Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    14/05/2024, 03:29

General

  • Target

    3db836ed96f78d4973f3a4378fd14ff3_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    3db836ed96f78d4973f3a4378fd14ff3

  • SHA1

    83ed2e829f3a144efc9155351c5bee95ac9806bb

  • SHA256

    059ef3149d0f85af58acdcf8f40ba36a01a896242d88bf8de1683fcb2601e4e0

  • SHA512

    a5cf923e4f8302778354e5b91ce267f00f32a7910995177031489c097bea10c237bd8d3d3a6ef175f3455be4fa013600ef3952f97a8a9b729cbd785771a84625

  • SSDEEP

    24576:nbSaE4mvt/Z79+k6U2JLkIwZhlqoOl/HODurbrgL:nbSv4mvzZB6Ublq7/HOKrQL

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • NSIS installer 2 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3db836ed96f78d4973f3a4378fd14ff3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3db836ed96f78d4973f3a4378fd14ff3_JaffaCakes118.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Users\Admin\AppData\Local\Temp\File.exe
      "C:\Users\Admin\AppData\Local\Temp\File.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2488
      • C:\Users\Admin\AppData\Local\Temp\1431367319.exe
        C:\Users\Admin\AppData\Local\Temp\1431367319.exe 9)1)8)6)1)5)6)1)0)5)5 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
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2800
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81715657360.txt bios get serialnumber
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2804
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81715657360.txt bios get version
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2236
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81715657360.txt bios get version
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1984
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81715657360.txt bios get version
          4⤵
            PID:2660
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic /output:C:\Users\Admin\AppData\Local\Temp\81715657360.txt bios get version
            4⤵
              PID:1252
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2800 -s 368
              4⤵
              • Loads dropped DLL
              • Program crash
              PID:684

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

        Filesize

        68KB

        MD5

        29f65ba8e88c063813cc50a4ea544e93

        SHA1

        05a7040d5c127e68c25d81cc51271ffb8bef3568

        SHA256

        1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

        SHA512

        e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

      • C:\Users\Admin\AppData\Local\Temp\81715657360.txt

        Filesize

        66B

        MD5

        9025468f85256136f923096b01375964

        SHA1

        7fcd174999661594fa5f88890ffb195e9858cc52

        SHA256

        d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

        SHA512

        92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

      • C:\Users\Admin\AppData\Local\Temp\File.exe

        Filesize

        581KB

        MD5

        3cd4d44d420f747cc484c84979c0b6e8

        SHA1

        0733c1e45d63a17d03a23bae6bda6a99728a0197

        SHA256

        1935cc5b6f2efbd3e9c0f4fa59ef2f0d6f4624dc88d29f022b3923441d89c830

        SHA512

        d1d0d379627cc5a0363c3b327c1854ebeb126385dcba1fcdc0b4ec1f8e7ef6afccc7ecbfae617e4eed82a6893bd8a7a0dd39d75e6af39612bec36a57ac0f00e8

      • C:\Users\Admin\AppData\Local\Temp\Tar24D6.tmp

        Filesize

        177KB

        MD5

        435a9ac180383f9fa094131b173a2f7b

        SHA1

        76944ea657a9db94f9a4bef38f88c46ed4166983

        SHA256

        67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

        SHA512

        1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

      • \Users\Admin\AppData\Local\Temp\1431367319.exe

        Filesize

        788KB

        MD5

        9127080ebba1d3ca64bd5bbacd179d80

        SHA1

        50c1e3c22d5ccb063d56c6d4a3c8ea43fb9b23a8

        SHA256

        c10ddbd43ea745d5e0a255db3c4eb441f03676d440239fc0ae5d89b1e9e89c66

        SHA512

        4e25a6f6cfee901f99c1b0724334e3915ede7950c495fd034b29232852e6ed9967cd446565d239257300be44cdeb32133e82a47d1b989053ec8c7f3fc5426cf0

      • \Users\Admin\AppData\Local\Temp\nsd2A4C.tmp\beasvwu.dll

        Filesize

        153KB

        MD5

        c8d0bb6d01ce9fd845bafa95d23b9815

        SHA1

        03216c5b333e06dd283c7b4b4e59f0d24574010e

        SHA256

        b356f45e360d75eac5ed02b3fc1dbbcd52ce89c622f35d9ab238c154888fda85

        SHA512

        c19501b059c9e523cb72afbe4545fa420450db45ff5502073a2a21f328a2101250ba11ce1c4e18caa6b39ac4be218a98b63903c98851133bced30f154e7d3155

      • \Users\Admin\AppData\Local\Temp\nsd2A4C.tmp\nsisunz.dll

        Filesize

        40KB

        MD5

        5f13dbc378792f23e598079fc1e4422b

        SHA1

        5813c05802f15930aa860b8363af2b58426c8adf

        SHA256

        6e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d

        SHA512

        9270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5

      • memory/3016-0-0x000007FEF59FE000-0x000007FEF59FF000-memory.dmp

        Filesize

        4KB

      • memory/3016-8-0x000007FEF5740000-0x000007FEF60DD000-memory.dmp

        Filesize

        9.6MB

      • memory/3016-61-0x000000001AEF0000-0x000000001AF68000-memory.dmp

        Filesize

        480KB

      • memory/3016-109-0x000007FEF5740000-0x000007FEF60DD000-memory.dmp

        Filesize

        9.6MB