Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/04/2024, 22:42

General

  • Target

    ec25e8234d9cf1388a2d97407d845b01_JaffaCakes118.exe

  • Size

    1.6MB

  • MD5

    ec25e8234d9cf1388a2d97407d845b01

  • SHA1

    0cd7ab43fc060557525ae08a8b0a91a8f4f1fdab

  • SHA256

    e9afb4c74de6824360cdc805a33948c83fd3624ea4fbfd61bbf66314eb77a294

  • SHA512

    2b870d279522389b281f4db334cc3d1e2b683aa527100d06fd961173da7b5b0124f14de778f38e341efea4f59abca8db34eb30884f6376a761000486adca66f1

  • SSDEEP

    49152:0vKyrl7qkuiN0FnnHMvq/IXxsheEnotfw23SZ:0v/rl27nnn7AXxA6faZ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec25e8234d9cf1388a2d97407d845b01_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ec25e8234d9cf1388a2d97407d845b01_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:856
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\winupdate.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2056
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c copy "C:\Users\Admin\AppData\Local\Temp\ec25e8234d9cf1388a2d97407d845b01_JaffaCakes118.exe" "C:\Users\Admin\AppData\Local\\usnscv.exe"
        3⤵
          PID:2768
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        2⤵
          PID:2092
        • C:\Users\Admin\AppData\Local\Ko2FuckOff.exe
          "C:\Users\Admin\AppData\Local\Ko2FuckOff.exe"
          2⤵
          • Executes dropped EXE
          PID:2572

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Ko2FuckOff.exe

        Filesize

        403KB

        MD5

        776a250f66356e53bd5c094e197a5b3a

        SHA1

        b37b51b66c8d5300eb8b6671fd9a88d8fa33e7c8

        SHA256

        cd7768e7c3f1cd83af4d12e6ce1de373ea792d6a0de53f68dd5ba66bb6cec46d

        SHA512

        6317fe647dec807e3e072ede791a7bded7e32580271fd141a03c3b2a9f31a7766ce82320e5c36c7cd3bbb93edd7c95a44809aa62fb68c30500b58f611700c443

      • C:\Users\Admin\AppData\Local\Temp\winupdate.bat

        Filesize

        162B

        MD5

        f4628bd71ad81679e8e7824737478fa6

        SHA1

        c25c088af824cf653b7a9c9cff7ced4d9f53c3ae

        SHA256

        eb38a61d889818ad5a6a5d3e229b0fcb8561f6b3889cb1386e9af815aaa1f975

        SHA512

        afc4f3e1b6b14526620f71ee6ee49412422bded7f0f0afffcd8bf838d7f9a824764f86262b2075745a395f4f5c632bdf2fbbe4d806edaaa8b67bcad995228dfb

      • memory/856-0-0x0000000000220000-0x0000000000221000-memory.dmp

        Filesize

        4KB

      • memory/856-15-0x00000000031A0000-0x000000000320C000-memory.dmp

        Filesize

        432KB

      • memory/856-14-0x0000000000400000-0x00000000005AA000-memory.dmp

        Filesize

        1.7MB

      • memory/2572-16-0x00000000011B0000-0x000000000121C000-memory.dmp

        Filesize

        432KB

      • memory/2572-20-0x00000000011B0000-0x000000000121C000-memory.dmp

        Filesize

        432KB