Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2024, 09:28

General

  • Target

    022cdd46e12a85a8d03339eba5b19997_JaffaCakes118.exe

  • Size

    463KB

  • MD5

    022cdd46e12a85a8d03339eba5b19997

  • SHA1

    efdd42cddb3acf19f5304e9072cfb5fc7da6d32e

  • SHA256

    c8d543bd6e7932a1ec3dc31da1743ff78878eff55a741d276ef8f3f5bae73575

  • SHA512

    23b9f6c3bff1333939861fa231f5b40652bc15e40f0c04ac6cf89326ce65c579e02842c5f9fdb6117d237c240d446e9e0e93559002c0176ad12ac4a307a5fe69

  • SSDEEP

    6144:47kWcDpi78KSrafqV5areuyFwBqgmGNGXN/O8OCLF1Lkl1QMyBVk/7bgRmg+LAKG:47lc87eqqV5e+wBV6O+K/Cm1Lxgp

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1156
    • C:\Users\Admin\AppData\Local\Temp\022cdd46e12a85a8d03339eba5b19997_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\022cdd46e12a85a8d03339eba5b19997_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2092
      • C:\Users\Admin\AppData\Roaming\ctfmltMC\mounINFO.exe
        "C:\Users\Admin\AppData\Roaming\ctfmltMC"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2952
        • C:\Users\Admin\AppData\Local\Temp\~16EA.tmp
          1156 474632 2952 1
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2604
  • C:\Windows\SysWOW64\bitseout.exe
    C:\Windows\SysWOW64\bitseout.exe -s
    1⤵
    • Executes dropped EXE
    PID:2708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\~16EA.tmp

    Filesize

    8KB

    MD5

    86dc243576cf5c7445451af37631eea9

    SHA1

    99a81c47c4c02f32c0ab456bfa23c306c7a09bf9

    SHA256

    25d2a671e1b5b5b95697ac0234ce4d46e0d0894919521b54aabebd9daecf994a

    SHA512

    c7310524f9b65f811146c1eb6ae944966351ac88a95fbc1ac422d8810730e5e212a7e28090ad758ea23c96ba38073e7fcf42460575e7f09dbc759a45c5d5a4a4

  • \Users\Admin\AppData\Roaming\ctfmltMC\mounINFO.exe

    Filesize

    463KB

    MD5

    c879637367dca33847c5ca859041b92a

    SHA1

    ae84826a1916c0f3be187e802bf43a22684d085d

    SHA256

    687882142f94841e1db327888bb4f0d42c89429ec73800b21234b739c4f5f71c

    SHA512

    64821fda788d96f1669018cd2349d28020f17b85b3fc36c236f9df7d1eb6d427bb7c6e18f14091839a930f1fc8e02f1d2bd88e1472e577d9b7995da70c7848fd

  • memory/1156-23-0x00000000044D0000-0x0000000004553000-memory.dmp

    Filesize

    524KB

  • memory/1156-19-0x00000000044D0000-0x0000000004553000-memory.dmp

    Filesize

    524KB

  • memory/1156-26-0x0000000003D40000-0x0000000003D46000-memory.dmp

    Filesize

    24KB

  • memory/1156-21-0x00000000044D0000-0x0000000004553000-memory.dmp

    Filesize

    524KB

  • memory/1156-30-0x0000000003D50000-0x0000000003D5D000-memory.dmp

    Filesize

    52KB

  • memory/2092-0-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2092-5-0x0000000000380000-0x00000000003F9000-memory.dmp

    Filesize

    484KB

  • memory/2092-11-0x0000000000380000-0x00000000003F9000-memory.dmp

    Filesize

    484KB

  • memory/2092-1-0x00000000002B0000-0x000000000032C000-memory.dmp

    Filesize

    496KB

  • memory/2708-32-0x0000000003D50000-0x0000000003D5D000-memory.dmp

    Filesize

    52KB

  • memory/2708-31-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2708-35-0x0000000003D50000-0x0000000003D5D000-memory.dmp

    Filesize

    52KB

  • memory/2952-17-0x0000000000220000-0x000000000029C000-memory.dmp

    Filesize

    496KB

  • memory/2952-20-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2952-22-0x0000000000340000-0x0000000000345000-memory.dmp

    Filesize

    20KB