Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15/04/2024, 05:25

General

  • Target

    f06aac7cfdc1709da1a78a8854fa3d9b_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    f06aac7cfdc1709da1a78a8854fa3d9b

  • SHA1

    195eca1f0a1bb0f6c20126b671d153dbec611948

  • SHA256

    d94d75fd9f03ba1ffa417b30b326a8788f8677e350022eddb036b82a4058d725

  • SHA512

    21f4e6b9557da3e0bf0232c555ae4172fd5a170b36b66e2f360b4bb4e41807fa11579bc09363a6cc38e133f2420e85ac7ae1356da0e0f62c4fd2434b1999f09e

  • SSDEEP

    12288:JvPD6ph/uUkvimnQu7mY2n1l1GuKmzkPjdJRuc5LHED7mnQu7mY2n1l1GuKm:JvL6r+Vr7k1LtExJH7Dr7k1Lt

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f06aac7cfdc1709da1a78a8854fa3d9b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f06aac7cfdc1709da1a78a8854fa3d9b_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2504
    • C:\Users\Admin\AppData\Local\Temp\f06aac7cfdc1709da1a78a8854fa3d9b_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\f06aac7cfdc1709da1a78a8854fa3d9b_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\f06aac7cfdc1709da1a78a8854fa3d9b_JaffaCakes118.exe

    Filesize

    1.2MB

    MD5

    9e26f19d2d60f768813f6aa71330107f

    SHA1

    e92dd4cc40bf1b32f3aa2f6802f84859a5c3b48f

    SHA256

    607344985150f9bcc6dfeea44950a2276c23cafbd64d35949d7120f3233f839e

    SHA512

    eb806b42b06db58b23be69ed50b088b46b0b28018e6f2e20275e6284e24d3c56f4a01f24c8472af2e39434f44d03f4994733fa50f83d0bdd1565237e938f2e74

  • memory/2504-0-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/2504-2-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2504-1-0x0000000000160000-0x0000000000191000-memory.dmp

    Filesize

    196KB

  • memory/2504-16-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2504-15-0x00000000014E0000-0x00000000015C0000-memory.dmp

    Filesize

    896KB

  • memory/2768-20-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/2768-22-0x0000000000170000-0x00000000001A1000-memory.dmp

    Filesize

    196KB

  • memory/2768-44-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB