Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    16s
  • max time network
    21s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    08/07/2024, 22:47

General

  • Target

    2e1a340ff0dcb365319ed4df0e55b114_JaffaCakes118.exe

  • Size

    17KB

  • MD5

    2e1a340ff0dcb365319ed4df0e55b114

  • SHA1

    6c0f437db71fa8a752e9feb40098af3a20dbc6b8

  • SHA256

    028d29c9939040390d90a60f230a6471c98e7c2dbb55513b31660ff77f7269e3

  • SHA512

    484a3e3eaac2b6f951f4442427762d96b3899b85744252400be468cdd062761a103bb285d0c58a2bc085914047ca6d60e4411d1e96cd1dc3f9497439252e01ed

  • SSDEEP

    384:bvcPvOdt1nsI/hE2ymx0WsjSaRa5TX0SjKiBmyWB4QgTW32:bvAkt1nsI5mmx0Wsm4a5L0Sjj5GsS32

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Drops file in System32 directory 16 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1352
      • C:\Users\Admin\AppData\Local\Temp\2e1a340ff0dcb365319ed4df0e55b114_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\2e1a340ff0dcb365319ed4df0e55b114_JaffaCakes118.exe"
        2⤵
        • Loads dropped DLL
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:1360
        • C:\Windows\SysWOW64\service\explorer.exe
          "C:\Windows\system32\service\explorer.exe"
          3⤵
          • Adds policy Run key to start application
          • Deletes itself
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2888
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2888 -s 916
            4⤵
            • Loads dropped DLL
            • Program crash
            PID:3740

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\exp.txt

      Filesize

      84B

      MD5

      6edf51062ed6b511d0fb7f2ed7a3ce17

      SHA1

      868695d33cea98c39b0fef459ea8e5a0f12c67a4

      SHA256

      44dbef8470badd68a1e41e252677fc0e7990c9a019c7e6b271aac47004495c0c

      SHA512

      989e5f9dd0017e5e15bae39440d816eb802b2983681e0394dcf597405185eba5b0a04079ec457df8107d95e3e0e472311980b50b3d3740ca2c96d2794a3970a3

    • C:\Windows\SysWOW64\service\explorer.exe

      Filesize

      17KB

      MD5

      2e1a340ff0dcb365319ed4df0e55b114

      SHA1

      6c0f437db71fa8a752e9feb40098af3a20dbc6b8

      SHA256

      028d29c9939040390d90a60f230a6471c98e7c2dbb55513b31660ff77f7269e3

      SHA512

      484a3e3eaac2b6f951f4442427762d96b3899b85744252400be468cdd062761a103bb285d0c58a2bc085914047ca6d60e4411d1e96cd1dc3f9497439252e01ed

    • \Windows\SysWOW64\service\dll.dll

      Filesize

      20KB

      MD5

      667eb94b9cfba3e7754422bf4d055b64

      SHA1

      4ac0f313acfd419762d5b451f8564e8e9877d791

      SHA256

      e0b91e140ffc9cd6df6a95e24829c1db3042a6bb98321b3ad64ce9025edd326b

      SHA512

      dc9be514c18c532ce7337370d2954d5311c89f87daafe4e645e23ea341c5602eb3ffa07c113651273b5f89c865fb17c34f1ee90054b9e17468a68a08c3ae4bb0

    • memory/1352-29-0x0000000013140000-0x00000000131FF000-memory.dmp

      Filesize

      764KB

    • memory/1352-35-0x0000000013140000-0x00000000131FF000-memory.dmp

      Filesize

      764KB

    • memory/1352-32-0x0000000013140000-0x00000000131FF000-memory.dmp

      Filesize

      764KB

    • memory/1352-38-0x0000000013140000-0x00000000131FF000-memory.dmp

      Filesize

      764KB

    • memory/1352-23-0x0000000013140000-0x00000000131FF000-memory.dmp

      Filesize

      764KB

    • memory/1352-44-0x0000000013140000-0x00000000131FF000-memory.dmp

      Filesize

      764KB

    • memory/1352-20-0x0000000013140000-0x00000000131FF000-memory.dmp

      Filesize

      764KB

    • memory/1352-27-0x0000000013140000-0x00000000131FF000-memory.dmp

      Filesize

      764KB

    • memory/1352-17-0x0000000013140000-0x00000000131FF000-memory.dmp

      Filesize

      764KB

    • memory/2888-594-0x0000000010000000-0x0000000010056000-memory.dmp

      Filesize

      344KB