Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    11/07/2024, 05:27

General

  • Target

    37ddfb7305b3244d4c4db0676134fd06_JaffaCakes118.exe

  • Size

    3.5MB

  • MD5

    37ddfb7305b3244d4c4db0676134fd06

  • SHA1

    70b1ddd7d4b098d651a2ba6c07e8d0834b82c45b

  • SHA256

    f51652b3c16d5b11a8f601d7e3604839292c811e4a11d761a32259278f66d004

  • SHA512

    806cc165121777d35341aa946401517652212115ce48b2e26c290fe645ffda946c37123873d9a1c3a36fc752e7e0999c65d193c0bedd6242a12a9723967841c9

  • SSDEEP

    98304:sAKDPUTGHXoXe79PUgyLq9Nf4yvH5dNu6lF+:QP4G3oa9PXJ9Nf465dU6S

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Themida packer 32 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\37ddfb7305b3244d4c4db0676134fd06_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\37ddfb7305b3244d4c4db0676134fd06_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2800
    • C:\Windows\SysWOW64\notepad.exe
      notepad
      2⤵
      • Adds Run key to start application
      PID:2124
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\SysWOW64\explorer.exe"
      2⤵
      • Identifies Wine through registry keys
      PID:2676
    • C:\Windows\SysWOW64\notepad.exe
      C:\Windows\SysWOW64\notepad.exe
      2⤵
      • Deletes itself
      PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2124-35-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2124-10-0x0000000000080000-0x0000000000081000-memory.dmp

    Filesize

    4KB

  • memory/2668-63-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/2676-72-0x0000000013140000-0x00000000139E5000-memory.dmp

    Filesize

    8.6MB

  • memory/2676-77-0x0000000013140000-0x00000000139E5000-memory.dmp

    Filesize

    8.6MB

  • memory/2676-68-0x0000000013140000-0x00000000139E5000-memory.dmp

    Filesize

    8.6MB

  • memory/2676-73-0x0000000013140000-0x00000000139E5000-memory.dmp

    Filesize

    8.6MB

  • memory/2676-74-0x0000000013140000-0x00000000139E5000-memory.dmp

    Filesize

    8.6MB

  • memory/2676-75-0x0000000013140000-0x00000000139E5000-memory.dmp

    Filesize

    8.6MB

  • memory/2676-76-0x0000000013140000-0x00000000139E5000-memory.dmp

    Filesize

    8.6MB

  • memory/2676-70-0x0000000013140000-0x00000000139E5000-memory.dmp

    Filesize

    8.6MB

  • memory/2676-69-0x0000000013140000-0x00000000139E5000-memory.dmp

    Filesize

    8.6MB

  • memory/2676-71-0x0000000013140000-0x00000000139E5000-memory.dmp

    Filesize

    8.6MB

  • memory/2676-78-0x0000000013140000-0x00000000139E5000-memory.dmp

    Filesize

    8.6MB

  • memory/2676-80-0x0000000013140000-0x00000000139E5000-memory.dmp

    Filesize

    8.6MB

  • memory/2676-44-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2676-41-0x0000000013140000-0x00000000139E5000-memory.dmp

    Filesize

    8.6MB

  • memory/2676-81-0x0000000013140000-0x00000000139E5000-memory.dmp

    Filesize

    8.6MB

  • memory/2676-79-0x0000000013140000-0x00000000139E5000-memory.dmp

    Filesize

    8.6MB

  • memory/2676-117-0x0000000013140000-0x00000000139E5000-memory.dmp

    Filesize

    8.6MB

  • memory/2676-46-0x0000000013140000-0x00000000139E5000-memory.dmp

    Filesize

    8.6MB

  • memory/2676-66-0x0000000013140000-0x00000000139E5000-memory.dmp

    Filesize

    8.6MB

  • memory/2676-67-0x0000000013140000-0x00000000139E5000-memory.dmp

    Filesize

    8.6MB

  • memory/2800-37-0x0000000013140000-0x00000000139E5000-memory.dmp

    Filesize

    8.6MB

  • memory/2800-47-0x0000000013140000-0x00000000139E5000-memory.dmp

    Filesize

    8.6MB

  • memory/2800-64-0x0000000013140000-0x00000000139E5000-memory.dmp

    Filesize

    8.6MB

  • memory/2800-42-0x0000000013140000-0x00000000139E5000-memory.dmp

    Filesize

    8.6MB

  • memory/2800-40-0x0000000013140000-0x00000000139E5000-memory.dmp

    Filesize

    8.6MB

  • memory/2800-39-0x0000000013140000-0x00000000139E5000-memory.dmp

    Filesize

    8.6MB

  • memory/2800-0-0x0000000013140000-0x00000000139E5000-memory.dmp

    Filesize

    8.6MB

  • memory/2800-7-0x0000000013140000-0x00000000139E5000-memory.dmp

    Filesize

    8.6MB

  • memory/2800-8-0x0000000013140000-0x00000000139E5000-memory.dmp

    Filesize

    8.6MB

  • memory/2800-5-0x0000000013140000-0x00000000139E5000-memory.dmp

    Filesize

    8.6MB

  • memory/2800-6-0x0000000013140000-0x00000000139E5000-memory.dmp

    Filesize

    8.6MB

  • memory/2800-4-0x0000000013140000-0x00000000139E5000-memory.dmp

    Filesize

    8.6MB

  • memory/2800-3-0x0000000013140000-0x00000000139E5000-memory.dmp

    Filesize

    8.6MB

  • memory/2800-2-0x0000000013140000-0x00000000139E5000-memory.dmp

    Filesize

    8.6MB

  • memory/2800-1-0x0000000013141000-0x000000001318D000-memory.dmp

    Filesize

    304KB