Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    21s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    09/07/2024, 00:08 UTC

General

  • Target

    2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe

  • Size

    752KB

  • MD5

    2e525fd12fa205bfcf3e31a2e8cc4a33

  • SHA1

    bde0774c70287f199e6e648a273c17d54c6d3c51

  • SHA256

    1818b1d5dfe20074745e0ae145c6f0effd36d47cd801a542db671c9d818a1f5e

  • SHA512

    10548a293d75c3fe61d0cfe7155f4ae758ebbe3c31f6a4dd6537b211053c55266f9921b933a95084e6a7e9d2bb02354de39ddee09fe8e10ee53c38bc492dd1ad

  • SSDEEP

    12288:N//76GGDtNFp7PTzvHq1NNfr2RInBZqpzUF4AnjZnMei/SFfdYTQq5BeXBWV:x/vGDt9TzvHqH5pqtURjZnli5kAwRWV

Score
10/10

Malware Config

Signatures

  • Modifies security service 2 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 2 IoCs
  • Modifies registry class 5 IoCs
  • NTFS ADS 2 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1512
    • C:\Users\Admin\AppData\Local\Temp\2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe"
      2⤵
      • Checks BIOS information in registry
      • Drops file in System32 directory
      • Modifies registry class
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2160
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c c:\a.bat
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2840
        • C:\Windows\SysWOW64\regedit.exe
          REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg
          4⤵
          • Modifies security service
          • Runs .reg file with regedit
          PID:2020
      • C:\Windows\SysWOW64\rundll32.exe
        C:\Windows\system32\rundll32.exe 756 "C:\Users\Admin\AppData\Local\Temp\2e525fd12fa205bfcf3e31a2e8cc4a33_JaffaCakes118.exe"
        3⤵
          PID:3020

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\1.reg

      Filesize

      3KB

      MD5

      9e5db93bd3302c217b15561d8f1e299d

      SHA1

      95a5579b336d16213909beda75589fd0a2091f30

      SHA256

      f360fb5740172b6b4dd59c1ac30b480511665ae991196f833167e275d91f943e

      SHA512

      b5547e5047a3c43397ee846ff9d5979cba45ba44671db5c5df5536d9dc26262e27a8645a08e0cf35960a3601dc0f6f5fe8d47ae232c9ca44d6899e97d36fb25a

    • C:\a.bat

      Filesize

      5KB

      MD5

      0019a0451cc6b9659762c3e274bc04fb

      SHA1

      5259e256cc0908f2846e532161b989f1295f479b

      SHA256

      ce4674afd978d1401596d22a0961f90c8fb53c5bd55649684e1a999c8cf77876

      SHA512

      314c23ec37cb0cd4443213c019c4541df968447353b422ef6fff1e7ddf6c983c80778787408b7ca9b81e580a6a7f1589ca7f43c022e6fc16182973580ed4d904

    • memory/1512-1-0x0000000001D80000-0x0000000001F8A000-memory.dmp

      Filesize

      2.0MB

    • memory/1512-136-0x0000000000400000-0x000000000060A000-memory.dmp

      Filesize

      2.0MB

    • memory/1512-0-0x0000000000400000-0x000000000060A000-memory.dmp

      Filesize

      2.0MB

    • memory/2160-2-0x0000000000400000-0x000000000060A000-memory.dmp

      Filesize

      2.0MB

    • memory/2160-13-0x0000000000400000-0x000000000060A000-memory.dmp

      Filesize

      2.0MB

    • memory/2160-8-0x000000000056A000-0x000000000056B000-memory.dmp

      Filesize

      4KB

    • memory/2160-17-0x00000000020D0000-0x0000000002164000-memory.dmp

      Filesize

      592KB

    • memory/2160-16-0x0000000000400000-0x000000000060A000-memory.dmp

      Filesize

      2.0MB

    • memory/2160-14-0x0000000000400000-0x000000000060A000-memory.dmp

      Filesize

      2.0MB

    • memory/2160-12-0x0000000000400000-0x000000000060A000-memory.dmp

      Filesize

      2.0MB

    • memory/2160-9-0x0000000000400000-0x000000000060A000-memory.dmp

      Filesize

      2.0MB

    • memory/2160-15-0x0000000000400000-0x000000000060A000-memory.dmp

      Filesize

      2.0MB

    • memory/2160-133-0x00000000020D0000-0x0000000002164000-memory.dmp

      Filesize

      592KB

    • memory/2160-3-0x00000000020D0000-0x0000000002164000-memory.dmp

      Filesize

      592KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.