Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    131s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19/04/2024, 21:45 UTC

General

  • Target

    fb3b7bcdc07d6803b3c41d61e5d1d255_JaffaCakes118.exe

  • Size

    15KB

  • MD5

    fb3b7bcdc07d6803b3c41d61e5d1d255

  • SHA1

    389542b012ff6fa3d64522a8cf5bd17d00145054

  • SHA256

    af55714da39eda7c44d8a2884409f344101ffda2318f722efd0bd035ec9dece4

  • SHA512

    c40218c8a210b66f81351e80426bb54c31dcdc4cfc3936f9ab89fb590af9c6cdf1dba2f8f003bb0d2455fdf7c5efda66cfe905704b470df4c7346c035446b604

  • SSDEEP

    384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhR0pjW2UWXg:hDXWipuE+K3/SSHgx49WdWXg

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb3b7bcdc07d6803b3c41d61e5d1d255_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fb3b7bcdc07d6803b3c41d61e5d1d255_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1692
    • C:\Users\Admin\AppData\Local\Temp\DEM2B26.exe
      "C:\Users\Admin\AppData\Local\Temp\DEM2B26.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2604
      • C:\Users\Admin\AppData\Local\Temp\DEM8102.exe
        "C:\Users\Admin\AppData\Local\Temp\DEM8102.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2452
        • C:\Users\Admin\AppData\Local\Temp\DEMD652.exe
          "C:\Users\Admin\AppData\Local\Temp\DEMD652.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2656
          • C:\Users\Admin\AppData\Local\Temp\DEM2B64.exe
            "C:\Users\Admin\AppData\Local\Temp\DEM2B64.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:1712
            • C:\Users\Admin\AppData\Local\Temp\DEM8085.exe
              "C:\Users\Admin\AppData\Local\Temp\DEM8085.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:872
              • C:\Users\Admin\AppData\Local\Temp\DEMD643.exe
                "C:\Users\Admin\AppData\Local\Temp\DEMD643.exe"
                7⤵
                • Executes dropped EXE
                PID:2412

Network

    No results found
  • 10.180.0.115:1337
    fb3b7bcdc07d6803b3c41d61e5d1d255_JaffaCakes118.exe
    152 B
    3
  • 10.180.0.115:1337
    DEM2B26.exe
    152 B
    3
  • 10.180.0.115:1337
    DEM8102.exe
    152 B
    3
  • 10.180.0.115:1337
    DEMD652.exe
    152 B
    3
  • 10.180.0.115:1337
    DEM2B64.exe
    152 B
    3
  • 10.180.0.115:1337
    DEM8085.exe
    152 B
    3
  • 10.180.0.115:1337
    DEMD643.exe
    152 B
    3
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\DEM2B26.exe

    Filesize

    15KB

    MD5

    cfe0d48e9d5637d65f32687655d57c7f

    SHA1

    bf6b55720634d55e1c13722413bc743b719f5793

    SHA256

    c78d58dc04f5ea8967ab5ebae0d08711a429c9d01b3a07eb5aab97e91ff055b2

    SHA512

    a35a7ffc1cedd8b0f463e63654d8707ece49e5a32dd1ede605cd6f50d9d05f4db587424d063590062a5aeca264bdc6b173c67597047a85e8140306f269c08d1b

  • C:\Users\Admin\AppData\Local\Temp\DEM8085.exe

    Filesize

    15KB

    MD5

    03b6fc26407ef9ee63d07cba3142dfdb

    SHA1

    cf1c59001b33e180c7181678f7b14f5c4ffa4e99

    SHA256

    d0ef3ad6185ec959279b7dcf13388d38e823b5a290a1e45e6d5ac073984d34fd

    SHA512

    aec0ee61e7664130075197ba4546fef64c55ac07f5c47e81a4ad2564e6f81d3021b8376ec28a9708c064d91735ce0364277b380cce1fff2d46a60107bb77897b

  • C:\Users\Admin\AppData\Local\Temp\DEM8102.exe

    Filesize

    15KB

    MD5

    a6a0ff1978ca014658f8a6162c8e5779

    SHA1

    3083073e3bb08c1d17dfe09ec7b786c3ec72518f

    SHA256

    0ce4b4544e2c22d8135e009ec7b5c187ab89e02e61187b1ab591a0588443dc4a

    SHA512

    4b2b7d14742f5fe49e8eefbe8853300a4e82c6a3e53b3e67d0dca86fc1f53c8b2e9863c44cfbb263d4e2320762e918e76a3b3b3abab0f71b180f7ca18a519841

  • C:\Users\Admin\AppData\Local\Temp\DEMD643.exe

    Filesize

    15KB

    MD5

    2b8a523f9f3123b8bb11c1e80dcc8812

    SHA1

    453c0880aeee2d85775f1e17976638e46d4bb41a

    SHA256

    dc406d2dee598b55ca03f2c38ca24b063812f89c4c1039d03216863e723b13c8

    SHA512

    5bf3148191580fbaef1564bb82c102b4d5e5c134e9e61af063d5ec6155de542703bdde9af32149f0c55595b2c06e48c9c29a6d7b8d8bef912ab3a50a57f2e7f0

  • C:\Users\Admin\AppData\Local\Temp\DEMD652.exe

    Filesize

    15KB

    MD5

    51a27d87db6767aaebc0d09f106b2688

    SHA1

    f933901e263e5ee875c4f5d4d69d01f26ab98d84

    SHA256

    c7db51a6c60cad8716bad7b3bb17bcac1cdcb1a8298ffc4ead57c75c599bc41a

    SHA512

    7a1b05e3c2f14f4da3e4b0604ae5bfe9cac875fe2bb58979457f8222c2b9d9463377c76235e9cfa2bd315a309ebf424e617ec7eef8606dfb0d9c164bba7f7534

  • \Users\Admin\AppData\Local\Temp\DEM2B64.exe

    Filesize

    15KB

    MD5

    bef69c7bf9da50fdf1f3732e324e245d

    SHA1

    6f9d15ed38b12a10c2e5916a1259acf370ff3bf5

    SHA256

    44401b185bd61d790f4adc160a70c60c9b44c5451c5ba2627d4b4c5e58ed37ee

    SHA512

    2c12cfaa1ead165fa656588728079b3b9c6190d6d6aaa1cdd6ad63d34abd0d36a185ef523654fd28d8a659a365ef076c93fb947ffedd30294fe59069d7184042

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.