Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    138s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    26/05/2024, 20:11

General

  • Target

    76af348518fffd3b633694751d5e6e90_JaffaCakes118.exe

  • Size

    362KB

  • MD5

    76af348518fffd3b633694751d5e6e90

  • SHA1

    880e2d4f647bee68d8edd2a2b649be480e5a1c9a

  • SHA256

    f8e2445d5187846a19b9138cf18a51cc2b8d590d95af57ee57bbaa68cbe8fe39

  • SHA512

    c837e7e7c45e10ddb0ca5fe6bd177b9fbea8b31ece840b3ba638fe20b5a07d57db3bce73ebdbcfa8b7b42938984c5d3e916a481f120780ba7fab3d3b2ce47bd0

  • SSDEEP

    6144:FraWkc+CrdYzNJdL38Lv1E0/Vxu1g+a/ko/+ymQVtWphD+iLiZqY+BUoEBEjMcWw:VaWh+uSzNJ21Fu1gFZIQVspzBpBUo/j9

Malware Config

Signatures

  • UAC bypass 3 TTPs 3 IoCs
  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 47 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\76af348518fffd3b633694751d5e6e90_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\76af348518fffd3b633694751d5e6e90_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1368
    • C:\Users\Admin\AppData\Local\Temp\7zS2202.tmp\Run.exe
      .\Run.exe
      2⤵
      • UAC bypass
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Sets desktop wallpaper using registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2652
      • C:\Users\Admin\AppData\Local\Temp\7zS2202.tmp\rssvnc.exe
        rssvnc.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2648
      • C:\Users\Admin\AppData\Local\Temp\7zS2202.tmp\rssvnc.exe
        rssvnc.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2724
      • C:\Users\Admin\AppData\Local\Temp\7zS2202.tmp\rssvnc.exe
        rssvnc.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2644
      • C:\Users\Admin\AppData\Local\Temp\7zS2202.tmp\rssvnc.exe
        rssvnc.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2612
      • C:\Users\Admin\AppData\Local\Temp\7zS2202.tmp\rssvnc.exe
        rssvnc.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1740
      • C:\Users\Admin\AppData\Local\Temp\7zS2202.tmp\rssvnc.exe
        rssvnc.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1952
      • C:\Users\Admin\AppData\Local\Temp\7zS2202.tmp\rssvnc.exe
        rssvnc.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1552
      • C:\Users\Admin\AppData\Local\Temp\7zS2202.tmp\rssvnc.exe
        rssvnc.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2116
      • C:\Users\Admin\AppData\Local\Temp\7zS2202.tmp\rssvnc.exe
        rssvnc.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2084
      • C:\Users\Admin\AppData\Local\Temp\7zS2202.tmp\rssvnc.exe
        rssvnc.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:560
      • C:\Users\Admin\AppData\Local\Temp\7zS2202.tmp\rssvnc.exe
        rssvnc.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zS2202.tmp\Invoice.htm

    Filesize

    6KB

    MD5

    905bcafd0c52d766fe5f07d83b5a4416

    SHA1

    cb8eb19195aec0fed9cbc7f1965953bb363bba23

    SHA256

    db30315388ecb39492d09a0e2447a2dbccc902532f284f9a25f3c95e092af1b1

    SHA512

    6f861d5e045ad192853468ccea0dfcf2292483a269776e22b38b333089a09a6ecf85843cc5aeff543c5d3acf318be32a05c1de533200a4e3b0f6690d079d2027

  • C:\Users\Admin\AppData\Local\Temp\7zS2202.tmp\helpdesk.txt

    Filesize

    569B

    MD5

    d3eff0be4491f6328b3ce63638e7f8b9

    SHA1

    ba1e42d54e47d3961f5dbc52a7a616a7d03e36af

    SHA256

    39fa64b6ba5dc2054bc669dbd19057927fc7cd039d076ecc2487624484639ed7

    SHA512

    f9e484faa4dd451ace067f5b36f1ae9376fae1e6220b744ea96c8799b56aa620a4ef054ba27adca3b3490ea855f2390fc771502d0ba468c129e74abe3a5de118

  • C:\Users\Admin\AppData\Local\Temp\7zS2202.tmp\logo.bmp

    Filesize

    23KB

    MD5

    f2c4fc28372ca1c4fa4b527ef2b396d8

    SHA1

    6adde5d8869c505f04bc1b1a6650e3a8f9f18065

    SHA256

    c94576cdcc4015ad0436add6970ba0313187c2c5a0ddb6ef18a73af68ae7e3c4

    SHA512

    6ce1c3e11281764c77710e0533909d0860430194114f82bdc68ca474fa780f437579d21cc8863aedda6a24ea69622c6badc2d58ee244979ea4fa5706f070904e

  • C:\Users\Admin\AppData\Local\Temp\7zS2202.tmp\logo.gif

    Filesize

    807B

    MD5

    983d88150a2f22337facfdde79c34a34

    SHA1

    2fbf5d1c0b9f7a0ffead8a440d2b07c9efb8270a

    SHA256

    d177fcf781f78f722b0f5f59056affa6f9db376e9fe22167fc41efeedacb70e9

    SHA512

    7db2448c0bb0b931eca4de7de29f0894432597b2bdfc65409c345c8e9a158fa9951ff84ab574ec3712602d218591f50c0942da6f5dbf682081f9b3d8066e8781

  • C:\Users\Admin\AppData\Local\Temp\7zS2202.tmp\rssvnc.exe

    Filesize

    241KB

    MD5

    0f6c7e390b1b3ba06792585e96a0e81c

    SHA1

    874cb4bba2cbfa263eba79d695bc2fc421562e3a

    SHA256

    70cae2dc05434905dcec4995a16e504a8552bcdf836f3b0f47c201e7c6f2db2e

    SHA512

    6767a1b7798ef13c8f41c6a4805dc950f53b0a73c321b3a3b59c38693232f660eafdc21b08c0ae472b17ee9639cc55d863592586f0a4deb51106b111ec3c1ad5

  • C:\Users\Admin\AppData\Local\Temp\7zS2202.tmp\settings.dat

    Filesize

    2KB

    MD5

    9053991894eb4495eae052771e20b2b0

    SHA1

    291fb1256d9df4767f1d209b1ef2f528b4ef98c4

    SHA256

    3eaad270eae612eb953494af2e20e8531f22878a44cdbea4ee579ab1dc956863

    SHA512

    653275e4dd860df1494f25a0c5fb37a2cb0637161172b838168fb5c249a5a3aa5ae925577a44d1650ea956022524b593fb17dd962c03280dac6cfd21ab3e207e

  • \Users\Admin\AppData\Local\Temp\7zS2202.tmp\Run.exe

    Filesize

    460KB

    MD5

    9149fc4df0437b1b452f6e80d528195f

    SHA1

    ead677fbd3f0ce27ad2b44ee945bda060ef6419f

    SHA256

    4e2fbd480e19e7411684eb0fb82bf9f766602a5e9ba696c50c4d1471d9a1187e

    SHA512

    24c7888510f2a1fe6905ca1bc71b81132dade8981d595c4e4e26a81f4a0858d776fd0d8b008e60e4e6343192bde53e59e5e832f351fa540fb87abaae83cb1704