Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    04/07/2024, 09:52

General

  • Target

    25830caee95d594b6d437d8ac3b84f10_JaffaCakes118.exe

  • Size

    360KB

  • MD5

    25830caee95d594b6d437d8ac3b84f10

  • SHA1

    260a6dd4b44662c2da6fe5e0650a3561f6f13a04

  • SHA256

    453da6955c691ed6adb47715e129a11f3b2f6dea826d4c815ae42fdfaa14db36

  • SHA512

    eec5877fb6aab513bd3f001c0955bf0c68b1f34cf655cc8dc0be96e6b2bce496c126e0a3d473ae5b4a347810536a942c068c22ec0290616ca62a5b1071bb7e83

  • SSDEEP

    6144:B8xwFE5KW6gjcdSW1vrG5qD1JTHReDMZT:BHzDdSyi5e5Rw

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Disables taskbar notifications via registry modification
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 17 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Modifies registry class 41 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\25830caee95d594b6d437d8ac3b84f10_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\25830caee95d594b6d437d8ac3b84f10_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Users\Admin\AppData\Local\ttc.exe
      "C:\Users\Admin\AppData\Local\ttc.exe" -gav C:\Users\Admin\AppData\Local\Temp\25830caee95d594b6d437d8ac3b84f10_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:1884
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\ttc.exe

    Filesize

    360KB

    MD5

    25830caee95d594b6d437d8ac3b84f10

    SHA1

    260a6dd4b44662c2da6fe5e0650a3561f6f13a04

    SHA256

    453da6955c691ed6adb47715e129a11f3b2f6dea826d4c815ae42fdfaa14db36

    SHA512

    eec5877fb6aab513bd3f001c0955bf0c68b1f34cf655cc8dc0be96e6b2bce496c126e0a3d473ae5b4a347810536a942c068c22ec0290616ca62a5b1071bb7e83

  • memory/1884-30-0x0000000000400000-0x00000000005EF000-memory.dmp

    Filesize

    1.9MB

  • memory/1884-22-0x0000000000400000-0x00000000005EF000-memory.dmp

    Filesize

    1.9MB

  • memory/1884-36-0x0000000000400000-0x00000000005EF000-memory.dmp

    Filesize

    1.9MB

  • memory/1884-34-0x0000000000400000-0x00000000005EF000-memory.dmp

    Filesize

    1.9MB

  • memory/1884-33-0x0000000000400000-0x00000000005EF000-memory.dmp

    Filesize

    1.9MB

  • memory/1884-32-0x0000000000400000-0x00000000005EF000-memory.dmp

    Filesize

    1.9MB

  • memory/1884-21-0x0000000000400000-0x00000000005EF000-memory.dmp

    Filesize

    1.9MB

  • memory/1884-19-0x0000000000400000-0x00000000005EF000-memory.dmp

    Filesize

    1.9MB

  • memory/1884-31-0x0000000000400000-0x00000000005EF000-memory.dmp

    Filesize

    1.9MB

  • memory/1884-20-0x0000000000400000-0x00000000005EF000-memory.dmp

    Filesize

    1.9MB

  • memory/1884-25-0x0000000000400000-0x00000000005EF000-memory.dmp

    Filesize

    1.9MB

  • memory/1884-24-0x0000000000400000-0x00000000005EF000-memory.dmp

    Filesize

    1.9MB

  • memory/1884-29-0x0000000000400000-0x00000000005EF000-memory.dmp

    Filesize

    1.9MB

  • memory/1884-23-0x0000000000400000-0x00000000005EF000-memory.dmp

    Filesize

    1.9MB

  • memory/2188-17-0x0000000000401000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB

  • memory/2188-2-0x0000000000400000-0x00000000005EF000-memory.dmp

    Filesize

    1.9MB

  • memory/2188-13-0x0000000002AD0000-0x0000000002CBF000-memory.dmp

    Filesize

    1.9MB

  • memory/2188-1-0x00000000001D0000-0x00000000001ED000-memory.dmp

    Filesize

    116KB

  • memory/2188-15-0x0000000002AD0000-0x0000000002CBF000-memory.dmp

    Filesize

    1.9MB

  • memory/2188-14-0x0000000000400000-0x00000000005EF000-memory.dmp

    Filesize

    1.9MB

  • memory/2188-0-0x0000000000400000-0x00000000005EF000-memory.dmp

    Filesize

    1.9MB

  • memory/2188-4-0x0000000000400000-0x00000000005EF000-memory.dmp

    Filesize

    1.9MB

  • memory/2188-3-0x0000000000401000-0x00000000005E5000-memory.dmp

    Filesize

    1.9MB

  • memory/2760-35-0x0000000002F50000-0x0000000002F60000-memory.dmp

    Filesize

    64KB