Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24/06/2024, 15:59

General

  • Target

    09760e935e89ebe55bce3b0e6ac51458_JaffaCakes118.exe

  • Size

    96KB

  • MD5

    09760e935e89ebe55bce3b0e6ac51458

  • SHA1

    20afaed827dec36628c91294566cccfc60f85fb2

  • SHA256

    c1914827c240a42b977b9fc07ff9fec9b04f7cb44dfbd7128b4b45f75bb0f377

  • SHA512

    af6d85518162740d97a450f3f964edaa6a4111472d51546e2681f382c363c2174171ea38086b8f829075f582034fe3ed635aadeb629dc73e4d66433b5125b472

  • SSDEEP

    1536:zQQBHXf6cO/hYikGulSc16l6u+NMMl/KlYv1Tq5ThFQNIjnZT:nEhKlu8CFFQCnh

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09760e935e89ebe55bce3b0e6ac51458_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\09760e935e89ebe55bce3b0e6ac51458_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Users\Admin\dwgoc.exe
      "C:\Users\Admin\dwgoc.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1320

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\dwgoc.exe

    Filesize

    96KB

    MD5

    c3c3fb8cb02f5ce59a1f96bc6db85564

    SHA1

    a006d69a3f22cf91643635068d58cd9e4ccc8494

    SHA256

    a033cd527a31592e9ead5fef81a4082038fc2d9b5fda23e393f397cf9c9324f3

    SHA512

    e41ca8715f93053056ce4e50cd1015fe3f7be409954c15be1448eedbfe7b870aa11bf2e851714a1d66a5e62af1a910c11da5017d54964a185c47179dd3a63548