Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    03/07/2024, 10:10

General

  • Target

    21f8913a7ec6476c5b3fd5305df7ee23_JaffaCakes118.exe

  • Size

    288KB

  • MD5

    21f8913a7ec6476c5b3fd5305df7ee23

  • SHA1

    cb8608f0dac6876ed92f13e2a20be57229854059

  • SHA256

    368082bcb7cdbad5c9047f69ef3fc1a08570c8760692d0f841c07554e1d8763c

  • SHA512

    e2c4e795e021abf78f640ec1e6448b216f8c55ba687d080ebafc9110fd5d8b842f658a8c5a258937f580fbd8e1b1c48caf08b6f2e5e69f391c8c850a4f29c4ca

  • SSDEEP

    6144:BKZBzsuDVxE3lyUqqLSwAohoRa8wu5z469o0HZXbVslhi:yNsGVyz9A3Rch09Glhi

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1120
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1180
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1196
          • C:\Users\Admin\AppData\Local\Temp\21f8913a7ec6476c5b3fd5305df7ee23_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\21f8913a7ec6476c5b3fd5305df7ee23_JaffaCakes118.exe"
            2⤵
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of UnmapMainImage
            • Suspicious use of WriteProcessMemory
            PID:2156
            • C:\Users\Admin\AppData\Roaming\Ifixs\uzree.exe
              "C:\Users\Admin\AppData\Roaming\Ifixs\uzree.exe"
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of UnmapMainImage
              • Suspicious use of WriteProcessMemory
              PID:1280
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpdb5a6338.bat"
              3⤵
              • Deletes itself
              PID:672
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:1952

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\tmpdb5a6338.bat

            Filesize

            271B

            MD5

            58a1f39f900693519db5c3d47ffb544b

            SHA1

            d6761a8540052352b39f3bf2448dc060d591b502

            SHA256

            88f4f302ab198456904cdfe043964f7e9122061a32014ae3da6b35c8847134ac

            SHA512

            de16bb3b71649c65f5922d1c496738be337b4423e871a1219dea765c57122c18a1893f28745fe6e0914ce9ef9415edf9f7c357880bff2b566a978ec4d349de1b

          • C:\Users\Admin\AppData\Roaming\Ujqe\tujou.myf

            Filesize

            380B

            MD5

            99e3e7ff56386bc92a6799b0a4be59ad

            SHA1

            74840a1cc053027274c8f4fe8d1da965e2ef42df

            SHA256

            7f1a71e8db9d68163ae505086b7c2fe26fcecba6d7f18aef9e49e4a99e6edaf7

            SHA512

            4571701784b199a324b87cba67f95b3faa43a6f6e0e1abb7fafafe20bc6fd6367c6951874b31c10ebbefdf30f854f9986a50d1fbd80da4248a097062a2a0c49a

          • \Users\Admin\AppData\Roaming\Ifixs\uzree.exe

            Filesize

            288KB

            MD5

            872a9de2d7daff584d6ff2e819bb8a64

            SHA1

            f3a177a01a41ce1508bb57f614c739270856b555

            SHA256

            261c10adcec38d2610f8cdbf87b62111007c3a57a66a03b34f3d0c9e31c09172

            SHA512

            ba6db558d9fa76f5bf28e52d9b2d7c0f74a910420c507ac38975f2c6c0e92d6e57de89d05c05557a20538ea7b34b7aa4b94cc7bd08071f4434882500bde857e8

          • memory/1120-23-0x0000000002090000-0x00000000020D1000-memory.dmp

            Filesize

            260KB

          • memory/1120-21-0x0000000002090000-0x00000000020D1000-memory.dmp

            Filesize

            260KB

          • memory/1120-19-0x0000000002090000-0x00000000020D1000-memory.dmp

            Filesize

            260KB

          • memory/1120-25-0x0000000002090000-0x00000000020D1000-memory.dmp

            Filesize

            260KB

          • memory/1120-27-0x0000000002090000-0x00000000020D1000-memory.dmp

            Filesize

            260KB

          • memory/1180-33-0x0000000001ED0000-0x0000000001F11000-memory.dmp

            Filesize

            260KB

          • memory/1180-37-0x0000000001ED0000-0x0000000001F11000-memory.dmp

            Filesize

            260KB

          • memory/1180-35-0x0000000001ED0000-0x0000000001F11000-memory.dmp

            Filesize

            260KB

          • memory/1180-31-0x0000000001ED0000-0x0000000001F11000-memory.dmp

            Filesize

            260KB

          • memory/1196-42-0x0000000002DB0000-0x0000000002DF1000-memory.dmp

            Filesize

            260KB

          • memory/1196-41-0x0000000002DB0000-0x0000000002DF1000-memory.dmp

            Filesize

            260KB

          • memory/1196-40-0x0000000002DB0000-0x0000000002DF1000-memory.dmp

            Filesize

            260KB

          • memory/1196-43-0x0000000002DB0000-0x0000000002DF1000-memory.dmp

            Filesize

            260KB

          • memory/1280-18-0x0000000000400000-0x0000000000441000-memory.dmp

            Filesize

            260KB

          • memory/1280-16-0x0000000000300000-0x0000000000353000-memory.dmp

            Filesize

            332KB

          • memory/1280-15-0x0000000000270000-0x00000000002B1000-memory.dmp

            Filesize

            260KB

          • memory/1280-283-0x0000000000400000-0x0000000000441000-memory.dmp

            Filesize

            260KB

          • memory/1952-48-0x00000000004D0000-0x0000000000511000-memory.dmp

            Filesize

            260KB

          • memory/1952-47-0x00000000004D0000-0x0000000000511000-memory.dmp

            Filesize

            260KB

          • memory/1952-45-0x00000000004D0000-0x0000000000511000-memory.dmp

            Filesize

            260KB

          • memory/1952-46-0x00000000004D0000-0x0000000000511000-memory.dmp

            Filesize

            260KB

          • memory/2156-53-0x0000000001D70000-0x0000000001DB1000-memory.dmp

            Filesize

            260KB

          • memory/2156-0-0x0000000000460000-0x00000000004A1000-memory.dmp

            Filesize

            260KB

          • memory/2156-58-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/2156-56-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/2156-70-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/2156-62-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/2156-64-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/2156-74-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/2156-72-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/2156-66-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/2156-68-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/2156-50-0x0000000001D70000-0x0000000001DB1000-memory.dmp

            Filesize

            260KB

          • memory/2156-51-0x0000000001D70000-0x0000000001DB1000-memory.dmp

            Filesize

            260KB

          • memory/2156-52-0x0000000001D70000-0x0000000001DB1000-memory.dmp

            Filesize

            260KB

          • memory/2156-55-0x0000000001D70000-0x0000000001DB1000-memory.dmp

            Filesize

            260KB

          • memory/2156-60-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/2156-54-0x0000000001D70000-0x0000000001DB1000-memory.dmp

            Filesize

            260KB

          • memory/2156-5-0x0000000000400000-0x0000000000441000-memory.dmp

            Filesize

            260KB

          • memory/2156-4-0x0000000000400000-0x0000000000441000-memory.dmp

            Filesize

            260KB

          • memory/2156-135-0x0000000077CE0000-0x0000000077CE1000-memory.dmp

            Filesize

            4KB

          • memory/2156-80-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/2156-78-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/2156-76-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/2156-138-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/2156-3-0x0000000000400000-0x0000000000441000-memory.dmp

            Filesize

            260KB

          • memory/2156-163-0x0000000001BE0000-0x0000000001C33000-memory.dmp

            Filesize

            332KB

          • memory/2156-162-0x0000000000400000-0x0000000000441000-memory.dmp

            Filesize

            260KB

          • memory/2156-164-0x0000000001D70000-0x0000000001DB1000-memory.dmp

            Filesize

            260KB

          • memory/2156-2-0x0000000000400000-0x0000000000441000-memory.dmp

            Filesize

            260KB

          • memory/2156-1-0x0000000001BE0000-0x0000000001C33000-memory.dmp

            Filesize

            332KB