Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    15s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    08/07/2024, 17:39

Errors

Reason
Machine shutdown

General

  • Target

    2d3cbf910df43264235e8a4d43bd7557_JaffaCakes118.exe

  • Size

    244KB

  • MD5

    2d3cbf910df43264235e8a4d43bd7557

  • SHA1

    dd4345ab1d5efee41909f9e125b398e041e30264

  • SHA256

    ead0fc1c3c02bdad700377ea7a370168961c0ab8bf3446354f6ddc12935e869b

  • SHA512

    de6a72a32b6be0048ea3f5d3f80432e92083def8bb0a82946f6433dabbcdf024afe2d24f173e672b353713ffab03c0afa932f9153dae0dc5e4450f219af9c5ac

  • SSDEEP

    3072:IwJInJ1CeJ3ixPRUNk9ay+GFuzakZRNmGCKsLo7i8Q:ILnJSxPLtu2kZtCKsLo7i

Malware Config

Signatures

  • Server Software Component: Terminal Services DLL 1 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 4 IoCs
  • Modifies data under HKEY_USERS 48 IoCs
  • Modifies registry class 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d3cbf910df43264235e8a4d43bd7557_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2d3cbf910df43264235e8a4d43bd7557_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2816
    • C:\Users\Admin\AppData\Local\Temp\els.exe
      "C:\Users\Admin\AppData\Local\Temp\els.exe"
      2⤵
      • Server Software Component: Terminal Services DLL
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2928
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Server Software Component: Terminal Services DLL
    • Impair Defenses: Safe Mode Boot
    • Loads dropped DLL
    • Adds Run key to start application
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:2916
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:2132
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:528

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\fsutk.dll

        Filesize

        116KB

        MD5

        a97ed0aae01704cf4b94d0f87225d36a

        SHA1

        d32a4f47f220cb0117d8a52d8b4adc51f73fb6d2

        SHA256

        e08c53c88af1d368b8f841d5c5649a9b185fde1498aebdbf942ef729a1799ed6

        SHA512

        b1e2a704c893b2095e96d20bf2e2c650156cb39816ddbf977888298aedb8a75998ce4ff9d094e83fb53542aaedfbad4e6d44ae9d80acfb1712b2015f4c75991b

      • \??\c:\$Recycle.bin\int.dat

        Filesize

        220KB

        MD5

        6ee0d65d54a3e80541b16e442a87e9f2

        SHA1

        b8ffde1b95125b2f1a185051cf22499683d16b6f

        SHA256

        e11ee5583fa78fa73f0119dc3896d889087669b61d8e3121df68fdb451b09fb8

        SHA512

        e61aaa9f332fb06e90d95c6f4f3011d2ae9e60fb66ed3080ab29ddb417a9315c7768b544e1a8cb212408563d37d98b5ab530153e9c27cd65dd8b7ac33f978d0a

      • \??\c:\windows\SysWOW64\liprip.dll

        Filesize

        84KB

        MD5

        a991a222878d998a8093851a804a5384

        SHA1

        49b407c9254daa433b2d5c2d919667a18bfb22f5

        SHA256

        0825cdd78ab935be92b1a1133447f6d75a0cf0d8315d8abf99541a8158dd170d

        SHA512

        52e35242df28fd10ae2f69b0782e9a9dcc0600f6510ddaf464fcad529a3e42d0b29c0cbe9244a5d04390be8c23c378fdb509623639ff93c2b85dfb94a2bc671f

      • \Users\Admin\AppData\Local\Temp\els.exe

        Filesize

        20KB

        MD5

        6c213102c8a7077330bf72e3030c1592

        SHA1

        04ed32f30010cae5c074405621dca033c8940133

        SHA256

        1f558cfa0fc8a53e1df635ddf977aec2c84616cdd267be1e9adf402347ba8b2e

        SHA512

        4a64a1796df186545107b5adf9a92508e2e5a817c31592ffaefe695bcd24e70f9c125859d7f1ada23d9831d5b72c0b9bd749e5e82c4bf94d2b7307311cd2fcd5

      • memory/528-138-0x0000000002AB0000-0x0000000002AB1000-memory.dmp

        Filesize

        4KB

      • memory/2132-83-0x0000000002D90000-0x0000000002D91000-memory.dmp

        Filesize

        4KB

      • memory/2916-18-0x0000000000150000-0x0000000000170000-memory.dmp

        Filesize

        128KB