Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    06/07/2024, 15:21

General

  • Target

    28a2776d2c860ca5627c1ca7fe29812b_JaffaCakes118.exe

  • Size

    146KB

  • MD5

    28a2776d2c860ca5627c1ca7fe29812b

  • SHA1

    9da0e52c990d18a34a4ba7980ab0f609d5205375

  • SHA256

    842c552be3836ca749858e1a4a02ba0de876e51f74897c2778be701c87c42d35

  • SHA512

    149a1d40ec898980a37e635f7e2887125f1f205faa46f2df94ebf0bd6d01cb41e5705372701d8e520c06d74cb059a131c3788088867777b9713ecda63d37b0f8

  • SSDEEP

    3072:/piv375xh3G76wfMPq0stztYcZt2v10LOIA3Sk3mJe8lQeI5qDf23jM:hO375xhWGnPq0+tvZkv10SIA3L3Oe8lG

Score
8/10

Malware Config

Signatures

  • Disables Task Manager via registry modification
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\28a2776d2c860ca5627c1ca7fe29812b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\28a2776d2c860ca5627c1ca7fe29812b_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    PID:1840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    45d1315db81b527e83c080861e29cc43

    SHA1

    3f1ba2e05e428cb1004c6c8012c87e9eb3457784

    SHA256

    4b35ade566a3b477253ba741a8626a58f6067fcb69111d86e3ab4af8da1654d2

    SHA512

    88d6c8f10cbcc4d4a92ed1c353d47bf8e2b7756657cc8a16c7ed38a6efe506df376c676fae5f2fb4edd0c2ee558941f8ae3c2b076b0f2976148ad3912ecf71de

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    b760dbe515210643d67a4fe6de2b9421

    SHA1

    f11330707b02f8e5f0d35632f84181eaf698f9e9

    SHA256

    38394b2d0735580b9b34d1bb147786c5ce4df45777bce6672e66845849a1bfb2

    SHA512

    457f0dcc84e7be0addd388595453dfeb63883c26ff62e9a5c7f6867c7a25fd12620fe4e549d8000e3be246f9209396164c3d4aaad52d1abd58a3fea66b34c4a2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    1bd22baa2204fb6a10dfe47ef4bde3b3

    SHA1

    e9ceecc38c1cd8c3cb1f7b4f8107d3ede46639e9

    SHA256

    15c15c3a9a8fcaf0e5f5d0e93a4f6630d0d4c7c206336a3041d4e012418c56ec

    SHA512

    1ee09a1e31b2c2ccfe8dc3b29abb63b31ba25ffc1be7cf79cb6fbe05e412130ddfd9681015a98ce4aebfdaa928069796975f593c0230d3664892807b4a5615af

  • C:\Users\Admin\AppData\Local\Temp\Cab19CA.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar1A78.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1840-0-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/1840-58-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/1840-7-0x0000000003FC0000-0x0000000005022000-memory.dmp

    Filesize

    16.4MB

  • memory/1840-259-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/1840-262-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/1840-264-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/1840-265-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/1840-266-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB

  • memory/1840-269-0x0000000000400000-0x00000000004EF000-memory.dmp

    Filesize

    956KB