Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    30/04/2024, 18:21

General

  • Target

    0a50b7dea61723bbd18af6cabf932b78_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    0a50b7dea61723bbd18af6cabf932b78

  • SHA1

    fa7673b9c5ac51d4207beb36d967987c8628605c

  • SHA256

    9d382ae20062547591beb52e0208745a887d2e9e88c1f5b6fffdb98cbcfc4fef

  • SHA512

    3fdb6b158704a464db7d7060221b16dcea666b5d246b1a0cc7286bb71815a24f41146c49e7286041d4ff4fe2b4792cf955521f5446aef7e7e9c1bf304e723d25

  • SSDEEP

    24576:W7blxYQ7TkIuWq1Vux9LcvXn9UmCvYN267aRq8Imj4Y2:W75OgoDWJWXn9Ua+sm8Y2

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a50b7dea61723bbd18af6cabf932b78_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0a50b7dea61723bbd18af6cabf932b78_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2984
    • C:\Users\Admin\AppData\Local\Temp\is-SQ3VG.tmp\0a50b7dea61723bbd18af6cabf932b78_JaffaCakes118.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-SQ3VG.tmp\0a50b7dea61723bbd18af6cabf932b78_JaffaCakes118.tmp" /SL5="$30146,1022046,57856,C:\Users\Admin\AppData\Local\Temp\0a50b7dea61723bbd18af6cabf932b78_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2988
      • C:\Users\Admin\AppData\Local\Temp\is-2G2GV.tmp\zu.exe
        "C:\Users\Admin\AppData\Local\Temp\is-2G2GV.tmp\zu.exe" -o -P pwzx bb.zip
        3⤵
        • Executes dropped EXE
        PID:2964

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-2G2GV.tmp\Uninstall.dll

    Filesize

    380KB

    MD5

    91e70aa4279ab1d4839d0f9f053c7d0c

    SHA1

    2fad5637170ed36ed7431449c1bf0df19ed9fcc5

    SHA256

    f3c9a20f81c401f99aba3457f8a139b3ffa8ba7c93af07d04b6ebf9a4ff0930f

    SHA512

    9b81de4cc6f5a7e34aa72c60b38d478d64ae141469d7a9c4978ac1fe946ad0cc2014ce3b7a2358c16a61579a41233c234dae03b10a9ca98d44b6dc2eaef0b0e6

  • C:\Users\Admin\AppData\Local\Temp\is-2G2GV.tmp\_locale.nls

    Filesize

    708KB

    MD5

    d11f58daf5eeeee12ee04c1d92750774

    SHA1

    9890b9b80e11b9acd259f14795c237602ac13ccb

    SHA256

    2a41ca5721fdf2d185d905b9798d7fd7577e22136e1e1ab7501c6e29fc83c6bf

    SHA512

    ab448ef42ef4cb282b4ecb025a1e673385d2ad781ff8127654ac60a577a33251d0fc7c4e1afe28fcd6e58f27cbb72e77a39d889e275835e71efb7dcd8bbf4607

  • C:\Users\Admin\AppData\Local\Temp\is-2G2GV.tmp\bb.zip

    Filesize

    875KB

    MD5

    2fd562fbbc45091218c9942458d8f250

    SHA1

    e8c364f4dbf2d139ba43400fac1cdc30592da985

    SHA256

    4676fc3d3d5e409ab416cb348210a7d1ff4dd675d1eb62dafeeb9455943875a1

    SHA512

    315392fb743682546c609daab6fc3162f8e91a7b70888bfac04ba3bf87e34c9bfd3df3d943ac0ddb02aa490a77cd7757c5cb64b5d1faa0adc39e46ab3f68dd1a

  • \Users\Admin\AppData\Local\Temp\is-2G2GV.tmp\zu.exe

    Filesize

    164KB

    MD5

    75375c22c72f1beb76bea39c22a1ed68

    SHA1

    e1652b058195db3f5f754b7ab430652ae04a50b8

    SHA256

    8d9b5190aace52a1db1ac73a65ee9999c329157c8e88f61a772433323d6b7a4a

    SHA512

    1b396e78e189185eefb8c6058aa7e6dfe1b8f2dff8babfe4ffbee93805467bf45760eea6efb8d9bb2040d0eaa56841d457b1976dcfe13ed67931ade01419f55a

  • \Users\Admin\AppData\Local\Temp\is-SQ3VG.tmp\0a50b7dea61723bbd18af6cabf932b78_JaffaCakes118.tmp

    Filesize

    697KB

    MD5

    832dab307e54aa08f4b6cdd9b9720361

    SHA1

    ebd007fb7482040ecf34339e4bf917209c1018df

    SHA256

    cc783a04ccbca4edd06564f8ec88fe5a15f1e3bb26cec7de5e090313520d98f3

    SHA512

    358d43522fd460eb1511708e4df22ea454a95e5bc3c4841931027b5fa3fb1dda05d496d8ad0a8b9279b99e6be74220fe243db8f08ef49845e9fb35c350ef4b49

  • \Users\Admin\AppData\Local\Temp\ntdll.dll

    Filesize

    1.2MB

    MD5

    d124f55b9393c976963407dff51ffa79

    SHA1

    2c7bbedd79791bfb866898c85b504186db610b5d

    SHA256

    ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef

    SHA512

    278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06

  • memory/2984-2-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2984-37-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2984-0-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2988-30-0x00000000039E0000-0x0000000003BA0000-memory.dmp

    Filesize

    1.8MB

  • memory/2988-28-0x00000000039E0000-0x0000000003BA0000-memory.dmp

    Filesize

    1.8MB

  • memory/2988-26-0x0000000001ED0000-0x0000000001F35000-memory.dmp

    Filesize

    404KB

  • memory/2988-36-0x00000000039E0000-0x0000000003BA0000-memory.dmp

    Filesize

    1.8MB

  • memory/2988-35-0x00000000039E0000-0x0000000003BA0000-memory.dmp

    Filesize

    1.8MB

  • memory/2988-9-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/2988-39-0x0000000001ED0000-0x0000000001F35000-memory.dmp

    Filesize

    404KB

  • memory/2988-38-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB