Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    15/05/2024, 23:19

General

  • Target

    48840e75e64b02bf18673f76b1fc8099_JaffaCakes118.exe

  • Size

    171KB

  • MD5

    48840e75e64b02bf18673f76b1fc8099

  • SHA1

    09daa48ca115def70eb17711cc39d5941e899f3a

  • SHA256

    bf9080cd5bebe5a74497bcf9e8d881fbb240a3c314b8a474a24f859b1e2acf27

  • SHA512

    ff6a002d388a6fca20663fc9d3143d0fecf17198ca9a810a35e1f9d17e4292c2653d4b883940793271b4f1a6fd0af142a5fb6ded9587b9966ebe0b035d15a7bc

  • SSDEEP

    3072:ViyJwUtg9AHnOSrHGwtE/BVgshWjte4Yz7Js707xJJyBfhhdzg2WAA:dtJHnOSgSDW7Jso7xJJyHhrA

Score
8/10

Malware Config

Signatures

  • Manipulates Digital Signatures 1 TTPs 1 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Executes dropped EXE 2 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\48840e75e64b02bf18673f76b1fc8099_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\48840e75e64b02bf18673f76b1fc8099_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Windows\system32\cmd.exe
      "C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\A0F.tmp\ImportCert.bat "C:\Users\Admin\AppData\Local\Temp\48840e75e64b02bf18673f76b1fc8099_JaffaCakes118.exe""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2744
      • C:\Windows\system32\certutil.exe
        CERTUTIL -f -p L3t1z1a0 -importpfx ".\rds.siciliasds.it.pfx"
        3⤵
          PID:1316
        • C:\Users\Admin\AppData\Local\Temp\A0F.tmp\importpfx.exe
          importpfx.exe -f ".\rds.siciliasds.it.pfx" -p "L3t1z1a0" -t BISMIZHX -s "Trusted Root Certification Authorities"
          3⤵
          • Manipulates Digital Signatures
          • Executes dropped EXE
          • Modifies system certificate store
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          PID:2656
        • C:\Windows\system32\certutil.exe
          CERTUTIL -addstore -enterprise -f "Root" "CertificatoVPN_SDS_NoKey.cer"
          3⤵
            PID:2684
          • C:\Users\Admin\AppData\Local\Temp\A0F.tmp\fart.exe
            fart.exe c:\caaf\digidoc_bcccf691\digidoc.qrl 172.17.1.21 tomcat.sdscgilsicilia.it
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            PID:2508

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\A0F.tmp\CertificatoVPN_SDS_NoKey.cer

        Filesize

        716B

        MD5

        744100de92e6ca86acd381ed134bf17f

        SHA1

        90c0f866fffdd1073ac10179bb16b134aee29a62

        SHA256

        92bbf1aea67968437f9a32b1f6d49fec179ff04af52702b1a83ef766c9550732

        SHA512

        e0777e11ffc5d4023f907288a55f1e7d0dbc581342f8d0482b82be52f4da282e6252f6a9cba813eedd0282099115505ff829f9cd496bbc6ece8782c7f9e0ec99

      • C:\Users\Admin\AppData\Local\Temp\A0F.tmp\ImportCert.bat

        Filesize

        644B

        MD5

        e5a2a4598bb7ce50a3198cad87629ef5

        SHA1

        e0921a1196b9677d78d6347dea1e2c273783079d

        SHA256

        f28ad3bc65f1fec57e269a079f8f716fedbf900d6e8daea3dd223d1a6a932ad1

        SHA512

        f09500a773bd4897d08e6c93ada4d73018b79631ee76f34bd7e51562e21a737576995feffc209c999f64caa83fc9dde507971bafeef849934ed9f2e9a92938ff

      • C:\Users\Admin\AppData\Local\Temp\A0F.tmp\fart.exe

        Filesize

        68KB

        MD5

        25936f3ce854af30d298199102a845a1

        SHA1

        f6e0452325d7d325d802fbb1aa367cec50c37a03

        SHA256

        c9ef35bed70ffa0981bafd0071185b56fdad8f9c97f3582a4dae9b420959fb97

        SHA512

        98fcb3a19f7eab55122d9657e4616146136a1039bb896689a0d39289a9ed7808122d27c5e31cce3df05960692156fe2223d5ea2c01fddae1cbf1c3ed497349d5

      • C:\Users\Admin\AppData\Local\Temp\A0F.tmp\importpfx.exe

        Filesize

        36KB

        MD5

        feaa36badce5cdb3172799adef6dfbfb

        SHA1

        ce97af15eb7ebde0e26b74323728da4340e8fcee

        SHA256

        baf5227825effdd59086816d2e757bf8d2bac7d1164cb50333d45af581c2d22a

        SHA512

        aec22f9ae9dfe7b24c2ebf34caf3cbae432255074346f0ab712d1bc1795250f24b421f76cff20475cfde291ce81bc478c4f284b6f9659e3cee77f9c9dd41ea55

      • C:\Users\Admin\AppData\Local\Temp\A0F.tmp\rds.siciliasds.it.pfx

        Filesize

        2KB

        MD5

        984f8a7fa03463b7386ea064f6743ab8

        SHA1

        b47947cb63be40044129b0572e16832a5a61397d

        SHA256

        fd4b7207296164c7fa88414fac54cd3d7316f22739505ae4047a5e5d75374d5f

        SHA512

        095de0c9a5d2b33d27672493d293829ba63f0b7dbe8bc8cbcdf789f861e594318762928aab8464111ef5c6eb8b49fef22b44492c4f6f6394b3121e0c1be09cfc

      • memory/2508-27-0x0000000000400000-0x0000000000424000-memory.dmp

        Filesize

        144KB