Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    04/05/2024, 19:50

General

  • Target

    ae748af4e01fdd4d7fd997371883fd1e_JaffaCakes118.exe

  • Size

    97KB

  • MD5

    ae748af4e01fdd4d7fd997371883fd1e

  • SHA1

    fe7bbf9b822ee427ecd24a8e609247a3c6635c56

  • SHA256

    e222924ccca541fcd4eb2ae1ff3a1af488d8df580abadb7a4237cd6899096470

  • SHA512

    6b41fe0ccb82b78e4e5cf88cffa17f2488d86c76d18097c0f47397c66338f8084c607ec74b093096d42def484e9551764e804f75583893e66899ab9363ba6a22

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hf96T:hfAIuZAIuYSMjoqtMHfhfU

Score
9/10

Malware Config

Signatures

  • Renames multiple (3454) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae748af4e01fdd4d7fd997371883fd1e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ae748af4e01fdd4d7fd997371883fd1e_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2856

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini.tmp

    Filesize

    97KB

    MD5

    66ab5b4443fb638630001dfcf6e4905f

    SHA1

    1391e4ef6fd2f838d7b35d665dff75e4387ea967

    SHA256

    26781017da7c3920f7fe6d055dfc479a7fbb68062a8d73fd213457cf39fc9c76

    SHA512

    1403f65dc84e9ab8f2f46712e6d10f5accd39d29295ac3088aced707225900b141a45836d5bf0889a25332ac7479bab7e700ef872ba17c54befaa7b2061caf89

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    106KB

    MD5

    acc78dbc67c5918f5754da01ced43f62

    SHA1

    55e071284b29a44d77a449f67fdee999705f64b8

    SHA256

    e6af4f8813d4c1eeab5aeb9702f1d1c58eb06d9a145884afa406dbf5021cd370

    SHA512

    d6ce4e397fbe234bf5dfa3bc9ac1fd016fe6d97fc0b7d25b4ce51a46c909511ccaa1ca0f98686a3660c7d45ea9ad60ce8f50d4d267eed9ed9fe8f894e9ddfb9d

  • memory/2856-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2856-86-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB