Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    20/06/2024, 06:45 UTC

General

  • Target

    03c00294c6f2518753f2d488d1052d2a_JaffaCakes118.exe

  • Size

    623KB

  • MD5

    03c00294c6f2518753f2d488d1052d2a

  • SHA1

    b618801d54fce568c6250a5f98dc009e9c98ad4e

  • SHA256

    102fc74774e79c55c34c8514d9e289e415df28654b002a438a9a6ef4cdfbce6d

  • SHA512

    80a2fbd1e63e4ca283678a93070d01537a0abf8b53473ed3fe263d103d31ecfc162b6a760e857c50e0bf4a6ff1e4a76457bd024fa6d2542bc1fbdbf348caec3d

  • SSDEEP

    12288:fS30HfNDAFEWpUewI9JE1BbH0VF3Z4mxx2DqVTVOCY8u3TsY:xFEFEWpXwI3eH0VQmXVVTzzu

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03c00294c6f2518753f2d488d1052d2a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\03c00294c6f2518753f2d488d1052d2a_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1304
    • C:\Program Files\Common Files\Microsoft Shared\MSInfo\IEFILES.INI
      "C:\Program Files\Common Files\Microsoft Shared\MSInfo\IEFILES.INI"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      PID:2408
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c c:\Uinstall.bat
      2⤵
      • Deletes itself
      PID:2596
  • C:\Windows\SysWOW64\csrsser
    C:\Windows\SysWOW64\csrsser
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    PID:2712

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Uinstall.bat

    Filesize

    212B

    MD5

    7aa1c90a4d3a360a7308ebb675c723fd

    SHA1

    087ebe75e98d2d6433f0b55270078c39c5ac46fa

    SHA256

    2c0aae3295e2dafb9bd328edb6956ed8513becd9f4ae3af6c55a439974a3bcfb

    SHA512

    14f3637cbb88dea26528c622161a20db9cf6e7ff1dd3a6bdc544120a70ff2202af983e0ced8eb7e9899c52f21f108696eaff4c4d11ef697ea496297ce0902a1e

  • \Program Files\Common Files\Microsoft Shared\MSInfo\IEFILES.INI

    Filesize

    593KB

    MD5

    514ebd73e918413721ac5a9e3268d50c

    SHA1

    2451a3643ba3c232e973e33d011fe63c225bbd67

    SHA256

    c02182fecf9c1b7fae0503116bb7c0ed885f05b8b52de22f0d4de0b0923fd31a

    SHA512

    03462febb4bc2166bc2126c19db4726b52a1fea61fc364004dc3b7b3aa7153cca2f45061f83ef5177e77cdb57f3c81fa2389666b0c6a0f259f3faaeaf254ca37

  • memory/1304-4-0x0000000002D50000-0x0000000002E5A000-memory.dmp

    Filesize

    1.0MB

  • memory/1304-47-0x0000000000400000-0x00000000004A2000-memory.dmp

    Filesize

    648KB

  • memory/1304-10-0x0000000002D50000-0x0000000002E5A000-memory.dmp

    Filesize

    1.0MB

  • memory/2408-21-0x0000000000560000-0x0000000000561000-memory.dmp

    Filesize

    4KB

  • memory/2408-17-0x0000000000540000-0x0000000000541000-memory.dmp

    Filesize

    4KB

  • memory/2408-26-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/2408-25-0x0000000003300000-0x0000000003301000-memory.dmp

    Filesize

    4KB

  • memory/2408-24-0x00000000033B0000-0x00000000033B1000-memory.dmp

    Filesize

    4KB

  • memory/2408-23-0x00000000032B0000-0x00000000032B3000-memory.dmp

    Filesize

    12KB

  • memory/2408-22-0x00000000032C0000-0x00000000032C1000-memory.dmp

    Filesize

    4KB

  • memory/2408-28-0x00000000032D0000-0x00000000032D1000-memory.dmp

    Filesize

    4KB

  • memory/2408-20-0x00000000005D0000-0x00000000005D1000-memory.dmp

    Filesize

    4KB

  • memory/2408-19-0x00000000005A0000-0x00000000005A1000-memory.dmp

    Filesize

    4KB

  • memory/2408-18-0x00000000005B0000-0x00000000005B1000-memory.dmp

    Filesize

    4KB

  • memory/2408-27-0x0000000000300000-0x0000000000301000-memory.dmp

    Filesize

    4KB

  • memory/2408-16-0x0000000000550000-0x0000000000551000-memory.dmp

    Filesize

    4KB

  • memory/2408-15-0x00000000005C0000-0x00000000005C1000-memory.dmp

    Filesize

    4KB

  • memory/2408-14-0x0000000000570000-0x0000000000571000-memory.dmp

    Filesize

    4KB

  • memory/2408-13-0x0000000000590000-0x0000000000591000-memory.dmp

    Filesize

    4KB

  • memory/2408-11-0x0000000000400000-0x000000000050A000-memory.dmp

    Filesize

    1.0MB

  • memory/2408-38-0x0000000000400000-0x000000000050A000-memory.dmp

    Filesize

    1.0MB

  • memory/2408-39-0x0000000000360000-0x00000000003B4000-memory.dmp

    Filesize

    336KB

  • memory/2408-12-0x0000000000360000-0x00000000003B4000-memory.dmp

    Filesize

    336KB

  • memory/2712-36-0x0000000000400000-0x000000000050A000-memory.dmp

    Filesize

    1.0MB

  • memory/2712-33-0x0000000000400000-0x000000000050A000-memory.dmp

    Filesize

    1.0MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.