Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    20/06/2024, 10:37

General

  • Target

    0533b69d741773439f14d7808e58c559_JaffaCakes118.exe

  • Size

    685KB

  • MD5

    0533b69d741773439f14d7808e58c559

  • SHA1

    0e18afa8cb2f24798fdb1651d71d19b42d40e744

  • SHA256

    4a408a2e04873171627e27a9a20104897532a89047a9270e74f1f093a58d96dc

  • SHA512

    c83c4449b8bca37804b0ff4b4c9b4cfb0b41c9283d378ab425e3ce1144821f82c8421525df32eb525a80ecb2b3f95ef46016bf76e6870d4275e44ebcd4266159

  • SSDEEP

    12288:YQBB+PpV8eiQIHprnZb27VNLpHGgmzkF3Z4mxxGtBfuTGKExGRZSon:YRviNHFnZyR3Hk4QmXimTkID

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0533b69d741773439f14d7808e58c559_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0533b69d741773439f14d7808e58c559_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1433.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1433.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2808
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Windows\61642520.BAT
        3⤵
          PID:1664
    • C:\Windows\Hacker.com.cn.exe
      C:\Windows\Hacker.com.cn.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2552
      • C:\windows\SysWOW64\svchost.exe
        C:\windows\system32\svchost.exe
        2⤵
          PID:2152

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\61642520.BAT

        Filesize

        156B

        MD5

        1a40ea10df5becb48aa35ab4b8879e6e

        SHA1

        a665eeb782a7cd5a10c05ee8ab09a17b413d9ecb

        SHA256

        0bb381aca42d4bfd61befc9f16577efc8bc2e6df08fbc6c0570e6e1f1a4894cb

        SHA512

        649c12aa03c87257fcd57127c64a3c907fab658bc71378f2975d35855cf2ea7905ca3713df270c826022583238b558a04d861e204620e0f6279293ac184a4915

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\1433.exe

        Filesize

        743KB

        MD5

        b16487f2584769da1fb7c3f210fb67b2

        SHA1

        95b5636d918db5d6ba2afea0faeb1ace661fa330

        SHA256

        f55dc032720027c7a18e346471b01294f145ec8935a62dc9902d8548ad2eb42d

        SHA512

        2201fc766ca8ac3b689377c15373e3fc3dae98b6ca0d14bfd7a1e2e68f964361c9495f5f8b8afe283f8be9f44e0ea189e07328677ad26ba39d6e008afbbdf2d5

      • memory/2032-0-0x0000000001000000-0x0000000001110000-memory.dmp

        Filesize

        1.1MB

      • memory/2032-1-0x00000000001C0000-0x0000000000214000-memory.dmp

        Filesize

        336KB

      • memory/2032-2-0x00000000003F0000-0x00000000003F1000-memory.dmp

        Filesize

        4KB

      • memory/2032-9-0x0000000003170000-0x0000000003171000-memory.dmp

        Filesize

        4KB

      • memory/2032-8-0x0000000000440000-0x0000000000441000-memory.dmp

        Filesize

        4KB

      • memory/2032-7-0x0000000000450000-0x0000000000451000-memory.dmp

        Filesize

        4KB

      • memory/2032-6-0x0000000000220000-0x0000000000221000-memory.dmp

        Filesize

        4KB

      • memory/2032-5-0x0000000000230000-0x0000000000231000-memory.dmp

        Filesize

        4KB

      • memory/2032-4-0x0000000000460000-0x0000000000461000-memory.dmp

        Filesize

        4KB

      • memory/2032-3-0x0000000000250000-0x0000000000251000-memory.dmp

        Filesize

        4KB

      • memory/2032-10-0x0000000000700000-0x0000000000701000-memory.dmp

        Filesize

        4KB

      • memory/2032-12-0x0000000003170000-0x0000000003171000-memory.dmp

        Filesize

        4KB

      • memory/2032-15-0x0000000003170000-0x0000000003171000-memory.dmp

        Filesize

        4KB

      • memory/2032-14-0x0000000003170000-0x0000000003171000-memory.dmp

        Filesize

        4KB

      • memory/2032-13-0x0000000003170000-0x0000000003171000-memory.dmp

        Filesize

        4KB

      • memory/2032-11-0x0000000003170000-0x0000000003171000-memory.dmp

        Filesize

        4KB

      • memory/2032-16-0x0000000003170000-0x0000000003171000-memory.dmp

        Filesize

        4KB

      • memory/2032-51-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2032-72-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2032-71-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2032-70-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2032-69-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2032-68-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2032-17-0x0000000003170000-0x0000000003171000-memory.dmp

        Filesize

        4KB

      • memory/2032-67-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2032-66-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2032-65-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2032-64-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2032-63-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2032-62-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2032-61-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2032-60-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2032-59-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2032-58-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2032-57-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2032-56-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2032-55-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2032-54-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2032-53-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2032-52-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2032-50-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2032-49-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2032-48-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2032-47-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2032-46-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2032-45-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2032-44-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2032-43-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2032-42-0x0000000003170000-0x0000000003171000-memory.dmp

        Filesize

        4KB

      • memory/2032-41-0x0000000003170000-0x0000000003171000-memory.dmp

        Filesize

        4KB

      • memory/2032-40-0x0000000003170000-0x0000000003171000-memory.dmp

        Filesize

        4KB

      • memory/2032-39-0x0000000003170000-0x0000000003171000-memory.dmp

        Filesize

        4KB

      • memory/2032-38-0x0000000003170000-0x0000000003171000-memory.dmp

        Filesize

        4KB

      • memory/2032-37-0x0000000003170000-0x0000000003171000-memory.dmp

        Filesize

        4KB

      • memory/2032-36-0x0000000000D80000-0x0000000000D81000-memory.dmp

        Filesize

        4KB

      • memory/2032-35-0x0000000000D90000-0x0000000000D91000-memory.dmp

        Filesize

        4KB

      • memory/2032-34-0x0000000000D20000-0x0000000000D21000-memory.dmp

        Filesize

        4KB

      • memory/2032-33-0x0000000000D30000-0x0000000000D31000-memory.dmp

        Filesize

        4KB

      • memory/2032-32-0x0000000000D50000-0x0000000000D51000-memory.dmp

        Filesize

        4KB

      • memory/2032-31-0x0000000000D70000-0x0000000000D71000-memory.dmp

        Filesize

        4KB

      • memory/2032-30-0x0000000000C90000-0x0000000000C91000-memory.dmp

        Filesize

        4KB

      • memory/2032-29-0x0000000000D00000-0x0000000000D01000-memory.dmp

        Filesize

        4KB

      • memory/2032-28-0x0000000000CD0000-0x0000000000CD1000-memory.dmp

        Filesize

        4KB

      • memory/2032-27-0x0000000000CE0000-0x0000000000CE1000-memory.dmp

        Filesize

        4KB

      • memory/2032-26-0x0000000000720000-0x0000000000721000-memory.dmp

        Filesize

        4KB

      • memory/2032-25-0x0000000000C80000-0x0000000000C81000-memory.dmp

        Filesize

        4KB

      • memory/2032-24-0x0000000000CF0000-0x0000000000CF1000-memory.dmp

        Filesize

        4KB

      • memory/2032-23-0x0000000000CA0000-0x0000000000CA1000-memory.dmp

        Filesize

        4KB

      • memory/2032-22-0x0000000000CC0000-0x0000000000CC1000-memory.dmp

        Filesize

        4KB

      • memory/2032-21-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2032-20-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2032-19-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2032-18-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2032-97-0x00000000001C0000-0x0000000000214000-memory.dmp

        Filesize

        336KB

      • memory/2032-96-0x0000000001000000-0x0000000001110000-memory.dmp

        Filesize

        1.1MB

      • memory/2152-101-0x0000000000400000-0x00000000004C2000-memory.dmp

        Filesize

        776KB

      • memory/2152-99-0x0000000000400000-0x00000000004C2000-memory.dmp

        Filesize

        776KB

      • memory/2152-98-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2552-103-0x0000000000400000-0x00000000004C2000-memory.dmp

        Filesize

        776KB

      • memory/2808-94-0x0000000000400000-0x00000000004C2000-memory.dmp

        Filesize

        776KB