Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    03/07/2024, 17:34

General

  • Target

    23361342f83b0e3bdb16342b9826c6a1_JaffaCakes118.exe

  • Size

    390KB

  • MD5

    23361342f83b0e3bdb16342b9826c6a1

  • SHA1

    723fa58f4d583a39dbf05239c8c522333d8984dc

  • SHA256

    11234ea136d4510b6c5e7f1123d02ca1b5a8d5d38ea017a38b8dd3dfa61ab880

  • SHA512

    d2fb2e3cc3fde52b95b3a1fd89bfd03171c971dcc688b578a93f70bdac93240196979eca78d3279eb3f26062cd5849ae54cca4aa7e68c8668a7faaf45d10996e

  • SSDEEP

    12288:Hb2l7v8t0u63yNFTUnaNNQrJw6TndaBuv0xV88:Halot0FsFTUafQdwMnnI3

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23361342f83b0e3bdb16342b9826c6a1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\23361342f83b0e3bdb16342b9826c6a1_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\Windows\system\services.exe
      C:\Windows\system\services.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\system\ha_server.ini

    Filesize

    223B

    MD5

    b94bd79d028986b5f155e63d5f93be09

    SHA1

    c7bf6d43055b0e9be06c00b8b14b0172c320ffd6

    SHA256

    2ea6c1069a25378b03878d391cb50a3f795f2df362daaecfb0339c9dfd823be0

    SHA512

    978df27dc84b6246ce4eedc02c9d08f2a6bfed144e3139691b9a7f21775dd85ab1d13bf82a57462adff1a444e2164120cc180f5f8b3e58592e42f2ee32282d18

  • C:\Windows\system\ha_server_lang.ini

    Filesize

    1KB

    MD5

    aad4a95f28cbc98c4b0fe19a46c90535

    SHA1

    cad2ecc478944819b55c5d62683c96d9f605fb25

    SHA256

    592f372c9666cbaed25df0541dc43974ce01d82833525f7330c3f9da55c0d4bc

    SHA512

    a5c39df4d4ec1ce1c42ec2dfb2f9b3f94524b4fe33d8c5e66c418d80fdf03256615f33f00643979e093f26ca010f5adc13efd4194e7ad6a322231f70aa4fd15c

  • \Windows\system\services.exe

    Filesize

    304KB

    MD5

    58716b4cfbf9dca9746798a50ea57202

    SHA1

    a13d1b59a99a29727c81194014f6bdaa3c9e366f

    SHA256

    32af77cac8915cd17874097228eb020a29cb1b7482427886e4609977d74804d4

    SHA512

    34567e4cd26305bda2daaf576a1d767c623d844836156d6126021eaa26c5a3f541104833bafe3d3b1a67498302b9e2a2c918be202dcacc9b091957ac973dbaa6

  • memory/1940-15-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/1940-14-0x0000000000400000-0x0000000000545000-memory.dmp

    Filesize

    1.3MB

  • memory/1940-13-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/1940-12-0x0000000000400000-0x0000000000545000-memory.dmp

    Filesize

    1.3MB

  • memory/1940-66-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/1940-65-0x0000000000400000-0x0000000000545000-memory.dmp

    Filesize

    1.3MB

  • memory/2968-11-0x0000000001CE0000-0x0000000001E25000-memory.dmp

    Filesize

    1.3MB

  • memory/2968-0-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/2968-10-0x0000000001CE0000-0x0000000001E25000-memory.dmp

    Filesize

    1.3MB

  • memory/2968-64-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB