Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    02/06/2024, 17:15

General

  • Target

    8ed377a4bb27a896cc51df618d9a1f4b_JaffaCakes118.exe

  • Size

    81KB

  • MD5

    8ed377a4bb27a896cc51df618d9a1f4b

  • SHA1

    e6e0b772640ad52baa806e16911d2cf0093ce3e1

  • SHA256

    b094894ed1294c4f137ef2f4985d0d7cdaaf897daf282615780814f1aa41a958

  • SHA512

    eac4b792e89c344ec21f7842664d13dc56f260cc4a5b333c2306ee42ad41b333db02260b61f6e5446dd695506e9b5ebcef3c228dcb80608ecb5dbc476947a80e

  • SSDEEP

    1536:xFqsQSZRzMfmCj/5gXVV66VyUD6CS3f1Tqo:TnZRzImCr5glVLgUDBk1uo

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 13 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ed377a4bb27a896cc51df618d9a1f4b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8ed377a4bb27a896cc51df618d9a1f4b_JaffaCakes118.exe"
    1⤵
    • Adds policy Run key to start application
    • Sets service image path in registry
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    PID:2192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\userun32.exe

    Filesize

    81KB

    MD5

    0a0eb6e2a9d691617eebddbe47419a9d

    SHA1

    7208dbd087b70de3337b6150b20f4d5f7d052ab8

    SHA256

    f56606e23b5ae565d48dec115c759fe90be9e53b920c5eca5b447240b9a6d13f

    SHA512

    3218ef1547567b372f42c70333f5c6c84bb4053cf1069b9315bc34b5c4d0490d5dcffd7277516297e2f6678a03caed043e729c833da713ccc8efc61f221bd633

  • memory/2192-0-0x0000000000400000-0x000000000049A000-memory.dmp

    Filesize

    616KB

  • memory/2192-17-0x0000000000400000-0x000000000049A000-memory.dmp

    Filesize

    616KB

  • memory/2192-18-0x0000000000400000-0x000000000049A000-memory.dmp

    Filesize

    616KB