Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    130s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    16/06/2024, 21:04

General

  • Target

    b532da663d8f52b8c0437782f48fcc4f_JaffaCakes118.exe

  • Size

    372KB

  • MD5

    b532da663d8f52b8c0437782f48fcc4f

  • SHA1

    8f292cdaf43a14c35111905bf2c6b6f095a4ee8f

  • SHA256

    2017fd352f39a9ffea3e2cf9efa1166e41fbeeeebd7c6c7a25aa18ad212db074

  • SHA512

    82a5417ba29e0cb8e9e559f66f1eb6dcd0bd99d9c7a47debcc72a721df401fcc9c0aa6bffac7dbd87728c517ddbd708b89dd6344aa8c032934fde3c870d0caf0

  • SSDEEP

    6144:1GkORa/mgnQXgZG9PvK6pu4Dx0DrQlqK3BvN+Vz1dbroBjQmafsQQRwbreMpYSZ:VOmmgnQb9K6pVD+QEK3BvN+mjQmafsQL

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b532da663d8f52b8c0437782f48fcc4f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b532da663d8f52b8c0437782f48fcc4f_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:3052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\sad1600.tmp

    Filesize

    267KB

    MD5

    50d7a4da5f1a4f2999b0178ccec1320d

    SHA1

    443d543e7b8ffec0b84768728d38d8c285ec615f

    SHA256

    28e40d56758faad7a04678a6a2628a10eaa8df9f63f49460a65d539262453245

    SHA512

    0cdcb9e47db9e7c073381161386e9fddb19ab7848d456cbe26ab5ede44fd6ae04aab25c6dc438c458861651f1238e8ccb9976484c4d5e919cb25a5d52c165d7d

  • memory/3052-0-0x000000007481E000-0x000000007481F000-memory.dmp

    Filesize

    4KB

  • memory/3052-3-0x00000000004B0000-0x00000000004F8000-memory.dmp

    Filesize

    288KB

  • memory/3052-4-0x0000000074810000-0x0000000074EFE000-memory.dmp

    Filesize

    6.9MB

  • memory/3052-5-0x0000000074810000-0x0000000074EFE000-memory.dmp

    Filesize

    6.9MB

  • memory/3052-7-0x0000000074810000-0x0000000074EFE000-memory.dmp

    Filesize

    6.9MB

  • memory/3052-6-0x0000000074810000-0x0000000074EFE000-memory.dmp

    Filesize

    6.9MB

  • memory/3052-13-0x000000000CAE0000-0x000000000D286000-memory.dmp

    Filesize

    7.6MB

  • memory/3052-18-0x000000007481E000-0x000000007481F000-memory.dmp

    Filesize

    4KB

  • memory/3052-19-0x0000000074810000-0x0000000074EFE000-memory.dmp

    Filesize

    6.9MB

  • memory/3052-20-0x0000000074810000-0x0000000074EFE000-memory.dmp

    Filesize

    6.9MB

  • memory/3052-21-0x0000000074810000-0x0000000074EFE000-memory.dmp

    Filesize

    6.9MB