Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    19/04/2024, 22:11

General

  • Target

    fb4735cde844979d5c6135209e0af5c6_JaffaCakes118.exe

  • Size

    5.9MB

  • MD5

    fb4735cde844979d5c6135209e0af5c6

  • SHA1

    07404045b8ec89a4138847a753fe487af46dd76b

  • SHA256

    24787f7d4c70a4e854ab8775097aba3ad267da43909d81922fc097e3f2d922a5

  • SHA512

    e57cfb2457529268df3a6fe63bd3785e2b996dfa6c7cea6586505073656ca73018e58943a5adbd16e2fcbc10597f40e4949832fa1a6e3237ade02827ff176bed

  • SSDEEP

    98304:XMqpHF8ZSKrvkWGWSidl+cBfN/dL40bDhqfctddRH3YGMYGPmX:XJF0r8zWSidsE1/dLcGdHXYXPmX

Malware Config

Signatures

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb4735cde844979d5c6135209e0af5c6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fb4735cde844979d5c6135209e0af5c6_JaffaCakes118.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/844-0-0x00000000011C0000-0x0000000002146000-memory.dmp

    Filesize

    15.5MB

  • memory/844-2-0x00000000757D0000-0x00000000758E0000-memory.dmp

    Filesize

    1.1MB

  • memory/844-1-0x00000000757D0000-0x00000000758E0000-memory.dmp

    Filesize

    1.1MB

  • memory/844-3-0x00000000757D0000-0x00000000758E0000-memory.dmp

    Filesize

    1.1MB

  • memory/844-4-0x00000000757D0000-0x00000000758E0000-memory.dmp

    Filesize

    1.1MB

  • memory/844-6-0x00000000757D0000-0x00000000758E0000-memory.dmp

    Filesize

    1.1MB

  • memory/844-8-0x00000000757D0000-0x00000000758E0000-memory.dmp

    Filesize

    1.1MB

  • memory/844-11-0x00000000757D0000-0x00000000758E0000-memory.dmp

    Filesize

    1.1MB

  • memory/844-10-0x00000000757D0000-0x00000000758E0000-memory.dmp

    Filesize

    1.1MB

  • memory/844-12-0x00000000769E0000-0x0000000076A27000-memory.dmp

    Filesize

    284KB

  • memory/844-14-0x00000000757D0000-0x00000000758E0000-memory.dmp

    Filesize

    1.1MB

  • memory/844-13-0x00000000757D0000-0x00000000758E0000-memory.dmp

    Filesize

    1.1MB

  • memory/844-15-0x00000000769E0000-0x0000000076A27000-memory.dmp

    Filesize

    284KB

  • memory/844-16-0x00000000757D0000-0x00000000758E0000-memory.dmp

    Filesize

    1.1MB

  • memory/844-17-0x00000000757D0000-0x00000000758E0000-memory.dmp

    Filesize

    1.1MB

  • memory/844-18-0x00000000757D0000-0x00000000758E0000-memory.dmp

    Filesize

    1.1MB

  • memory/844-19-0x00000000769E0000-0x0000000076A27000-memory.dmp

    Filesize

    284KB

  • memory/844-20-0x00000000757D0000-0x00000000758E0000-memory.dmp

    Filesize

    1.1MB

  • memory/844-22-0x00000000757D0000-0x00000000758E0000-memory.dmp

    Filesize

    1.1MB

  • memory/844-23-0x00000000757D0000-0x00000000758E0000-memory.dmp

    Filesize

    1.1MB

  • memory/844-21-0x00000000757D0000-0x00000000758E0000-memory.dmp

    Filesize

    1.1MB

  • memory/844-25-0x00000000011C0000-0x0000000002146000-memory.dmp

    Filesize

    15.5MB

  • memory/844-24-0x0000000077A90000-0x0000000077A92000-memory.dmp

    Filesize

    8KB

  • memory/844-27-0x00000000011C0000-0x0000000002146000-memory.dmp

    Filesize

    15.5MB

  • memory/844-26-0x0000000074AA0000-0x000000007518E000-memory.dmp

    Filesize

    6.9MB

  • memory/844-28-0x0000000000670000-0x00000000006B0000-memory.dmp

    Filesize

    256KB

  • memory/844-30-0x00000000011C0000-0x0000000002146000-memory.dmp

    Filesize

    15.5MB

  • memory/844-32-0x00000000757D0000-0x00000000758E0000-memory.dmp

    Filesize

    1.1MB

  • memory/844-33-0x00000000757D0000-0x00000000758E0000-memory.dmp

    Filesize

    1.1MB

  • memory/844-34-0x00000000757D0000-0x00000000758E0000-memory.dmp

    Filesize

    1.1MB

  • memory/844-35-0x00000000757D0000-0x00000000758E0000-memory.dmp

    Filesize

    1.1MB

  • memory/844-36-0x00000000757D0000-0x00000000758E0000-memory.dmp

    Filesize

    1.1MB

  • memory/844-38-0x00000000769E0000-0x0000000076A27000-memory.dmp

    Filesize

    284KB

  • memory/844-37-0x00000000757D0000-0x00000000758E0000-memory.dmp

    Filesize

    1.1MB

  • memory/844-39-0x00000000757D0000-0x00000000758E0000-memory.dmp

    Filesize

    1.1MB

  • memory/844-40-0x00000000757D0000-0x00000000758E0000-memory.dmp

    Filesize

    1.1MB

  • memory/844-41-0x00000000757D0000-0x00000000758E0000-memory.dmp

    Filesize

    1.1MB

  • memory/844-42-0x00000000757D0000-0x00000000758E0000-memory.dmp

    Filesize

    1.1MB

  • memory/844-43-0x0000000074AA0000-0x000000007518E000-memory.dmp

    Filesize

    6.9MB

  • memory/844-44-0x0000000000670000-0x00000000006B0000-memory.dmp

    Filesize

    256KB