Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    06/07/2024, 22:50

General

  • Target

    297cfffd13c7e3d3926cd12bbcd1230d_JaffaCakes118.exe

  • Size

    687KB

  • MD5

    297cfffd13c7e3d3926cd12bbcd1230d

  • SHA1

    8bdb7df5a4a6747275cbba18867f0cb75c38d885

  • SHA256

    2d41e607b68a0969d74933498e0233164b9f3c956a38ba6199e6044e1613ea9b

  • SHA512

    9fd42327a2fa6497e51f476bc973da51cd7b13a0950f90813f65a5efb1526d430cf3e0691e543b0826e3a6d31d35087962aff65e37a64caf5ee82c9f78e7588d

  • SSDEEP

    12288:9oNj0REt++19BvWzvbM2LJR1+UXV81UXdIF3Z4mxxVjHWlPXGexomQ4/g:9oV1+iY3M2FR1+0e1UXdIQmXCee+2/g

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\297cfffd13c7e3d3926cd12bbcd1230d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\297cfffd13c7e3d3926cd12bbcd1230d_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2552
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3060
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Windows\uninstal.bat
        3⤵
          PID:688
    • C:\Windows\winnutpc.exe
      C:\Windows\winnutpc.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2848
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
        2⤵
          PID:3068

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\uninstal.bat

        Filesize

        150B

        MD5

        67e4ea2c3e65d3236c8266b9c116f67f

        SHA1

        7e87f925ccd68b2b7c9af9f92e118db1990234f9

        SHA256

        2dff6c390d03870cec06d16fe0191475fb87ad2330b78d03c15e7ff0bed8f00c

        SHA512

        1a3cf0443e932b9b57f32531b3d61c917b9eec19a4ba73336011041e16a0022c5e62b2c768b34a0bdc08ffd75bbaa0338719577001496c9de8a5638420b0a229

      • \Users\Admin\AppData\Local\Temp\IXP000.TMP\3.exe

        Filesize

        776KB

        MD5

        444a2327626c664b4420db374c75e288

        SHA1

        88932a99bf34448a6b8ec23de1820c8aaff210e5

        SHA256

        e6ce4f21eddbc3ee5644d38c6cbdb0b2cb915ad6b1b4689598d636d1bfdd705b

        SHA512

        e9fd6171d0fb282c323cfbe7684c9b81231f45ef33e2aa657a6fb3749d0d50a3cedcafee51b53fa8e567d7aa5090dae39339648d47c9893ad258b12e54ba295a

      • memory/2552-23-0x0000000000750000-0x0000000000751000-memory.dmp

        Filesize

        4KB

      • memory/2552-21-0x0000000000770000-0x0000000000771000-memory.dmp

        Filesize

        4KB

      • memory/2552-7-0x00000000006A0000-0x00000000006A1000-memory.dmp

        Filesize

        4KB

      • memory/2552-6-0x0000000000200000-0x0000000000201000-memory.dmp

        Filesize

        4KB

      • memory/2552-5-0x0000000000210000-0x0000000000211000-memory.dmp

        Filesize

        4KB

      • memory/2552-4-0x00000000006B0000-0x00000000006B1000-memory.dmp

        Filesize

        4KB

      • memory/2552-3-0x0000000000240000-0x0000000000241000-memory.dmp

        Filesize

        4KB

      • memory/2552-2-0x0000000000260000-0x0000000000261000-memory.dmp

        Filesize

        4KB

      • memory/2552-35-0x0000000000D80000-0x0000000000D81000-memory.dmp

        Filesize

        4KB

      • memory/2552-34-0x0000000000D90000-0x0000000000D91000-memory.dmp

        Filesize

        4KB

      • memory/2552-33-0x0000000000A10000-0x0000000000A11000-memory.dmp

        Filesize

        4KB

      • memory/2552-32-0x0000000000D30000-0x0000000000D31000-memory.dmp

        Filesize

        4KB

      • memory/2552-31-0x0000000000D50000-0x0000000000D51000-memory.dmp

        Filesize

        4KB

      • memory/2552-30-0x0000000000D70000-0x0000000000D71000-memory.dmp

        Filesize

        4KB

      • memory/2552-29-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2552-28-0x0000000000760000-0x0000000000761000-memory.dmp

        Filesize

        4KB

      • memory/2552-27-0x00000000007D0000-0x00000000007D1000-memory.dmp

        Filesize

        4KB

      • memory/2552-22-0x00000000007C0000-0x00000000007C1000-memory.dmp

        Filesize

        4KB

      • memory/2552-25-0x00000000007B0000-0x00000000007B1000-memory.dmp

        Filesize

        4KB

      • memory/2552-24-0x00000000006E0000-0x00000000006E1000-memory.dmp

        Filesize

        4KB

      • memory/2552-8-0x0000000000690000-0x0000000000691000-memory.dmp

        Filesize

        4KB

      • memory/2552-0-0x0000000001000000-0x0000000001110000-memory.dmp

        Filesize

        1.1MB

      • memory/2552-26-0x00000000007A0000-0x00000000007A1000-memory.dmp

        Filesize

        4KB

      • memory/2552-20-0x0000000000790000-0x0000000000791000-memory.dmp

        Filesize

        4KB

      • memory/2552-19-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2552-18-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2552-17-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2552-16-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2552-15-0x0000000003170000-0x0000000003171000-memory.dmp

        Filesize

        4KB

      • memory/2552-14-0x0000000003170000-0x0000000003171000-memory.dmp

        Filesize

        4KB

      • memory/2552-13-0x0000000003170000-0x0000000003171000-memory.dmp

        Filesize

        4KB

      • memory/2552-12-0x0000000003170000-0x0000000003171000-memory.dmp

        Filesize

        4KB

      • memory/2552-11-0x0000000003170000-0x0000000003171000-memory.dmp

        Filesize

        4KB

      • memory/2552-10-0x00000000006C0000-0x00000000006C1000-memory.dmp

        Filesize

        4KB

      • memory/2552-36-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2552-37-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2552-38-0x0000000003160000-0x0000000003161000-memory.dmp

        Filesize

        4KB

      • memory/2552-9-0x0000000003170000-0x0000000003171000-memory.dmp

        Filesize

        4KB

      • memory/2552-1-0x00000000006F0000-0x0000000000744000-memory.dmp

        Filesize

        336KB

      • memory/2552-61-0x0000000001000000-0x0000000001110000-memory.dmp

        Filesize

        1.1MB

      • memory/2552-62-0x00000000006F0000-0x0000000000744000-memory.dmp

        Filesize

        336KB

      • memory/2848-64-0x0000000000400000-0x00000000004CB000-memory.dmp

        Filesize

        812KB

      • memory/3060-60-0x0000000000400000-0x00000000004CB000-memory.dmp

        Filesize

        812KB