Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    10/07/2024, 16:39

General

  • Target

    35895684a048356cb5b8b17b9435629e_JaffaCakes118.exe

  • Size

    4.0MB

  • MD5

    35895684a048356cb5b8b17b9435629e

  • SHA1

    7e49691ca8632b90e0b2425d1ca9c8c7efb4efaa

  • SHA256

    2e31b1e1b0821c7a6529c74e0f1cb4ab435dceaf933467696c41d981bf43cf2a

  • SHA512

    a6a27f8d72e6606d1ef014b2e6bb00cf80f11e2100cb1253cf700be4ea9cec1ac158122fbe1e1be7adf4ec414a8554e1c6d4c4c7a54b64edd05b93f028264eab

  • SSDEEP

    98304:NqfednkNM6LWgCNeRQRkbYUnhNuiEMqhgAZJTtWRFmf3dTCQCVtD:3dn8M6CleikbY4JqhgAPsRwf3dTCTr

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\35895684a048356cb5b8b17b9435629e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\35895684a048356cb5b8b17b9435629e_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsd4E40.tmp\ioSpecial.ini

    Filesize

    648B

    MD5

    fc1b4e9c50a3c01acc7857197895de1b

    SHA1

    7fba46b450f3955299073f7b09150663a5f31e3d

    SHA256

    407d6d96d681eb8efb65fa1e6b7b1959f07575d2b4a15ae020242a164a56bf4c

    SHA512

    e6e42fa8d0a21b2b4f6d04fd19fa7092cbca451240239fc142356127ebd266ecedce87f2a094dd871fb524b95969f27e023014d9202c37d8580556c3056deffc

  • \Users\Admin\AppData\Local\Temp\nsd4E40.tmp\ChkClient.dll

    Filesize

    140KB

    MD5

    3fe47e461bb686693cf440c8815f2a0b

    SHA1

    9a7d27d47a542b83d00f1e6027ba4c22d496f887

    SHA256

    5bdefe9a081e5e2f4af73891db6228a6b57e7dd320fac0ae233f5cd741db8a1f

    SHA512

    687c57e17c4f527b90e8eafa9929fa9ee0a1fa82b2c9ba9c6a6385cfcb1fcdd1e09305acbf357cf61e7dd7e061d581a378d2661ed7df7dbfd554514f04646e61

  • \Users\Admin\AppData\Local\Temp\nsd4E40.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    eef9e469e8a30717974499f277d97e2a

    SHA1

    2d33c25984ebd9116beeb55cdde4c5c86c023e5d

    SHA256

    1f35bb6728237483c779005fc227e69fef51b0bafd32d15855d483948a337078

    SHA512

    d860132106a1c03dfa23f983b3c503f1216ac02f3d47833b96dfb333fb30bc8ab4d4fecd1f1f0a89f0c7f3586405461e2d53c26f282bb48970e549659b364b48

  • \Users\Admin\AppData\Local\Temp\nsd4E40.tmp\IsVista.dll

    Filesize

    44KB

    MD5

    344d13fd0fdd2d97e8d61960f40a8a30

    SHA1

    3f0f120203005eea3e8ed1652a6ea8a607ea934d

    SHA256

    17bb3331e2300aa01666fbee98b9552cec5e46212a4c5a340c0370b93df88f83

    SHA512

    b4e49c58503532e270cc369f1cbd14d85edd46da5ab034dad730bd4297887dd541d445d2fbf205820e6afbbdba7ab6d5b78b694467554320fd6db8e06fe4f719

  • \Users\Admin\AppData\Local\Temp\nsd4E40.tmp\Ischeck.dll

    Filesize

    120KB

    MD5

    6c1f65ce96712e05f64c7a26b7adee36

    SHA1

    6cea6c2618fb31902c52cb1d5fad04503bd34ed0

    SHA256

    544f3c2c03f7900539d4868437f8e08204c0b4c79357af666a1fb48d406c1ffd

    SHA512

    5244d26d013dc2c7083bd4c167cac99307985babcabc1806a898a2621fce6b73d256b21d549bce8744f3221a51017ea5f621d2f6f5cd5aae83ec21ae41e5d5a6

  • \Users\Admin\AppData\Local\Temp\nsd4E40.tmp\stack.dll

    Filesize

    10KB

    MD5

    0f61a81a543822de5fcb9a8a43f230dd

    SHA1

    d01d4a0f542f3c654637fdfe5a574fe1f150ece1

    SHA256

    46b4a72ae8590b0afb3304cc5c13db0502bc4c4cb02f64f37c79008c17db814f

    SHA512

    596b7a897ba64c32e26ba6168aa3628aad37b187a9814a286298307d8c42eabf8e8a679dbda558f8b2cdc8676c94ec819256432aa5ad7c05a5387759262a4402

  • memory/2432-9-0x00000000003D0000-0x00000000003F7000-memory.dmp

    Filesize

    156KB

  • memory/2432-16-0x00000000003D0000-0x00000000003DC000-memory.dmp

    Filesize

    48KB

  • memory/2432-22-0x00000000003D0000-0x00000000003F2000-memory.dmp

    Filesize

    136KB