Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    01/07/2024, 19:04

General

  • Target

    1c2702cfd4a2effd1b80c416913529d2_JaffaCakes118.exe

  • Size

    170KB

  • MD5

    1c2702cfd4a2effd1b80c416913529d2

  • SHA1

    a779fdb5270ee57f820dd4212f992950f09907a3

  • SHA256

    0c369fa4e5d433c3bbbcc83506fcbd15ac59de562ea647de9aa0ad51b1d8880a

  • SHA512

    0b41b087d30a63d4ad9de1ffb44a8f4d57829626a6abcdfdb03810dcdd3aaf869526bd01357c75335e4797949046ba8a596c4e318cbe53d2f2166a723a825497

  • SSDEEP

    3072:jt8XV6M5+9eWGConAb6X1jbkdnRmpwa9SeQvFFxGP8sTe51GLhxioutSy:RQ66SGCo59kdRla9pQtqRem7ioSv

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c2702cfd4a2effd1b80c416913529d2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1c2702cfd4a2effd1b80c416913529d2_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Users\Admin\AppData\Local\Temp\1c2702cfd4a2effd1b80c416913529d2_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\1c2702cfd4a2effd1b80c416913529d2_JaffaCakes118.exe
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2352
      • C:\Recycle.Bin\B6232F3AAC2.exe
        "C:\Recycle.Bin\B6232F3AAC2.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2156
        • C:\Recycle.Bin\B6232F3AAC2.exe
          C:\Recycle.Bin\B6232F3AAC2.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2804
          • C:\Users\Admin\AppData\Local\Temp\5U8ED0.exe
            "C:\Users\Admin\AppData\Local\Temp\5U8ED0.exe"
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Modifies Internet Explorer Phishing Filter
            • Modifies Internet Explorer settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Recycle.Bin\48119F13158837C

    Filesize

    17KB

    MD5

    81355bc35f20d20008335798e6be31dc

    SHA1

    2b76efcf01f13e7234582eba372f951ff48047f3

    SHA256

    d62c7a42ad64884d596fdbd75e96af45e5e8c635efdc4650c570d19a05f7e6f2

    SHA512

    5b77814570644e0c92d8ed6a72d5cccf099d30aec15c1598718b9724c71b9c5d6db92ab78733f8fa65c85d6affcc14af9cd92085f7ae166324671ae9d02c1630

  • C:\Users\Admin\AppData\Local\Temp\5U8ED0.exe

    Filesize

    3KB

    MD5

    29090b6b4d6605a97ac760d06436ac2d

    SHA1

    d929d3389642e52bae5ad8512293c9c4d3e4fab5

    SHA256

    98a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272

    SHA512

    9121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be

  • \Recycle.Bin\B6232F3AAC2.exe

    Filesize

    170KB

    MD5

    1c2702cfd4a2effd1b80c416913529d2

    SHA1

    a779fdb5270ee57f820dd4212f992950f09907a3

    SHA256

    0c369fa4e5d433c3bbbcc83506fcbd15ac59de562ea647de9aa0ad51b1d8880a

    SHA512

    0b41b087d30a63d4ad9de1ffb44a8f4d57829626a6abcdfdb03810dcdd3aaf869526bd01357c75335e4797949046ba8a596c4e318cbe53d2f2166a723a825497

  • memory/2156-38-0x0000000000400000-0x00000000004AB000-memory.dmp

    Filesize

    684KB

  • memory/2156-28-0x0000000000400000-0x00000000004AB000-memory.dmp

    Filesize

    684KB

  • memory/2220-7-0x0000000000400000-0x00000000004AB000-memory.dmp

    Filesize

    684KB

  • memory/2220-0-0x0000000000400000-0x00000000004AB000-memory.dmp

    Filesize

    684KB

  • memory/2352-27-0x0000000000310000-0x00000000003BB000-memory.dmp

    Filesize

    684KB

  • memory/2352-10-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB

  • memory/2352-8-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB

  • memory/2352-14-0x0000000000030000-0x0000000000031000-memory.dmp

    Filesize

    4KB

  • memory/2352-15-0x0000000000030000-0x0000000000031000-memory.dmp

    Filesize

    4KB

  • memory/2352-12-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB

  • memory/2352-26-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB

  • memory/2352-11-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB

  • memory/2352-9-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB

  • memory/2352-98-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2352-13-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB

  • memory/2352-99-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2352-124-0x00000000771BF000-0x00000000771C1000-memory.dmp

    Filesize

    8KB

  • memory/2352-125-0x0000000000320000-0x000000000036E000-memory.dmp

    Filesize

    312KB

  • memory/2352-3-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB

  • memory/2352-102-0x0000000000320000-0x000000000036E000-memory.dmp

    Filesize

    312KB

  • memory/2352-6-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB

  • memory/2664-80-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2664-126-0x0000000075977000-0x0000000075979000-memory.dmp

    Filesize

    8KB

  • memory/2664-60-0x0000000000320000-0x000000000036E000-memory.dmp

    Filesize

    312KB

  • memory/2664-59-0x0000000001001000-0x0000000001002000-memory.dmp

    Filesize

    4KB

  • memory/2664-64-0x0000000000320000-0x000000000036E000-memory.dmp

    Filesize

    312KB

  • memory/2664-65-0x0000000000320000-0x000000000036E000-memory.dmp

    Filesize

    312KB

  • memory/2664-73-0x00000000003F0000-0x00000000003F5000-memory.dmp

    Filesize

    20KB

  • memory/2664-72-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2664-79-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2664-81-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2664-62-0x0000000000320000-0x000000000036E000-memory.dmp

    Filesize

    312KB

  • memory/2664-77-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2664-76-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2664-75-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2664-82-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2664-85-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2664-86-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2664-84-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2664-92-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2664-138-0x0000000075900000-0x0000000075AC4000-memory.dmp

    Filesize

    1.8MB

  • memory/2664-101-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2664-61-0x0000000001000000-0x0000000001004000-memory.dmp

    Filesize

    16KB

  • memory/2664-129-0x0000000075900000-0x0000000075AC4000-memory.dmp

    Filesize

    1.8MB

  • memory/2664-132-0x0000000075900000-0x0000000075AC4000-memory.dmp

    Filesize

    1.8MB

  • memory/2664-131-0x0000000075900000-0x0000000075AC4000-memory.dmp

    Filesize

    1.8MB

  • memory/2664-130-0x0000000075900000-0x0000000075AC4000-memory.dmp

    Filesize

    1.8MB

  • memory/2664-128-0x0000000075900000-0x0000000075AC4000-memory.dmp

    Filesize

    1.8MB

  • memory/2664-58-0x0000000000320000-0x000000000036E000-memory.dmp

    Filesize

    312KB

  • memory/2664-52-0x0000000000320000-0x000000000036E000-memory.dmp

    Filesize

    312KB

  • memory/2664-136-0x0000000075900000-0x0000000075AC4000-memory.dmp

    Filesize

    1.8MB

  • memory/2664-78-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2664-97-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2664-95-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2664-94-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2664-93-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2664-91-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2664-90-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2664-89-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2664-88-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2664-87-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2664-83-0x000000000BAD0000-0x000000000BB1E000-memory.dmp

    Filesize

    312KB

  • memory/2804-41-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB

  • memory/2804-44-0x0000000000400000-0x0000000000463000-memory.dmp

    Filesize

    396KB

  • memory/2804-56-0x0000000000320000-0x000000000036E000-memory.dmp

    Filesize

    312KB