Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20/06/2024, 00:44

General

  • Target

    017f249f7f50947ca4fe9d6765544561_JaffaCakes118.exe

  • Size

    1.3MB

  • MD5

    017f249f7f50947ca4fe9d6765544561

  • SHA1

    d4ec1bceca0865236638ddc62b6f1d230958107a

  • SHA256

    72c6bb6a226f32a39ace5d7fdcb6ad2a4082eea2b0af993761f69c2789504743

  • SHA512

    84b45a67f5552d022d28fe853611123949955fe7abb836554d90ba8cf2b0aa45bb14e2017cb12a47cf6e3af34ea420da0d30f5e160e39b405c4c564578756d78

  • SSDEEP

    24576:YWpDu4Aw/eQ7VE8DOY5tSToOTepRSipNhvj1uj6g9eCwl5uRDFp1:PQVQREnHB8Si/hvc9Gnujp1

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\017f249f7f50947ca4fe9d6765544561_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\017f249f7f50947ca4fe9d6765544561_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Users\Admin\AppData\Local\Temp\is-09BP1.tmp\is-6MNP5.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-09BP1.tmp\is-6MNP5.tmp" /SL4 $6014E C:\Users\Admin\AppData\Local\Temp\017f249f7f50947ca4fe9d6765544561_JaffaCakes118.exe 1109755 51200
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      PID:1928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\is-09BP1.tmp\is-6MNP5.tmp

    Filesize

    606KB

    MD5

    a786351eeeeb9a29aaeec83417a70802

    SHA1

    17464f0512ce1a42d8f00b463eff6ee4663b81dd

    SHA256

    dc48b8861dffcf9a5979a8296a7d798a01997ad19ae9bba31d8de07b76d84fb1

    SHA512

    221edcaf8c21172dbf223a3440fbdf161fa6fccd5f4be84bfd84c7e857e569f96e4804a96043147e57d97ac7e94034a643762be1f71732089f480b4d3f3e3dc1

  • \Users\Admin\AppData\Local\Temp\is-SU407.tmp\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • memory/1928-15-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/2188-0-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2188-2-0x0000000000401000-0x000000000040A000-memory.dmp

    Filesize

    36KB

  • memory/2188-14-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB