46167b1c9c0e1e7832b56e8c9c403b2ebaf91641b8bb32b9192

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    17fc23eea53867a4eb41d880b2f0777b

    SHA1

    a625790d8417a0707baaea61eba84a0bff35aeaf

    SHA256

    006ac4c59878bb26a0ae0eb47af9407e355815f4ecc4e31aff0354e52baf564e

    SHA512

    1377aa675cb56a23ceea69e6d8a7816d9fb407974bb4be5515f26dce3000a4555fff1a8bb9a7edd35759a6066ed6eb0a1c1352ee755902c7dd98f4f413d750f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    31dfbd41ca7b4f52196244e0c002d0ea

    SHA1

    bf3eea8c72103e41d0e84b844338b5d4fd9f1891

    SHA256

    f4a696ce2b85c5f26953fe03db8e739103990ed64793af4606b4827473ddf62c

    SHA512

    5487e2a402fa35cff0861a0ebee816b261cea084f58c2c2f863f2162a520717fe2bfd9f9a26a1ce43062f0d455e3df8c9c303646abbc31fb21caecf8ae61206b

  • C:\Users\Admin\AppData\Local\Temp\Cab43D7.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar4437.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\B1Toolbar\hpet.exe

    Filesize

    331KB

    MD5

    a3e93460c26e27a69594dc44eb58e678

    SHA1

    a615a8a12aa4e01c2197f4f0d78605a75979a048

    SHA256

    3a81cefbc928fe136056257b8b57733164f2d1fa9d944dc02897b31b171335c6

    SHA512

    39d17b7190f3ff5b3bc3170c8e21d7bba5c32c0f55bd372af2e848ff1ef1392083218a562f3361fdc2db95e4133a19c4ec1cab3e982174d76b8276358dac6530

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\9XLYKY2B.txt

    Filesize

    70B

    MD5

    bc70af0e43787d3ae2c64ce853db263b

    SHA1

    8e9d3ad2a682470e5fe93a8da6c94a33e64007b6

    SHA256

    d1196a2b671b8a7dd5c99a7f2e2a9e5ed5c20399bd8d7d40808e0cf2096ff08f

    SHA512

    d5a9911d9f0cb175f95842c6e8292a3c2cbca38ee47be899164c44401f7d290349ed7d8e2ff91b0e66313e9357521a7dbb73da6eaf120cb9bc6663dad5d408e6

  • \Users\Admin\AppData\Local\Temp\crp2492.exe

    Filesize

    806KB

    MD5

    14ec55240339c1239a400fbb9bc060a6

    SHA1

    428982e064e12a4ebc3dbaab1f205aa17ab6b7c3

    SHA256

    9755e30cf56ab363aa55a4b6a74896ab41011c448aaa6c8d658de97c231ff084

    SHA512

    56074ff17160fb81aa6e6f0e408c4e91f4e9a8607b0d8a21248cc3b0b632a461f4e2ea4deaa1918cb29c114bb4008f10ce49e32c776a956771b77521bbbbc29c