Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    20/06/2024, 00:55 UTC

General

  • Target

    018c1c876ead95e84b7b9a081f4592b4_JaffaCakes118.exe

  • Size

    340KB

  • MD5

    018c1c876ead95e84b7b9a081f4592b4

  • SHA1

    9db71ef9a021017abf1874afff0c4d97629211b6

  • SHA256

    9e81e3ade315a3c6faf9adb8144de1335ef232b5f57ee00c237bafcf0c6d7aee

  • SHA512

    1191a58c5395f2c3f5f0a88169bb215ac325a1aa22dad9475157d39b0c29101d22d52c5cc64df89a3e1d23ae95452810ea4a82815e2d76172fa44e0d80115c80

  • SSDEEP

    6144:G0PEtTPkAuAfjlJuj3QjgJ6snJZ/RjY07qVyLOyFTzVxh3VAitO8yb8D/3/:G0m3blK36QhuIOyFHxlAaO8ye3/

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\018c1c876ead95e84b7b9a081f4592b4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\018c1c876ead95e84b7b9a081f4592b4_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c timeout 5 && del C:\Users\Admin\AppData\Local\Temp\018C1C~1.EXE
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:1808
      • C:\Windows\SysWOW64\timeout.exe
        timeout 5
        3⤵
        • Delays execution with timeout.exe
        PID:3020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.