Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    09/07/2024, 12:38

General

  • Target

    306760d2c97dabe6bd64a0920cc7bb83_JaffaCakes118.exe

  • Size

    487KB

  • MD5

    306760d2c97dabe6bd64a0920cc7bb83

  • SHA1

    712e1d1bf52c110952a3fbfcb614b0864eae97ab

  • SHA256

    fa5edc960cd8117171cd6e3a16cbbcfa7fb6252bfd2fe498f92ed43f50ab7de8

  • SHA512

    12dd29912021228d2d9fba8b3738f136952f01d0320ecf56528de0e88cacf1d53e631616b58a3c42f78a24d0c77e724e21e4de3ccc7bf52873b116586d57c33f

  • SSDEEP

    12288:OczJJhqrVPa3V4axl9DRLt0pBf1e51O6H5SV9zFhit:OczJqVS3aaxl7Re9+sXhit

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\306760d2c97dabe6bd64a0920cc7bb83_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\306760d2c97dabe6bd64a0920cc7bb83_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1464
    • C:\Users\Admin\AppData\Local\Temp\server_n.exe
      "C:\Users\Admin\AppData\Local\Temp\server_n.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2128
      • C:\Users\Admin\AppData\Roaming\mservice32.exe
        "C:\Users\Admin\AppData\Roaming\mservice32.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        PID:2116

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\server_n.exe

    Filesize

    917KB

    MD5

    5e848b9fb9375bb0aa52b95ae538fa3c

    SHA1

    2e590e81408b7c9af0486e62630eb68464286867

    SHA256

    f75857122e53cded85b5827384a4b769b273c7f2a1c3edd0fcff7ffdb222103b

    SHA512

    2df691e38e450a4251dbe2a6d9d0b8930b0d3ecb163a898f4bcd55f60da019a9a7d7095e6070b9b7206589125a0ac5463a305e427114425be762fe8fa9c39af7

  • memory/2116-23-0x0000000000400000-0x00000000004F1000-memory.dmp

    Filesize

    964KB

  • memory/2116-26-0x0000000000400000-0x00000000004F1000-memory.dmp

    Filesize

    964KB

  • memory/2116-32-0x0000000000400000-0x00000000004F1000-memory.dmp

    Filesize

    964KB

  • memory/2128-10-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2128-21-0x0000000000400000-0x00000000004F1000-memory.dmp

    Filesize

    964KB