Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    24/06/2024, 00:56

General

  • Target

    062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe

  • Size

    2.1MB

  • MD5

    062da5ec522ef2327980c5a01df9bb50

  • SHA1

    52392d69ef4637c355932844d439c7088aaa3c93

  • SHA256

    c3f12828a48bf02b217912410a4cd858d941dcb0114699239563693b9bc47a8c

  • SHA512

    cb840a6441f80ace0c6e700f49ab1f134ac34f8ba77391e65ec7e3461e1bb060500eb8335bc7d0030606a54f1034ee7357f7a45e1df35b3adf2af6aeca594040

  • SSDEEP

    49152:YhhJRihXvdFlIn9H9EzxrL6IJZFOsxpKv/4dbjgfhjQmhoKiGPwT3Ng:sMxb4o7XFOaKv/4afhjDiPT6

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 19 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Runs regedit.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\062da5ec522ef2327980c5a01df9bb50_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1912
    • C:\Windows\SysWOW64\regedit.exe
      regedit
      2⤵
      • Runs regedit.exe
      PID:2720
    • C:\Users\Admin\AppData\Local\Temp\winrar
      C:\Users\Admin\AppData\Local\Temp\winrar
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\winrar

    Filesize

    1.3MB

    MD5

    1f1fc87429d791bdb9f6af0b9316774c

    SHA1

    32e1068ef81486e82dc624603f6d59865aaf3770

    SHA256

    7e8d6673cab96330d3bfc7ba6fb5fd7cfe67429e93a5c281989f33b27e84fd88

    SHA512

    3079aa0aa3b92108d231c637a74957c30ed8763a696176ccf99eab6e08588b2c1ecd68b193fc2a1a262bec002367d1c37cb77a7059ea2229388568cadeec2988

  • \Users\Admin\AppData\Local\Temp\zhichiku\HtmlView.fne

    Filesize

    212KB

    MD5

    4c9e8f81bf741a61915d0d4fc49d595e

    SHA1

    d033008b3a0e5d3fc8876e0423ee5509ecb3897c

    SHA256

    951d725f4a12cd4ff713ca147fa3be08a02367db6731283c3f1ba30445990129

    SHA512

    cf2c6f8f471c8a5aad563bc257035515860689b73ce343599c7713de8bc8338a031a722f366e005bc1907d6fc97b68b8b415e8ff05b7324fb1040c5dc02315d7

  • \Users\Admin\AppData\Local\Temp\zhichiku\eAPI.fne

    Filesize

    312KB

    MD5

    936745bac5c873ab1a91478d27894626

    SHA1

    9ed92393f95692339ce03a8f1498f80c727e0555

    SHA256

    edfbe514d330e942ecd50dd7331659d59df27668e762d5a00e43df67f5f08630

    SHA512

    32d15337ab7a62ff25802c04bd782f5be36012f1a5251d962226a8e8e2daa7bc0a35b9cbfb67889d3b9dbc5f6cc51f924bae963ae12619249b22f2cc9aa2bbd4

  • \Users\Admin\AppData\Local\Temp\zhichiku\krnln.fnr

    Filesize

    1.1MB

    MD5

    cf46bb62a1ba559ceb0fad7a5d642f28

    SHA1

    80b63dd193e84bfacbe535587dd38471b8ea2c24

    SHA256

    fe4bba1a99b332c8bbd196d3a2f3c78d9edc8f212842ff2efef17eba38427f67

    SHA512

    1f71f31fdc1ef7695d7a6e79218a9192804178bb2af80486de4f8ff3d7e176860813a61fa265bf78fe4ff722a85b72798938d715d8a2a034ac759505197a1058

  • \Users\Admin\AppData\Local\Temp\zhichiku\shell.fne

    Filesize

    40KB

    MD5

    d54753e7fc3ea03aec0181447969c0e8

    SHA1

    824e7007b6569ae36f174c146ae1b7242f98f734

    SHA256

    192608ff371400c1529aa05f1adba0fe4fdd769fcbf35ee5f8b4f78a838a7ec9

    SHA512

    c25ed4cb38d5d5e95a267979f0f3f9398c04a1bf5822dceb03d6f6d9b4832dfb227f1e6868327e52a0303f45c36b9ba806e75b16bd7419a7c5203c2ecbae838f

  • memory/1912-0-0x0000000000400000-0x0000000000555000-memory.dmp

    Filesize

    1.3MB

  • memory/1912-9-0x0000000000220000-0x0000000000258000-memory.dmp

    Filesize

    224KB

  • memory/1912-13-0x0000000001FB0000-0x0000000001FC1000-memory.dmp

    Filesize

    68KB

  • memory/1912-20-0x0000000005140000-0x000000000519D000-memory.dmp

    Filesize

    372KB

  • memory/1912-34-0x0000000000400000-0x0000000000555000-memory.dmp

    Filesize

    1.3MB

  • memory/2896-39-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB