Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    20/06/2024, 04:23

General

  • Target

    02c5bc3e15e85b82b69cb54e54d31f39_JaffaCakes118.exe

  • Size

    17KB

  • MD5

    02c5bc3e15e85b82b69cb54e54d31f39

  • SHA1

    69b306c2800b85e26be89ca07cc24daa339ce35c

  • SHA256

    3a5de00e0441b0c5af70191836d235e180b7288c9aecbf11bdc8557905e06a21

  • SHA512

    98e92cde69a3cb0ef26b48f29aa4eeabab8f449eb49112395132f49eef002dc7ceeb570b0662f9b44ead233169b316530dc2c5acec550ad7d5a0d7f1ea8f5947

  • SSDEEP

    384:iErt8YuhvA2G+RReDjlFBQKokOhaDen5o2k+P6OXVy2GKvaZJI:M9FIDKv7Genir+iO02jviJI

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\services.exe
    C:\Windows\system32\services.exe
    1⤵
      PID:472
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1200
        • C:\Users\Admin\AppData\Local\Temp\02c5bc3e15e85b82b69cb54e54d31f39_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\02c5bc3e15e85b82b69cb54e54d31f39_JaffaCakes118.exe"
          2⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:2036
          • C:\Users\Admin\AppData\Local\Temp\DXDLG.EXE
            C:\Users\Admin\AppData\Local\Temp\DXDLG.EXE "C:\Users\Admin\AppData\Local\Temp\02c5bc3e15e85b82b69cb54e54d31f39_JaffaCakes118.exe"
            3⤵
            • Adds policy Run key to start application
            • Deletes itself
            • Executes dropped EXE
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2272

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\DXDLG.EXE

        Filesize

        13KB

        MD5

        28cedb3d45de4f4b97a05ca9b1585ef8

        SHA1

        3b81f21e8bbfe4e714e7f9a2b210e57d0a53bed1

        SHA256

        78dd0b409a91b053bb67476cde2bc2cdb40839e7bb11e997defcf0143e3a4199

        SHA512

        875ad35423af7d09c2726cc9ed5982bb42778dda97ab8defae1170c893e1562c8b4e188e516f27458500cc28e716750e813093431416ee755e56b06ad90325b6

      • memory/472-20-0x0000000000030000-0x0000000000031000-memory.dmp

        Filesize

        4KB