Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    116s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    09/05/2024, 22:09

General

  • Target

    2bf4210c873ad7653dceda1869d5ce87_JaffaCakes118.exe

  • Size

    3.7MB

  • MD5

    2bf4210c873ad7653dceda1869d5ce87

  • SHA1

    7561500f8cb88f9214c8de9d05bcdaf3f5457388

  • SHA256

    3e27d1888ca10f3de6e459f4e5a5b4773c1b8423920e5c3801a26f04af62f4c5

  • SHA512

    55bcf89618dc2b7aadfd29f77d94679c2adc8fd7ee3ca96f4f83f5f84f7f479305c763329c790710bc30ecfb4c9632c42afa35a880ba163422bc6189ad7d6a95

  • SSDEEP

    49152:aoDkYOHQCoDkYOglEDkYOMwwnMb4PmyVI/4MnYYJ2ZhqSGLHkJEMPZqhaK6zbfqa:QYOrYOglpYOXwnS4rVpIDQPxj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 20 IoCs
  • Loads dropped DLL 40 IoCs
  • Adds Run key to start application 2 TTPs 21 IoCs
  • Drops file in Program Files directory 64 IoCs
  • NTFS ADS 21 IoCs
  • Suspicious use of SetWindowsHookEx 21 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2bf4210c873ad7653dceda1869d5ce87_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2bf4210c873ad7653dceda1869d5ce87_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • NTFS ADS
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Users\Admin\AppData\Local\Temp\176.#.exe
      C:\Users\Admin\AppData\Local\Temp\176.#.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Program Files directory
      • NTFS ADS
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1244
      • C:\Users\Admin\AppData\Local\Temp\186.#.exe
        C:\Users\Admin\AppData\Local\Temp\186.#.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in Program Files directory
        • NTFS ADS
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2300
        • C:\Users\Admin\AppData\Local\Temp\607.#.exe
          C:\Users\Admin\AppData\Local\Temp\607.#.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Program Files directory
          • NTFS ADS
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2732
          • C:\Users\Admin\AppData\Local\Temp\828.#.exe
            C:\Users\Admin\AppData\Local\Temp\828.#.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Drops file in Program Files directory
            • NTFS ADS
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2788
            • C:\Users\Admin\AppData\Local\Temp\648.#.exe
              C:\Users\Admin\AppData\Local\Temp\648.#.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Adds Run key to start application
              • Drops file in Program Files directory
              • NTFS ADS
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:620
              • C:\Users\Admin\AppData\Local\Temp\975.#.exe
                C:\Users\Admin\AppData\Local\Temp\975.#.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Adds Run key to start application
                • Drops file in Program Files directory
                • NTFS ADS
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:1624
                • C:\Users\Admin\AppData\Local\Temp\978.#.exe
                  C:\Users\Admin\AppData\Local\Temp\978.#.exe
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Adds Run key to start application
                  • Drops file in Program Files directory
                  • NTFS ADS
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:2268
                  • C:\Users\Admin\AppData\Local\Temp\456.#.exe
                    C:\Users\Admin\AppData\Local\Temp\456.#.exe
                    9⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Adds Run key to start application
                    • Drops file in Program Files directory
                    • NTFS ADS
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:3036
                    • C:\Users\Admin\AppData\Local\Temp\908.#.exe
                      C:\Users\Admin\AppData\Local\Temp\908.#.exe
                      10⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Adds Run key to start application
                      • Drops file in Program Files directory
                      • NTFS ADS
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      PID:2912
                      • C:\Users\Admin\AppData\Local\Temp\119.#.exe
                        C:\Users\Admin\AppData\Local\Temp\119.#.exe
                        11⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Adds Run key to start application
                        • Drops file in Program Files directory
                        • NTFS ADS
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:664
                        • C:\Users\Admin\AppData\Local\Temp\569.#.exe
                          C:\Users\Admin\AppData\Local\Temp\569.#.exe
                          12⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Adds Run key to start application
                          • Drops file in Program Files directory
                          • NTFS ADS
                          • Suspicious use of SetWindowsHookEx
                          • Suspicious use of WriteProcessMemory
                          PID:1380
                          • C:\Users\Admin\AppData\Local\Temp\423.#.exe
                            C:\Users\Admin\AppData\Local\Temp\423.#.exe
                            13⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Adds Run key to start application
                            • Drops file in Program Files directory
                            • NTFS ADS
                            • Suspicious use of SetWindowsHookEx
                            • Suspicious use of WriteProcessMemory
                            PID:2700
                            • C:\Users\Admin\AppData\Local\Temp\364.#.exe
                              C:\Users\Admin\AppData\Local\Temp\364.#.exe
                              14⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Adds Run key to start application
                              • Drops file in Program Files directory
                              • NTFS ADS
                              • Suspicious use of SetWindowsHookEx
                              • Suspicious use of WriteProcessMemory
                              PID:2524
                              • C:\Users\Admin\AppData\Local\Temp\808.#.exe
                                C:\Users\Admin\AppData\Local\Temp\808.#.exe
                                15⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Adds Run key to start application
                                • NTFS ADS
                                • Suspicious use of SetWindowsHookEx
                                • Suspicious use of WriteProcessMemory
                                PID:708
                                • C:\Users\Admin\AppData\Local\Temp\147.#.exe
                                  C:\Users\Admin\AppData\Local\Temp\147.#.exe
                                  16⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Adds Run key to start application
                                  • Drops file in Program Files directory
                                  • NTFS ADS
                                  • Suspicious use of SetWindowsHookEx
                                  • Suspicious use of WriteProcessMemory
                                  PID:2776
                                  • C:\Users\Admin\AppData\Local\Temp\207.#.exe
                                    C:\Users\Admin\AppData\Local\Temp\207.#.exe
                                    17⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Adds Run key to start application
                                    • NTFS ADS
                                    • Suspicious use of SetWindowsHookEx
                                    PID:1780
                                    • C:\Users\Admin\AppData\Local\Temp\401.#.exe
                                      C:\Users\Admin\AppData\Local\Temp\401.#.exe
                                      18⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Adds Run key to start application
                                      • NTFS ADS
                                      • Suspicious use of SetWindowsHookEx
                                      PID:1712
                                      • C:\Users\Admin\AppData\Local\Temp\698.#.exe
                                        C:\Users\Admin\AppData\Local\Temp\698.#.exe
                                        19⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Adds Run key to start application
                                        • NTFS ADS
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1916
                                        • C:\Users\Admin\AppData\Local\Temp\958.#.exe
                                          C:\Users\Admin\AppData\Local\Temp\958.#.exe
                                          20⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Adds Run key to start application
                                          • NTFS ADS
                                          • Suspicious use of SetWindowsHookEx
                                          PID:448
                                          • C:\Users\Admin\AppData\Local\Temp\197.#.exe
                                            C:\Users\Admin\AppData\Local\Temp\197.#.exe
                                            21⤵
                                            • Executes dropped EXE
                                            • Adds Run key to start application
                                            • NTFS ADS
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2532
                                            • C:\Users\Admin\AppData\Local\Temp\88.#.exe
                                              C:\Users\Admin\AppData\Local\Temp\88.#.exe
                                              22⤵
                                                PID:2316
                                                • C:\Users\Admin\AppData\Local\Temp\136.#.exe
                                                  C:\Users\Admin\AppData\Local\Temp\136.#.exe
                                                  23⤵
                                                    PID:2060
                                                    • C:\Users\Admin\AppData\Local\Temp\84.#.exe
                                                      C:\Users\Admin\AppData\Local\Temp\84.#.exe
                                                      24⤵
                                                        PID:2680
                                                        • C:\Users\Admin\AppData\Local\Temp\310.#.exe
                                                          C:\Users\Admin\AppData\Local\Temp\310.#.exe
                                                          25⤵
                                                            PID:2112
                                                            • C:\Users\Admin\AppData\Local\Temp\863.#.exe
                                                              C:\Users\Admin\AppData\Local\Temp\863.#.exe
                                                              26⤵
                                                                PID:596
                                                                • C:\Users\Admin\AppData\Local\Temp\478.#.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\478.#.exe
                                                                  27⤵
                                                                    PID:1860
                                                                    • C:\Users\Admin\AppData\Local\Temp\981.#.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\981.#.exe
                                                                      28⤵
                                                                        PID:1640

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe$

                  Filesize

                  3.7MB

                  MD5

                  e3d8b217ed767c6ec86bacbaac396ade

                  SHA1

                  0282c676a9d974f382cf2384f2668c4c9f68a3c3

                  SHA256

                  b735f1bb51c5c175234173004f315727918fa11c9a06fd3812477ed85288caa4

                  SHA512

                  200bd8f410cf8f1ba846f120be661da9c551896d3bf9fdf7f6dbdbb6fb8539e554c311138cdb0201cfb8d986e07f8d447998403a6f2a965b93126f7a25b97e92

                • C:\Program Files\Java\jdk1.7.0_80\bin\jstatd.exe$

                  Filesize

                  3.7MB

                  MD5

                  64facf1ddfc48c23c706dfbf1cb5f17c

                  SHA1

                  7eda47d21937f37f0e0f58625e1910f88f92a31c

                  SHA256

                  697db9cbd6f0929644b135b7bf3e2275f2643d1003d09f075819990be9444a87

                  SHA512

                  147172ddc9d66737b7c4de499ec50cb8a361146b1b8fdd7c75c90b4bce340d4edacf07e4e44510aace304ca7f213867bdf350f0b3ccab17b44770ca2d420e222

                • C:\Program Files\Microsoft Games\Chess\Chess.exe$

                  Filesize

                  3.9MB

                  MD5

                  60fc6736b1a4470cfaec2fc6ae4ca53c

                  SHA1

                  860b0f5d807e8e37f2276d6532a3f83495056cfe

                  SHA256

                  a1c39e6b7f1ce86d9eb639237581ae6aebab140f746c4593d6fde2573d7c51c5

                  SHA512

                  31b33b7c4c8ee0a65a04d46999d17e4f1dfaa3c312e1adc559a658896c08dcb0764e28166ccd94128b39a981427bf8069e0b93597dfa58fe53b15eb616807897

                • \Users\Admin\AppData\Local\Temp\176.#.exe

                  Filesize

                  3.7MB

                  MD5

                  2bf4210c873ad7653dceda1869d5ce87

                  SHA1

                  7561500f8cb88f9214c8de9d05bcdaf3f5457388

                  SHA256

                  3e27d1888ca10f3de6e459f4e5a5b4773c1b8423920e5c3801a26f04af62f4c5

                  SHA512

                  55bcf89618dc2b7aadfd29f77d94679c2adc8fd7ee3ca96f4f83f5f84f7f479305c763329c790710bc30ecfb4c9632c42afa35a880ba163422bc6189ad7d6a95