Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07/05/2024, 22:43

General

  • Target

    220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    220bef6290003075596e35fe85beeb8e

  • SHA1

    1dcc2276cf97faaa04c99eb848245c671e507628

  • SHA256

    b596492810bc82030250565b4b501e2b54b99660c6d378141b2abd953456172a

  • SHA512

    4c65357a10e9cac6a8d27cd53803584b49e838db4c6d8411595f27461cd1638b568248361b4e43f3a7b7d65bb0561bb388c2d60694036bdf6bc1d38e5b90cfef

  • SSDEEP

    24576:HlqccSRWucE/XKA7Y52htSoHEEWZEOZtzB9+5T6eWRaefD:F+UXYYSoHEEWZ7tzxeWRa

Score
10/10

Malware Config

Signatures

  • DarkTrack

    DarkTrack is a remote administration tool written in delphi.

  • DarkTrack payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2508
    • C:\Users\Admin\AppData\Local\Temp\220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\220bef6290003075596e35fe85beeb8e_JaffaCakes118.exe"
      2⤵
        PID:2992

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2508-0-0x0000000073F21000-0x0000000073F22000-memory.dmp

      Filesize

      4KB

    • memory/2508-1-0x0000000073F20000-0x00000000744CB000-memory.dmp

      Filesize

      5.7MB

    • memory/2508-2-0x0000000073F20000-0x00000000744CB000-memory.dmp

      Filesize

      5.7MB

    • memory/2508-16-0x0000000073F20000-0x00000000744CB000-memory.dmp

      Filesize

      5.7MB

    • memory/2992-5-0x0000000000360000-0x0000000000433000-memory.dmp

      Filesize

      844KB

    • memory/2992-13-0x0000000000360000-0x0000000000433000-memory.dmp

      Filesize

      844KB

    • memory/2992-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2992-9-0x0000000000360000-0x0000000000433000-memory.dmp

      Filesize

      844KB

    • memory/2992-7-0x0000000000360000-0x0000000000433000-memory.dmp

      Filesize

      844KB

    • memory/2992-4-0x0000000000360000-0x0000000000433000-memory.dmp

      Filesize

      844KB