Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    13/06/2024, 06:28

General

  • Target

    a434202ac3de751db68069fc3aec25d3_JaffaCakes118.exe

  • Size

    780KB

  • MD5

    a434202ac3de751db68069fc3aec25d3

  • SHA1

    235e30c3e08a0d9a7a57490d802ee151ba38ef2d

  • SHA256

    b750f083991480d06e2ecce65bf38f3fb33acdcd5c14b2abaaceb48d00929e67

  • SHA512

    f24a053dfe22c8a87e023338671bd63b67b1b965f278538451eda217e91b0ac12fcc53087903a4a2e65127a099e144cddf5c3c56a86b782ae4fc520cf83e0771

  • SSDEEP

    24576:ZMMpXS0hN0V0HUSGB2uJ2s4otqFCJrW9FqvSbqsHasgXhFHDAGtlRXZ+CP63n0Nb:Kwi0L0qJi

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Renames multiple (91) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Drops startup file 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a434202ac3de751db68069fc3aec25d3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a434202ac3de751db68069fc3aec25d3_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops startup file
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Windows\SysWOW64\HelpMe.exe
      C:\Windows\system32\HelpMe.exe
      2⤵
      • Modifies WinLogon for persistence
      • Drops startup file
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in System32 directory
      PID:2136

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2737914667-933161113-3798636211-1000\desktop.ini.exe

    Filesize

    781KB

    MD5

    a7a86484a1d2d8f0da1cafced4152173

    SHA1

    5f809a8682702e636c5319a721a24d6e76f8d77e

    SHA256

    12a9d66cda2eaf82f13021d08cb5fee14eca2a45a19ccdef1fa7510e2fa4242f

    SHA512

    bee9a8616bf367e15777784d4d5d97ca9431b5ab7a742bf14163ce465a79ea1329b5bac3ec2d656c510927b59ea79ee8c6fa9bc23d60106f1bc55be46022fd9a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    950B

    MD5

    e29b9ddf5bec91bde3e5f5cef2c820d1

    SHA1

    f0ef9c6b6e9646a9cde3fa956ae11c7a09bd5d1a

    SHA256

    3780d6503ca43e60832ef5f03d9b5a5ac030ead966b5f5202e9b5288de96f548

    SHA512

    680e7325fce62b3d7d7609070b64a6530c7abc9ec3c915163c64cd6984cc984914885a9b552bffa6a1084437bbd76dbc689c71f582cafdffa2e8995251db9759

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Soft.lnk

    Filesize

    1KB

    MD5

    964df02d27327efcf71271b198e001c9

    SHA1

    93a681f1178f517ddf691c31531a8b4b74baef31

    SHA256

    82ba4ef97015d1ad776efcf5912513959849a28dc51dcf35114daaa161c43cfb

    SHA512

    4d7ebc4b956840b982e0ab3a4eabdb8aff3e1532fc7ee3a58c30e0ff3074b20f4a01b509f8a556935c22e8a78131d8fcb7188ccde5de610389d3844e9b3025c3

  • F:\AUTORUN.INF

    Filesize

    145B

    MD5

    ca13857b2fd3895a39f09d9dde3cca97

    SHA1

    8b78c5b2ec97c372ebdcef92d14b0998f8dd6dd0

    SHA256

    cfe448b4506a95b33b529efa88f1ac704d8bdf98a941c065650ead27609318ae

    SHA512

    55e5b5325968d1e5314527fb2d26012f5aae4a1c38e305417be273400cb1c6d0c22b85bddb501d7a5720a3f53bb5caf6ada8a7894232344c4f6c6ef85d226b47

  • F:\AutoRun.exe

    Filesize

    780KB

    MD5

    a434202ac3de751db68069fc3aec25d3

    SHA1

    235e30c3e08a0d9a7a57490d802ee151ba38ef2d

    SHA256

    b750f083991480d06e2ecce65bf38f3fb33acdcd5c14b2abaaceb48d00929e67

    SHA512

    f24a053dfe22c8a87e023338671bd63b67b1b965f278538451eda217e91b0ac12fcc53087903a4a2e65127a099e144cddf5c3c56a86b782ae4fc520cf83e0771

  • \Windows\SysWOW64\HelpMe.exe

    Filesize

    779KB

    MD5

    98c8b6e613ca213dd89bff54b75b5534

    SHA1

    ef940a182850b2d1d8fc35e2aeae8843264bc0df

    SHA256

    f0d8068267cf50759aa827a4622d86118a533de819b5e4f3d4756ed9b6b96c98

    SHA512

    eb4ad28e0efd142de1e473464f4e258ff2ba63dc7126f814403bc36ca427c6ad038c47ce370e11b40f716f17499afd0026d4192bfa433f75c6aca782160dc595

  • memory/1700-269-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1700-289-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1700-226-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1700-365-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1700-236-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1700-359-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1700-238-0x00000000003A0000-0x00000000003A1000-memory.dmp

    Filesize

    4KB

  • memory/1700-349-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1700-247-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1700-259-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1700-339-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1700-0-0x00000000003A0000-0x00000000003A1000-memory.dmp

    Filesize

    4KB

  • memory/1700-327-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1700-279-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1700-319-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1700-309-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/1700-299-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2136-270-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2136-248-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2136-227-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2136-310-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2136-280-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2136-320-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2136-300-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2136-260-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2136-290-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2136-340-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2136-328-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2136-350-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2136-237-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2136-360-0x0000000000400000-0x0000000000478000-memory.dmp

    Filesize

    480KB

  • memory/2136-10-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB