Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    09/07/2024, 22:36

General

  • Target

    32410bbf13aa5b1fe85ae0ca73cc965b_JaffaCakes118.exe

  • Size

    156KB

  • MD5

    32410bbf13aa5b1fe85ae0ca73cc965b

  • SHA1

    2218323fcfc69dd17f64036da61059420848c652

  • SHA256

    0c2747af45baa1c6ba161bfc3551cc3d6c6cbac40390653cf6e4c9cad80e295c

  • SHA512

    08c6a620f4796b91f79ab67dd078eb4f6a11028299d2315079fc0a4d308e17c43b14a61a9120e74bfc18e47715908236946e65d7c9ba87064e5bb6d886e345be

  • SSDEEP

    3072:QBd1g/E2MtU7Qv0w4ZRRQMMDwtIMCeFP4ANA4oQZiE+r:SdKE2R7Qvb4tQTaCeFP4A+W4

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\32410bbf13aa5b1fe85ae0ca73cc965b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\32410bbf13aa5b1fe85ae0ca73cc965b_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1612
    • C:\Users\Admin\jrzoam.exe
      "C:\Users\Admin\jrzoam.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\jrzoam.exe

    Filesize

    156KB

    MD5

    2bcdbc02383e63a4fe2b239ed5e28ad1

    SHA1

    008af8575ca4f208ce7ed09f1c60d0195db19b4e

    SHA256

    06565ac160f2d9b50a4c1627b1655acf9b3fbaef9354ae6811dac7885eb7f6ad

    SHA512

    38e6ecb589a2ef4d02ac093c2924cb5cd14d6f22dbb4ae01c3115b53b06251359357f59432f1f2c49e5615b925bbf4266d8601557517070abf9e20dfb568e0b7