Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    18/04/2024, 05:08

General

  • Target

    f7536dd502445e1475bd0a7b12ec1f30_JaffaCakes118.exe

  • Size

    506KB

  • MD5

    f7536dd502445e1475bd0a7b12ec1f30

  • SHA1

    c39cea3e9b4ab0a11270a1696a6c28146f30106c

  • SHA256

    39a545bae6f17d7d040fa95d01502a9ac3a12365afd49024ce144fe8e9aa905c

  • SHA512

    938b38e3c78e2327e3d323079d42f0645b2204982d569eaa52aab6108e3b4d296e0dbddcb50c019a292108d8460a1063bcb09ad5780089f60c991e29624f2d5b

  • SSDEEP

    12288:5yPe976VkfozHBmiS8io+XqJkZI03xYIV:tp6+6hJXpfgIsxYIV

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7536dd502445e1475bd0a7b12ec1f30_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f7536dd502445e1475bd0a7b12ec1f30_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Users\Admin\AppData\Local\Temp\f7536dd502445e1475bd0a7b12ec1f30_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\f7536dd502445e1475bd0a7b12ec1f30_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2956
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\f7536dd502445e1475bd0a7b12ec1f30_JaffaCakes118.exe" /TN Google_Trk_Updater /F
        3⤵
        • Creates scheduled task(s)
        PID:2680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\f7536dd502445e1475bd0a7b12ec1f30_JaffaCakes118.exe

    Filesize

    506KB

    MD5

    38fe6a175f2255bf10251851cc34fb63

    SHA1

    a059574e7811e3eb5f57c5448fa0a4f170d20920

    SHA256

    383ff5c7e8e4aad4e5220f5bac3eacd0c329ecade45698a0166d49a27ce1df11

    SHA512

    959d3633ec8d66f01ab1b158c36bd0c6da698ec75cd4e7ae8f937e4e77da3989211f1c7f2463856ed84963a04ed42eccf21989bfb07dd25f3daac3cab7da283c

  • memory/1948-0-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/1948-2-0x0000000000280000-0x0000000000303000-memory.dmp

    Filesize

    524KB

  • memory/1948-1-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/1948-14-0x0000000000400000-0x000000000047E000-memory.dmp

    Filesize

    504KB

  • memory/2956-16-0x0000000000400000-0x0000000000483000-memory.dmp

    Filesize

    524KB

  • memory/2956-18-0x0000000000290000-0x0000000000313000-memory.dmp

    Filesize

    524KB

  • memory/2956-23-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2956-25-0x0000000001570000-0x00000000015EE000-memory.dmp

    Filesize

    504KB

  • memory/2956-30-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB