Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    02/05/2024, 15:34

General

  • Target

    0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe

  • Size

    349KB

  • MD5

    0ee4d9f8d2ae144c04888a48bcff202a

  • SHA1

    9bd2ec9f7f60015bbb1e699524db579ce3fdd9c3

  • SHA256

    04e894e42730e4d7509ddce4e42b86028d3ffb2c18b53046c1a604bb234e82e6

  • SHA512

    79145ed366bf3f787d6624254ca3aeedca48cf5d4e329437814b1967ed9914b841c099ff0b827831473c78821482d7cff3b1d968b2411577c27b6747e0d557f6

  • SSDEEP

    6144:tUxjHDHwIOJ4bPTni2b4HuwIAhhJHydC1+KNweG/5m1NEQ+jNCFKrWSrlTvbzpp5:tUxbj/xLblpFXld7mEJa/q/

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2812
    • C:\Users\Admin\AppData\Local\Temp\0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\0ee4d9f8d2ae144c04888a48bcff202a_JaffaCakes118.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:460
      • C:\ProgramData\411325\repair.exe
        "C:\ProgramData\411325\repair.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2136
        • C:\ProgramData\411325\repair.exe
          "C:\ProgramData\411325\repair.exe"
          4⤵
          • Executes dropped EXE
          PID:1764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C3948BE6E525B8A8CEE9FAC91C9E392_AD2905D734307F784BBEC99C49201928

    Filesize

    5B

    MD5

    5bfa51f3a417b98e7443eca90fc94703

    SHA1

    8c015d80b8a23f780bdd215dc842b0f5551f63bd

    SHA256

    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

    SHA512

    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C3948BE6E525B8A8CEE9FAC91C9E392_AD2905D734307F784BBEC99C49201928

    Filesize

    412B

    MD5

    53598497abdc1bade102a1d1c43f09c4

    SHA1

    c298e13e58aff57352f108f83ed39ff59d2ff4aa

    SHA256

    11b183fbd09a4ef367aaad33e84c8a8667285fec4c50edb04749812b7de3143b

    SHA512

    05b1473b789adc5f5c58f093988308f0e6a461957928139ece5f653b3528b3dfad3141f35afa3fa1163578048c88794a83eb91bb945526f5e6c745680642de9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    36040b385a037db955b7df71ec733b75

    SHA1

    386a35cb43bf6ffa590cecddab97a44031e5b41f

    SHA256

    ba5515d347808578bc645c8c15a3d8440538ac949a60a1d62291fe89fd26c64c

    SHA512

    eead6430e8b11bee0fb5bb8580471a54e3c3b8aaa02266314f7f666a75d51d1f6bee81afea01a68ace44cea0d64ef32d98936f988c3b1ca09476708a3809154e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    1220af9aad59407e03c164db22fd8278

    SHA1

    9df14617571e6bc258a86c0d3e1de30c0eb13d52

    SHA256

    0de151b8603db920e7d89255d24b0ee719272d8526b476b7222afb75634901bd

    SHA512

    5bf3d0ceb59ff2c90c2d402b7ad35634d1b9cddc4be0fabaed61fd7dda635472473c5480ef938963562a6d0d93674075af93135f4ed04a69ea22daa76477db9c

  • C:\Users\Admin\AppData\Local\Temp\Tar806D.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • \ProgramData\411325\repair.exe

    Filesize

    349KB

    MD5

    0ee4d9f8d2ae144c04888a48bcff202a

    SHA1

    9bd2ec9f7f60015bbb1e699524db579ce3fdd9c3

    SHA256

    04e894e42730e4d7509ddce4e42b86028d3ffb2c18b53046c1a604bb234e82e6

    SHA512

    79145ed366bf3f787d6624254ca3aeedca48cf5d4e329437814b1967ed9914b841c099ff0b827831473c78821482d7cff3b1d968b2411577c27b6747e0d557f6

  • memory/460-74-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/460-76-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/460-72-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/460-70-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/460-66-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/460-68-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/460-78-0x00000000743C0000-0x000000007496B000-memory.dmp

    Filesize

    5.7MB

  • memory/460-64-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/460-162-0x00000000743C0000-0x000000007496B000-memory.dmp

    Filesize

    5.7MB

  • memory/1764-185-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2136-169-0x0000000000BD0000-0x0000000000BE7000-memory.dmp

    Filesize

    92KB

  • memory/2136-190-0x0000000000BD0000-0x0000000000BE7000-memory.dmp

    Filesize

    92KB

  • memory/2136-175-0x0000000000BD0000-0x0000000000BE7000-memory.dmp

    Filesize

    92KB

  • memory/2136-166-0x0000000000BD0000-0x0000000000BE7000-memory.dmp

    Filesize

    92KB

  • memory/2136-165-0x0000000000BD0000-0x0000000000BE7000-memory.dmp

    Filesize

    92KB

  • memory/2136-168-0x0000000000BD0000-0x0000000000BE7000-memory.dmp

    Filesize

    92KB

  • memory/2136-174-0x0000000000BF0000-0x0000000000BF1000-memory.dmp

    Filesize

    4KB

  • memory/2136-172-0x0000000000BF0000-0x0000000000BF1000-memory.dmp

    Filesize

    4KB

  • memory/2136-171-0x0000000000BD0000-0x0000000000BE7000-memory.dmp

    Filesize

    92KB

  • memory/2812-77-0x00000000743C0000-0x000000007496B000-memory.dmp

    Filesize

    5.7MB

  • memory/2812-1-0x00000000743C0000-0x000000007496B000-memory.dmp

    Filesize

    5.7MB

  • memory/2812-2-0x00000000743C0000-0x000000007496B000-memory.dmp

    Filesize

    5.7MB

  • memory/2812-62-0x00000000743C0000-0x000000007496B000-memory.dmp

    Filesize

    5.7MB

  • memory/2812-63-0x00000000743C0000-0x000000007496B000-memory.dmp

    Filesize

    5.7MB

  • memory/2812-0-0x00000000743C1000-0x00000000743C2000-memory.dmp

    Filesize

    4KB