Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17/04/2024, 08:19

General

  • Target

    f55bd52204f0fc76d87bbb945696f517_JaffaCakes118.exe

  • Size

    352KB

  • MD5

    f55bd52204f0fc76d87bbb945696f517

  • SHA1

    d1adabe06c66464b6f5dbce63772042e01f1cca1

  • SHA256

    155334fff7afe725df481323fc38b5f7f75a33cd116bea8066254e69429e90f3

  • SHA512

    d9c2ac2cc2eba5f07c4516ef3ed2d80652f460b7d0d7a9c992d005f4c08fed98efd23e8c09644310fafc97c375a99c4f6408283bb76eda145fc3446e4e6850ce

  • SSDEEP

    6144:peAhFLiInTFjKqAGbKg+NCG8GCww0IdLtdXOabph4j2JsFTAw2Tn6PXcdZqj8u6:8lInTVDAGbNcCkw02dXOXdvj8u6

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f55bd52204f0fc76d87bbb945696f517_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f55bd52204f0fc76d87bbb945696f517_JaffaCakes118.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Drops file in Windows directory
    • Modifies system certificate store
    PID:1660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \ProgramData\{7bf48538-3269-ecd0-7bf4-4853832614e0}\f55bd52204f0fc76d87bbb945696f517_JaffaCakes118.exe

    Filesize

    352KB

    MD5

    f55bd52204f0fc76d87bbb945696f517

    SHA1

    d1adabe06c66464b6f5dbce63772042e01f1cca1

    SHA256

    155334fff7afe725df481323fc38b5f7f75a33cd116bea8066254e69429e90f3

    SHA512

    d9c2ac2cc2eba5f07c4516ef3ed2d80652f460b7d0d7a9c992d005f4c08fed98efd23e8c09644310fafc97c375a99c4f6408283bb76eda145fc3446e4e6850ce

  • memory/1660-8-0x00000000001E0000-0x00000000001E1000-memory.dmp

    Filesize

    4KB

  • memory/1660-4-0x0000000000980000-0x00000000009AF000-memory.dmp

    Filesize

    188KB

  • memory/1660-6-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/1660-3-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/1660-2-0x0000000000120000-0x0000000000121000-memory.dmp

    Filesize

    4KB

  • memory/1660-1-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/1660-9-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/1660-11-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/1660-15-0x0000000000630000-0x0000000000631000-memory.dmp

    Filesize

    4KB

  • memory/1660-21-0x0000000000680000-0x0000000000681000-memory.dmp

    Filesize

    4KB

  • memory/1660-0-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB

  • memory/1660-18-0x0000000000670000-0x0000000000671000-memory.dmp

    Filesize

    4KB

  • memory/1660-17-0x0000000000640000-0x0000000000641000-memory.dmp

    Filesize

    4KB