Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    29/04/2024, 01:09

General

  • Target

    067b40393c76c0f2e2a0ddd04203538c_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    067b40393c76c0f2e2a0ddd04203538c

  • SHA1

    66dc041d8bdd8b223c4746d88d233eeeb4c280e4

  • SHA256

    c7dde2e3943f7b8f07ffef8e7e6bf693059ebc728584b94bc9df32030883872c

  • SHA512

    38a035877d19b161508c02cf26662bdc1a936a14482996f5a0774dbc232f3945d4addd56f55954d58706375dbe7b5e38e6af9d0b74570861b3c0085833ba2464

  • SSDEEP

    24576:5CW//2Cq5Eimew3ApC0HSZ8UI0rDmjLZaRDocH9pP57vRzy9ju:wE/Lq5TJC0yOUBr8LEDocHRQ9K

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\067b40393c76c0f2e2a0ddd04203538c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\067b40393c76c0f2e2a0ddd04203538c_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious use of SetWindowsHookEx
    PID:2028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nso512.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    0d0152760fd9457de1428bf906a1e4ad

    SHA1

    05230deced9421a0adfc29d449fbd3217f63cfff

    SHA256

    b44799188e62ea99e950031258be135d813d3b0238dd41f7a5bb9f295247842a

    SHA512

    6442775f18140b43e84b2fa017fe2f6a6c205b2de358eb5e5022a8c1bfc2503a071c39283f395fa4151d434343ce5d84fc4e65fa6e026a46a1fc93aae7609e80

  • \Users\Admin\AppData\Local\Temp\nso512.tmp\System.dll

    Filesize

    11KB

    MD5

    bc3f65870d0587f6f7a4090232ee44a0

    SHA1

    b026d717e7a4febc9d4a54772229d1054f92a0fa

    SHA256

    8d6d45caf932f0ae15657a9909ba168a9a4f85f8e4384dc8cc28685cc4df2b50

    SHA512

    94efe8ef1de201d0e5ee518dc071cf1c08b693467b934ea1160f74a0222cdcdb4f66efc454743980e5df41a5ae932daef6857f85298899a292eb08d75dfbd178

  • \Users\Admin\AppData\Local\Temp\nso512.tmp\__24a7970048e7400b9f5cc995607c9918.dll

    Filesize

    799KB

    MD5

    f100ac3fd4ac7750ec70fb460490e8e5

    SHA1

    4ed532e30bbef7162bf72b6d741d652b7fb17708

    SHA256

    c0b8d0cbc6f30c64f1188763c85ddbcfa7b4ecb8ac82879ca949aa0cc1d8978b

    SHA512

    be360c132529acf5e78956d4b7f7086850ca9637e4f6ae3b15b4c46a1d1687a8f161e8ef1c59144e01e810077dad86291940f4d8608afc383ffe44b8193b4c50

  • \Users\Admin\AppData\Local\Temp\nso512.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    d58a98e4bcf7537f15b054876e40defb

    SHA1

    f8757c8a73ec6e30c090bb6779a23284d3b6fc68

    SHA256

    5e1f7272ae579c22da610c0375351a0ceedc830fe2e769261cc4881cbf847814

    SHA512

    12aff5e506f901ded9147a2d3a3ebd0c42b344d6688ea53dca959d90094090d63e13f6b0c46372fe4fbae5d923c316e9cb1d56e993a38102e641e2ba7d96e9ec