Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    16/04/2024, 18:47

General

  • Target

    f419df58adee6d593f3cf3bff741e6d7_JaffaCakes118.exe

  • Size

    3.9MB

  • MD5

    f419df58adee6d593f3cf3bff741e6d7

  • SHA1

    043ce489e6b20f7ad2004bfe0a3ea81fec396ed3

  • SHA256

    79e7afac4fde6aa470b242822e00ad3f62d6afeac6cf02df00f6f5fc27ac70d2

  • SHA512

    985cee3886fc593b9a793ff84835ed719373b54637390b1d85961fd811d91d2d8c99f92f91cc34c11417768631228b440c504bef4c31d5800214d61063a936c4

  • SSDEEP

    98304:Zl3iWfltcakcibiqhMbMgOn7n0bcakcibiqhQL9kb5NjcakcibiqhMbMgOn7n0b2:PPLdlirybMgOnkdlirqYdlirybMgOnk+

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f419df58adee6d593f3cf3bff741e6d7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f419df58adee6d593f3cf3bff741e6d7_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1304
    • C:\Users\Admin\AppData\Local\Temp\f419df58adee6d593f3cf3bff741e6d7_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\f419df58adee6d593f3cf3bff741e6d7_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:1164
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\f419df58adee6d593f3cf3bff741e6d7_JaffaCakes118.exe" /TN zi2YS8HC0bf2 /F
        3⤵
        • Creates scheduled task(s)
        PID:2544
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN zi2YS8HC0bf2 > C:\Users\Admin\AppData\Local\Temp\JyW7XE.xml
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2644
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN zi2YS8HC0bf2
          4⤵
            PID:2668

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\JyW7XE.xml

      Filesize

      1KB

      MD5

      6d4edb5f464633b7b26d56f4457adb95

      SHA1

      fb3250de0e2a7997be4e47bf13b92f90fa530251

      SHA256

      1e495e6e7daaadbff3612d4e345222d6274f2a3dffe7a100dcda2d7c000c49c0

      SHA512

      380efd53f029138d5f4b9af7aab51436660c579609833664d4f335c9dfba4853e87255e13c598985334c34c9a68eb6f3426c7d459cb41098c5f58484f3547d0e

    • \Users\Admin\AppData\Local\Temp\f419df58adee6d593f3cf3bff741e6d7_JaffaCakes118.exe

      Filesize

      3.9MB

      MD5

      8f2000c97d4b1a8e7c88b200d598ae92

      SHA1

      dfda679c50d4dc433777e2cfb86a76b18d19fd85

      SHA256

      22024d5f9204db3e1bbeeb86c0cf8d75538117b18456dac5a85c7855b5e3bbc2

      SHA512

      94b155c3f5f8146ae41621e308731ae8609f7ee683fdff6b05e1c76ceaa7b7badc97f0298eb718c67c073e8f4e1866385f518b5146233414b750ddddd698d489

    • memory/1164-19-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/1164-21-0x00000000001E0000-0x000000000025E000-memory.dmp

      Filesize

      504KB

    • memory/1164-26-0x0000000000400000-0x000000000045B000-memory.dmp

      Filesize

      364KB

    • memory/1164-31-0x00000000002F0000-0x000000000035B000-memory.dmp

      Filesize

      428KB

    • memory/1164-55-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/1304-4-0x0000000022DF0000-0x0000000022E6E000-memory.dmp

      Filesize

      504KB

    • memory/1304-16-0x0000000023670000-0x00000000238CC000-memory.dmp

      Filesize

      2.4MB

    • memory/1304-15-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/1304-0-0x0000000000400000-0x000000000046B000-memory.dmp

      Filesize

      428KB

    • memory/1304-2-0x0000000000400000-0x000000000065C000-memory.dmp

      Filesize

      2.4MB

    • memory/1304-54-0x0000000023670000-0x00000000238CC000-memory.dmp

      Filesize

      2.4MB