Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    22/06/2024, 04:33 UTC

General

  • Target

    01468a69ca8676b51a357676e0856c88_JaffaCakes118.exe

  • Size

    2.0MB

  • MD5

    01468a69ca8676b51a357676e0856c88

  • SHA1

    4413a7f864255767a6d84c3e8362b9873a7e224b

  • SHA256

    fcccc611730474775ff1cfd4c60481deef586f01191348b07d7a143d174a07b0

  • SHA512

    d0d516c96c14e4ec5dded82e80f82a3ff6b2f8c2aae63b8f0e8667aea6e07e52e8dcf2ee7939304ef2303b07a4b8ca6e6c64f985a508d57aad79440d479d68b8

  • SSDEEP

    49152:Na175O/mZxrkaH1EN5/yxnxEil7F8vSZBWwj186KQGwi38KQrF+FO7p1FzohbJqE:uO/mZxbHW7yxnxECF8vSZBW+Pbi38KQU

Score
10/10

Malware Config

Signatures

  • Detects PlugX payload 17 IoCs
  • PlugX

    PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01468a69ca8676b51a357676e0856c88_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\01468a69ca8676b51a357676e0856c88_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Users\Admin\AppData\Local\Temp\rudiment.exe
      C:\Users\Admin\AppData\Local\Temp\rudiment.exe
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2828
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\system32\svchost.exe
        3⤵
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2556
        • C:\Windows\SysWOW64\msiexec.exe
          C:\Windows\SysWOW64\msiexec.exe
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          PID:2496
  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2736

    Network

    • flag-us
      DNS
      nttdata.otzo.com
      svchost.exe
      Remote address:
      8.8.8.8:53
      Request
      nttdata.otzo.com
      IN A
      Response
      nttdata.otzo.com
      IN A
      127.0.0.1
    • flag-us
      DNS
      nttdata.otzo.com
      svchost.exe
      Remote address:
      8.8.8.8:53
      Request
      nttdata.otzo.com
      IN A
      Response
      nttdata.otzo.com
      IN A
      127.0.0.1
    • flag-us
      DNS
      nttdata.otzo.com
      svchost.exe
      Remote address:
      8.8.8.8:53
      Request
      nttdata.otzo.com
      IN A
      Response
      nttdata.otzo.com
      IN A
      127.0.0.1
    • flag-us
      DNS
      nttdata.otzo.com
      svchost.exe
      Remote address:
      8.8.8.8:53
      Request
      nttdata.otzo.com
      IN A
      Response
      nttdata.otzo.com
      IN A
      127.0.0.1
    • flag-us
      DNS
      nttdata.otzo.com
      svchost.exe
      Remote address:
      8.8.8.8:53
      Request
      nttdata.otzo.com
      IN A
      Response
      nttdata.otzo.com
      IN A
      127.0.0.1
    • flag-us
      DNS
      nttdata.otzo.com
      svchost.exe
      Remote address:
      8.8.8.8:53
      Request
      nttdata.otzo.com
      IN A
      Response
      nttdata.otzo.com
      IN A
      127.0.0.1
    • flag-us
      DNS
      nttdata.otzo.com
      svchost.exe
      Remote address:
      8.8.8.8:53
      Request
      nttdata.otzo.com
      IN A
      Response
      nttdata.otzo.com
      IN A
      127.0.0.1
    • 127.0.0.1:443
      svchost.exe
    • 127.0.0.1:443
      svchost.exe
    • 127.0.0.1:53
      svchost.exe
    • 127.0.0.1:53
      svchost.exe
    • 127.0.0.1:80
      svchost.exe
    • 127.0.0.1:80
      svchost.exe
    • 127.0.0.1:443
      svchost.exe
    • 127.0.0.1:443
      svchost.exe
    • 127.0.0.1:443
      svchost.exe
    • 127.0.0.1:443
      svchost.exe
    • 127.0.0.1:53
      svchost.exe
    • 127.0.0.1:53
      svchost.exe
    • 127.0.0.1:80
      svchost.exe
    • 127.0.0.1:80
      svchost.exe
    • 127.0.0.1:443
      svchost.exe
    • 127.0.0.1:443
      svchost.exe
    • 127.0.0.1:443
      svchost.exe
    • 127.0.0.1:443
      svchost.exe
    • 127.0.0.1:53
      svchost.exe
    • 127.0.0.1:53
      svchost.exe
    • 127.0.0.1:80
      svchost.exe
    • 127.0.0.1:80
      svchost.exe
    • 127.0.0.1:443
      svchost.exe
    • 127.0.0.1:443
      svchost.exe
    • 127.0.0.1:443
      svchost.exe
    • 127.0.0.1:443
      svchost.exe
    • 8.8.8.8:53
      nttdata.otzo.com
      dns
      svchost.exe
      62 B
      78 B
      1
      1

      DNS Request

      nttdata.otzo.com

      DNS Response

      127.0.0.1

    • 8.8.8.8:53
      nttdata.otzo.com
      dns
      svchost.exe
      62 B
      78 B
      1
      1

      DNS Request

      nttdata.otzo.com

      DNS Response

      127.0.0.1

    • 8.8.8.8:53
      nttdata.otzo.com
      dns
      svchost.exe
      62 B
      78 B
      1
      1

      DNS Request

      nttdata.otzo.com

      DNS Response

      127.0.0.1

    • 8.8.8.8:53
      nttdata.otzo.com
      dns
      svchost.exe
      62 B
      78 B
      1
      1

      DNS Request

      nttdata.otzo.com

      DNS Response

      127.0.0.1

    • 8.8.8.8:53
      nttdata.otzo.com
      dns
      svchost.exe
      62 B
      78 B
      1
      1

      DNS Request

      nttdata.otzo.com

      DNS Response

      127.0.0.1

    • 8.8.8.8:53
      nttdata.otzo.com
      dns
      svchost.exe
      62 B
      78 B
      1
      1

      DNS Request

      nttdata.otzo.com

      DNS Response

      127.0.0.1

    • 8.8.8.8:53
      nttdata.otzo.com
      dns
      svchost.exe
      62 B
      78 B
      1
      1

      DNS Request

      nttdata.otzo.com

      DNS Response

      127.0.0.1

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\psychiatry.dat

      Filesize

      116KB

      MD5

      09a4e70560c2b595932a4582fd84bbf8

      SHA1

      8719221b5159fd47ce655fc01ec2d688ac750fb9

      SHA256

      ba5c35f51b5ebcb41dec480451c58cfa35fb86d465dc942cb55b0b16174c0772

      SHA512

      89ca096cdd1146fb317326bd9c4a9dee50b2d8bd187799073ca10e539d62b384bfaa7fb5f918c05c9347c4d9d3a8d86a4229c0c4261ca3ac0c9affb257d91b9a

    • C:\Users\Admin\AppData\Local\Temp\rudiment.exe

      Filesize

      47KB

      MD5

      b5bdaba69689e8be57ce78bb6845e4f0

      SHA1

      573c35ab1f243d6806dedbdd7e3265bc5cbd5b9a

      SHA256

      1e712adae2a543bf2fbf41691416b350c3a90561ab5f6590e520f833a9a587ad

      SHA512

      e79aaa4ac9b79ce7008155fddafc1bee58aae67d4ab6a0308702a9d47c29e83583c6786f2fa0c3812e50ef6eea1de981f5108ca752837b5edb8041236ff3c6c5

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • \Users\Admin\AppData\Local\Temp\vsodscpl.dll

      Filesize

      112KB

      MD5

      8e1e29319401aa9e83be7a298b35743e

      SHA1

      c82d8a9dd5f00559f8a6a12bd5444c105fc81744

      SHA256

      42c10c024b48b59ab485cfd570875b4e88af72847acc85f5aaaa83bc8437d431

      SHA512

      1804d936cdb5ba8d3d62815ce0d2396e4bf8f53d004771adabacd63a6728a8ff8058215d420c28c702f406b352522ee35c7e8cc832b994dd1cb710a1a1090751

    • memory/1732-6-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1732-7-0x00000000717FD000-0x0000000071808000-memory.dmp

      Filesize

      44KB

    • memory/1732-5-0x000000002FA81000-0x000000002FA82000-memory.dmp

      Filesize

      4KB

    • memory/1732-71-0x00000000717FD000-0x0000000071808000-memory.dmp

      Filesize

      44KB

    • memory/2208-0-0x0000000000C90000-0x0000000000E93000-memory.dmp

      Filesize

      2.0MB

    • memory/2208-1-0x0000000000C90000-0x0000000000E93000-memory.dmp

      Filesize

      2.0MB

    • memory/2496-65-0x00000000001A0000-0x00000000001A1000-memory.dmp

      Filesize

      4KB

    • memory/2496-67-0x0000000000780000-0x00000000007AE000-memory.dmp

      Filesize

      184KB

    • memory/2496-66-0x0000000000780000-0x00000000007AE000-memory.dmp

      Filesize

      184KB

    • memory/2496-64-0x0000000000780000-0x00000000007AE000-memory.dmp

      Filesize

      184KB

    • memory/2556-46-0x0000000000200000-0x000000000022E000-memory.dmp

      Filesize

      184KB

    • memory/2556-48-0x0000000000200000-0x000000000022E000-memory.dmp

      Filesize

      184KB

    • memory/2556-32-0x0000000000200000-0x000000000022E000-memory.dmp

      Filesize

      184KB

    • memory/2556-44-0x0000000000200000-0x000000000022E000-memory.dmp

      Filesize

      184KB

    • memory/2556-43-0x0000000000020000-0x0000000000021000-memory.dmp

      Filesize

      4KB

    • memory/2556-47-0x0000000000200000-0x000000000022E000-memory.dmp

      Filesize

      184KB

    • memory/2556-45-0x0000000000200000-0x000000000022E000-memory.dmp

      Filesize

      184KB

    • memory/2556-76-0x0000000000200000-0x000000000022E000-memory.dmp

      Filesize

      184KB

    • memory/2556-31-0x0000000000200000-0x000000000022E000-memory.dmp

      Filesize

      184KB

    • memory/2556-58-0x0000000000200000-0x000000000022E000-memory.dmp

      Filesize

      184KB

    • memory/2556-22-0x0000000000080000-0x0000000000081000-memory.dmp

      Filesize

      4KB

    • memory/2556-25-0x00000000000A0000-0x00000000000BB000-memory.dmp

      Filesize

      108KB

    • memory/2556-26-0x00000000000C0000-0x00000000000C2000-memory.dmp

      Filesize

      8KB

    • memory/2556-86-0x0000000000200000-0x000000000022E000-memory.dmp

      Filesize

      184KB

    • memory/2556-69-0x0000000000200000-0x000000000022E000-memory.dmp

      Filesize

      184KB

    • memory/2556-85-0x0000000000200000-0x000000000022E000-memory.dmp

      Filesize

      184KB

    • memory/2828-34-0x00000000003A0000-0x00000000003CE000-memory.dmp

      Filesize

      184KB

    • memory/2828-20-0x00000000003A0000-0x00000000003CE000-memory.dmp

      Filesize

      184KB

    • memory/2828-21-0x0000000001DE0000-0x0000000001EE0000-memory.dmp

      Filesize

      1024KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.