Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    11/07/2024, 02:27

General

  • Target

    375afb23dd50b2b4775b85e5b451aad6_JaffaCakes118.exe

  • Size

    268KB

  • MD5

    375afb23dd50b2b4775b85e5b451aad6

  • SHA1

    78b2e3ca1d87fb64db55dcf8992bfeebaccfbfa5

  • SHA256

    06cb7880195c0bc56cc6591510909a2cb58614346ccbf00f14faa64a3ba1bf17

  • SHA512

    f68fa6b55486677b8d415c3fe767327a1c837808b27ef609b3b3d2d734c117727776598d6dacef304d8e6e52f2d3d059f1aec9bd1e05216cbfb0cfdcfa5eaf14

  • SSDEEP

    6144:VwaMaNHn2vMw1OVCD03U2u9YyVsQywXJj8A3s/QKS/21hJfu:SaXNHnsMwukfOVQRp8/QKI2Zm

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 3 TTPs 8 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 20 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\375afb23dd50b2b4775b85e5b451aad6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\375afb23dd50b2b4775b85e5b451aad6_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\xhyaf5va.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2556
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD653.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCD652.tmp"
        3⤵
          PID:2236
      • C:\Users\Admin\AppData\Roaming\svchost.exe
        C:\Users\Admin\AppData\Roaming\svchost.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2380
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2768
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            4⤵
            • Modifies firewall policy service
            • Modifies registry key
            PID:2664
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchost.exe:*:Enabled:Windows Messanger" /f
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2740
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchost.exe:*:Enabled:Windows Messanger" /f
            4⤵
            • Modifies firewall policy service
            • Modifies registry key
            PID:2628
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2980
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            4⤵
            • Modifies firewall policy service
            • Modifies registry key
            PID:2644
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\black.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\black.exe:*:Enabled:Windows Messanger" /f
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2748
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\black.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\black.exe:*:Enabled:Windows Messanger" /f
            4⤵
            • Modifies firewall policy service
            • Modifies registry key
            PID:2608

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RESD653.tmp

      Filesize

      1KB

      MD5

      7f084f886adac32856c8748df543a731

      SHA1

      3a6d279f4bc9fcf02e1d60bb18bb476981d929cc

      SHA256

      0324b953bb3f0b4465ea71cbfaddefbe139f67b2b27378eeddc8cede88ae9ecc

      SHA512

      55998bb4aaaa16f400e885ee2a25a376f4dbed65c0c7fa6320b3014ff677012d6791500d414d015ecc5e44e749389d2b43907b1bd290bf4f5c181d3f4761fedf

    • C:\Users\Admin\AppData\Local\Temp\xhyaf5va.dll

      Filesize

      5KB

      MD5

      3f493d58e2b9ade552f5b9c11874b835

      SHA1

      bbd2d99f258c85785013119da29c600d13004926

      SHA256

      f4b4159aa5e4320ea23ea9185e93ae81da365d103be7380c3cadcd9573672ada

      SHA512

      1b9727908c17670c8e15673103e4baf2bb97ade27e9e4d78369553398731b540ba614344be85b00d03ffe578d1612cf7c1f85fed800f7ec2b8a922b02161abe7

    • C:\Users\Admin\AppData\Roaming\svchost.exe

      Filesize

      12KB

      MD5

      bb5b2961567e68995464801d3bb2a964

      SHA1

      5d82ae2b8d24208418bfb09cbb3074c056e790dc

      SHA256

      a2d3d892c68a84208a9887cb34ecae820e59c4aa25c22db5c23379df344df004

      SHA512

      050550640a7bf2b65b3cd537f252b64465ec451555ff1831a9d799922e8c3382e83a52bc46015c5ed1ac79ebb233616f72aa8ed72f01e8be578ca383a304ff7a

    • \??\c:\Users\Admin\AppData\Local\Temp\CSCD652.tmp

      Filesize

      652B

      MD5

      c9223a5bbb8f48ed7501e269c8f6611c

      SHA1

      60fda5954a3e41aeb466ef98edba2b9debe5dc77

      SHA256

      2b3eae3fd87dd5e630db2029fdb7338d25b171f7a6f131e7c589ada337d66af3

      SHA512

      84e265fa73bd70d884a6ac7f2ae199edba9cfed0372d270fd73502056365388cf07ed02faeb8b8981be8a94253df895c33386876185f8d968248d7de97414dbf

    • \??\c:\Users\Admin\AppData\Local\Temp\xhyaf5va.0.cs

      Filesize

      4KB

      MD5

      2216d197bc442e875016eba15c07a937

      SHA1

      37528e21ea3271b85d276c6bd003e6c60c81545d

      SHA256

      2e9e3da7bfa1334706550bb4d6269bf3e64cbbc09fa349af52eb22f32aebb4af

      SHA512

      7d7bdc3bf83ac0a29e917ead899dcaa1b47ee2660f405fe4883ca2a2546f7924265e1d75a2ea02c0e34fac4d2bb82bbaaa88d06c240afad4e9fd49337cd04d3f

    • \??\c:\Users\Admin\AppData\Local\Temp\xhyaf5va.cmdline

      Filesize

      206B

      MD5

      2a92582e22d2c43aa066c8ca25fd49f6

      SHA1

      f5dc81e37504d1543889c9368f6d270a6552cffc

      SHA256

      60136e8cf011b4e79040d79dbfcb03e6846dddfda9ae91b3394c849946cfa320

      SHA512

      432626650cf2f542eb8a3abb175776e38832b125fbcff17206a650047daef1ad7703dd6ec6bd1265472ce1cc36bfd38da926a8694eb4d283541d6d5c7c57d3e9

    • memory/2380-55-0x0000000077220000-0x0000000077330000-memory.dmp

      Filesize

      1.1MB

    • memory/2380-47-0x0000000077220000-0x0000000077330000-memory.dmp

      Filesize

      1.1MB

    • memory/2380-66-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/2380-65-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/2380-30-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2380-64-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/2380-35-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/2380-32-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/2380-36-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/2380-28-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/2380-38-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/2380-37-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/2380-27-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/2380-25-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/2380-63-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/2380-44-0x0000000077238000-0x0000000077239000-memory.dmp

      Filesize

      4KB

    • memory/2380-45-0x0000000077220000-0x0000000077330000-memory.dmp

      Filesize

      1.1MB

    • memory/2380-62-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/2380-46-0x0000000077220000-0x0000000077330000-memory.dmp

      Filesize

      1.1MB

    • memory/2380-50-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/2380-51-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/2380-52-0x0000000077220000-0x0000000077330000-memory.dmp

      Filesize

      1.1MB

    • memory/2380-53-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/2380-54-0x0000000077220000-0x0000000077330000-memory.dmp

      Filesize

      1.1MB

    • memory/2380-61-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/2380-57-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/2380-58-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/2380-59-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/2380-60-0x0000000000400000-0x000000000045C000-memory.dmp

      Filesize

      368KB

    • memory/2392-0-0x00000000745F1000-0x00000000745F2000-memory.dmp

      Filesize

      4KB

    • memory/2392-42-0x00000000745F0000-0x0000000074B9B000-memory.dmp

      Filesize

      5.7MB

    • memory/2392-1-0x00000000745F0000-0x0000000074B9B000-memory.dmp

      Filesize

      5.7MB

    • memory/2392-2-0x00000000745F0000-0x0000000074B9B000-memory.dmp

      Filesize

      5.7MB

    • memory/2556-11-0x00000000745F0000-0x0000000074B9B000-memory.dmp

      Filesize

      5.7MB

    • memory/2556-16-0x00000000745F0000-0x0000000074B9B000-memory.dmp

      Filesize

      5.7MB