Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    25/06/2024, 06:21

General

  • Target

    0cffb15d2a92d4169dbef0e7bedc4d0e_JaffaCakes118.exe

  • Size

    833KB

  • MD5

    0cffb15d2a92d4169dbef0e7bedc4d0e

  • SHA1

    7e53ee3117a5557a6f0dc3955f4aa1c0f49cfc9b

  • SHA256

    f12ddd573b5b3e7f29858254e43a73f962f56480651af0ef5029e463339bde33

  • SHA512

    e251dc8ea6c0bd7ec461dbb0485f78e371d19caa08c84bb0818636122abc5c5c7ec1f2ba9c92cf18ca955b3c114f21848ae057f34750ed46dde8469f505ce218

  • SSDEEP

    12288:Rg8nSmRYJAo1e0Vl3kFb9d8ZaAlhHfflAaTcS3yv7sbuVHU9V8cwCoGH+c+sBYlq:dnSmeJhZVlOb9d8Zj3ifqV8chP

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 27 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0cffb15d2a92d4169dbef0e7bedc4d0e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0cffb15d2a92d4169dbef0e7bedc4d0e_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Users\Admin\AppData\Roaming\winService.exe
      C:\Users\Admin\AppData\Roaming\winService.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2304
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c "\Users\Admin\AppData\Roaming\nsc.bat"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1556
        • C:\Windows\SysWOW64\net.exe
          net user Admin
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1540
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 user Admin
            5⤵
              PID:2152

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\nsc.bat

      Filesize

      30B

      MD5

      feb2938b8163ba65810107ec6f1bb145

      SHA1

      ac706fdc612336a2a7beeb75a8aab81284459dd9

      SHA256

      75cd9d5b5a05ad0a0bc8d299dae8425fdc6a54a6618e1e0ddc181bcad1986893

      SHA512

      c300ddcb62d6bb9d740263241d1de7505d8e54726a9a08f44ffed03b293df9ae512d3e74910bfebd46d047164af4b879f07b54747b7db7a4c235875e53cefcc8

    • C:\Users\Admin\AppData\Roaming\nsc.dll

      Filesize

      849B

      MD5

      8c053448a556a89891e4836675b87bbb

      SHA1

      9b24d5b3e2dc3cc5cf3b84828f1a5bd0a2c5195b

      SHA256

      1bcf6d815fe8b36ec024d347bbcd071f8534c289105c2bf5a040c2e535bb2143

      SHA512

      90b5c58c8f2af1e6126482f9e5253d834650bfe5b5519672bca7f6196f816a0c71d9248c7cb619059e8d3c9576f2da92c4988d9af363850387c970fe1b33baba

    • \Users\Admin\AppData\Local\Temp\mrtDD6.tmp\Binary.mfx

      Filesize

      101KB

      MD5

      2220971bfb8c2ff836fdb8a80f1016e2

      SHA1

      f511f75bd7328e59c45924ac6eaf2dcabbafc7f0

      SHA256

      e7c47b8693373f716692b8cc3c30422c6bb3497202c81c06916b030eacbd6cfc

      SHA512

      7bdda97efadf74a56c98f3cb14043e28dd9d8ebec7de4066265cf7cf006419a69eed5bf19e5f5942e6bac69fd710170a50ca36f182a430be301ac219344ee68e

    • \Users\Admin\AppData\Local\Temp\mrtDD6.tmp\Console.mfx

      Filesize

      27KB

      MD5

      f094fd1b219b2e52f9968ba4006ff37d

      SHA1

      756d21f1a658185fff05cccb753e174410865a26

      SHA256

      9674de7e0b37af5c01eefd642ad69de76d456249242fede87246be420e9508d5

      SHA512

      359f8e8c1dcabfa1c6c31f3b9a9885a5330f27c3b18b0d967a58cc5fb626cede5c1ff811b6775b6e6483087b09badc9d76c9eceea6291ea8ac6ff66b261c85a6

    • \Users\Admin\AppData\Local\Temp\mrtDD6.tmp\Get.mfx

      Filesize

      21KB

      MD5

      3979eda042b41b6d1e9d60e43308f9b5

      SHA1

      a09de3323aeece0ac4211fc5688772aa90aea5a6

      SHA256

      b4ae004206a09f38088f966c0ef274c141a35bb9368f2d0f19b0f43e00a06785

      SHA512

      3fbd2d28a953119cbdde1572b8a7e95d771860a87fa68f84ead3d385cb7fe10a4ccc9b8312971bbec2d9b87917dff2af204871e8827e6272bd3dd3a13cfd81b6

    • \Users\Admin\AppData\Local\Temp\mrtDD6.tmp\KcSyso.mfx

      Filesize

      24KB

      MD5

      16d802096e4b4c0e7768d46c6c3c0b7f

      SHA1

      1135cc3f5f82cbc4b49276dfb1cd20bd1a9e531a

      SHA256

      5149c2d7fe6f0d2b4bffec292c2b386f3dd7743bcc0a5b75d8142d132dd43ddb

      SHA512

      e585de80689e9f1ce7ed71ccb1a1cc877273fb609bbf7c85516a4f9200cf20038118e581402927c1b66bef86da31cb165168bf085881e48016c9fcf5d3cdceac

    • \Users\Admin\AppData\Local\Temp\mrtDD6.tmp\Registry2.mfx

      Filesize

      14KB

      MD5

      53e5f0c38ba530d525ae454b2daaf9ef

      SHA1

      3ebd4f01f82c8b3e83fd71da2791ec0d2c149428

      SHA256

      72eeee8cdaf3f7e72f4182a77fd3b5bf6b5564352b4a98832a8f456173e12011

      SHA512

      971fb3d6d9f6b8fee646c3830989f9511a691e9764366aff83263bfd08c10558298b8286b7f1c0b1d103cb425035ad85a6e0954957bc98eccc9f5cbb87303a38

    • \Users\Admin\AppData\Local\Temp\mrtDD6.tmp\comObject.mfx

      Filesize

      15KB

      MD5

      6b9094de2bbdac5fd02965d338696bab

      SHA1

      8e0cf86574eaee81c60cbe86b67ef163bd4731f5

      SHA256

      a8a1d865a670db633f7a8fe1e1d970521cc79f31ce80c675d4318c3161e49487

      SHA512

      8423b3f87cef329f88f7764e46ce764f6a831cadb17feff0c83fc450ba391103a9956589c02a3b27ce8a7dfffeb28717fee80e902ce73dd4fd0404b1bf876424

    • \Users\Admin\AppData\Local\Temp\mrtDD6.tmp\kcedit.mfx

      Filesize

      32KB

      MD5

      6e48480835f787cf590d50365561d5fe

      SHA1

      f26e0820688e10906f73a41ba4b8736fca5f6709

      SHA256

      e26a27ae3ddc74e943e4fbdf4bf26b40f243d92cda3cd5db8a8ab8d973bcda3f

      SHA512

      b4186a23885f573cda4b18188d95a677c745acec068f54dae0b5b2892cd2bdabb964945b302cb8eda89370044965fdab9c723a0cc7d68600625fb6540fdeb4cf

    • \Users\Admin\AppData\Local\Temp\mrtDD6.tmp\kcfile.mfx

      Filesize

      36KB

      MD5

      74225f508b64ec89e79531aabee00467

      SHA1

      ba695660f4c22ff57a91d9370fffef1fdc5d5162

      SHA256

      a404436d2f3c665ec782f991914ac90ef80143226c94e1affc43a02a2fe304d4

      SHA512

      0a5dc09d1229d4b8d301c14c72474b79481ac500675c73a9ad6477bdcd5f00d6eb8db077ec2f96ce30a1fd1d54f9cc84349ce406cc9e403564d7310740ec012c

    • \Users\Admin\AppData\Local\Temp\mrtDD6.tmp\kcpop.mfx

      Filesize

      10KB

      MD5

      44557bf7ff780cfa6019c0c4119fb54a

      SHA1

      e02f00a1f9b9eae1855ca0168c362bd389fd6b8d

      SHA256

      28726ae556cbe1e2b4995ab135da1bfc72d0bc4e4f56d821e95dab738eed61a6

      SHA512

      071c11c89f59397b873d540561bc26f96651b6647f991b34ccdbb22809a16241c5e0167e892d3b660038d3fed5089c20a19eea1ca2a8607acdb6984d84cdf62e

    • \Users\Admin\AppData\Local\Temp\mrtDD6.tmp\mfxcom.dll

      Filesize

      45KB

      MD5

      18037c0a81482f07449f996576d02cfd

      SHA1

      cb9285d407b16e4b3a177b38fd344705b175ccf7

      SHA256

      880817d0662b24f052254fbc825d39ce588d9ee8098938c5bfdb88191806e70b

      SHA512

      690622b084ee549f11deeb055d847bd36931a1a568e91ba46b4ec3ea49c2de039a1d9c0d1d64d71068a731b91b64c8c447f8815163b7f871aba46a464fb4aaad

    • \Users\Admin\AppData\Local\Temp\mrtDD6.tmp\mmfs2.dll

      Filesize

      300KB

      MD5

      dffca25b1fc4cc0b9e4b08a551ed0344

      SHA1

      1982f8ed843bb9a0d80eb11bc357c6e9798d277f

      SHA256

      186d448aabec4fcb6661ee105c5d399ad01f4ec1f7bf6c5cb70364d74cc34709

      SHA512

      6926760c16b32787a814da24b20786d3c00202ffe658cd4e3d943d5cf6bedb70105babb7f352a286f410d3dad30c1c6257ac707226c84f39d322ddc7ab25e563

    • \Users\Admin\AppData\Local\Temp\mrtDD6.tmp\moosock.mfx

      Filesize

      52KB

      MD5

      8efbb748c3988208ac034c7703b184bf

      SHA1

      8f924b93a5df40285196b7340f6901e0d59c1137

      SHA256

      e339037ecc9d3dddb7d452e4ba962440e30a70e6b54f789aa4c880c31948b100

      SHA512

      26dc9a3d2a6b80fc8613fa3626aff0cb0180ac413986ed49f116c96e14d3d0507ed6362bc3cc8109d401fa95ad74c253d9e2f5ba8d9147a5ae2e4193105c1efd

    • \Users\Admin\AppData\Local\Temp\mrtDD6.tmp\parser.mfx

      Filesize

      30KB

      MD5

      3d165afb1f937f1bc9faa6ee300f34a5

      SHA1

      c574e596eed3a84ecfce83c51b22821f1322c7af

      SHA256

      d1059245292aafd7f1d6e3251998b11ff3eda4baee85ba3812044bbca5d10410

      SHA512

      95080c539da77dd855dfbb440cdef840bfbbc235750f07ed1403e044a7a6dd1b563a0b8ece1ca1eb3ceb19e70520b4c2db11c9e3cee4bc14463836a989842d5d

    • \Users\Admin\AppData\Roaming\winService.exe

      Filesize

      833KB

      MD5

      0cffb15d2a92d4169dbef0e7bedc4d0e

      SHA1

      7e53ee3117a5557a6f0dc3955f4aa1c0f49cfc9b

      SHA256

      f12ddd573b5b3e7f29858254e43a73f962f56480651af0ef5029e463339bde33

      SHA512

      e251dc8ea6c0bd7ec461dbb0485f78e371d19caa08c84bb0818636122abc5c5c7ec1f2ba9c92cf18ca955b3c114f21848ae057f34750ed46dde8469f505ce218

    • memory/2240-28-0x00000000002C0000-0x00000000002CA000-memory.dmp

      Filesize

      40KB

    • memory/2240-37-0x00000000002F0000-0x00000000002FB000-memory.dmp

      Filesize

      44KB

    • memory/2240-25-0x00000000002B0000-0x00000000002BF000-memory.dmp

      Filesize

      60KB

    • memory/2240-42-0x00000000003A0000-0x00000000003AD000-memory.dmp

      Filesize

      52KB

    • memory/2240-20-0x0000000000270000-0x000000000028F000-memory.dmp

      Filesize

      124KB

    • memory/2304-83-0x0000000000200000-0x000000000021F000-memory.dmp

      Filesize

      124KB

    • memory/2304-100-0x00000000002E0000-0x00000000002EB000-memory.dmp

      Filesize

      44KB

    • memory/2304-105-0x00000000004D0000-0x00000000004DD000-memory.dmp

      Filesize

      52KB