Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11/04/2024, 11:05

General

  • Target

    ed46034ddd1b55c03dad43f51cf65ae3_JaffaCakes118.exe

  • Size

    15KB

  • MD5

    ed46034ddd1b55c03dad43f51cf65ae3

  • SHA1

    f21e112e880de9c6038da6b96a737faae4082b0e

  • SHA256

    0455da8d01952f0709b32f6dbaf34b48d9753ae034b0874bc3cc9dc4ef856080

  • SHA512

    df7758aea0990b51a4a310ec5aab06dc08427e68a1a5f19560c85146a85dbba266204da095806b8483773861b1eac7cc7e1f8b47dd9840b6666ed46cb378664e

  • SSDEEP

    384:MkxO70M1uhxbnUicuK7hS6nXUyzdXAy5Hv:TA9uzbMuguQ

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed46034ddd1b55c03dad43f51cf65ae3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ed46034ddd1b55c03dad43f51cf65ae3_JaffaCakes118.exe"
    1⤵
    • Adds policy Run key to start application
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2224
    • C:\Windows\SysWOW64\ctfmon.exe
      ctfmon.exe
      2⤵
        PID:2896
      • C:\Windows\SysWOW64\ctfmon.exe
        ctfmon.exe
        2⤵
          PID:2892
        • C:\Users\Admin\AppData\Local\Temp\scm.exe
          C:\Users\Admin\AppData\Local\Temp\scm.exe
          2⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:2768

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\scm.exe

        Filesize

        6KB

        MD5

        a86e481c0dfc355c94aa23aaf44cf566

        SHA1

        5d5ffc4a9cf70b5c0881bb61ccd3987cbd7c0178

        SHA256

        8f7b3d8c7838e5ca6f969697be8a94bf836a0dea5cf22cec280942bd8bb7c1be

        SHA512

        8f238ad5d3c0991b8a5c3295c56e2c12bf6bd2c4991f616b682d6c6bf788acdfa1638a248c1fabe6b5df74ee740bf8814b08057bc539151514194a89803ad115

      • memory/2224-0-0x0000000000400000-0x000000000040F000-memory.dmp

        Filesize

        60KB

      • memory/2224-9-0x0000000000400000-0x000000000040F000-memory.dmp

        Filesize

        60KB