Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    24s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    11/07/2024, 12:48

General

  • Target

    392cc99c6daaa2adb4b62922be28a8f1_JaffaCakes118.exe

  • Size

    68KB

  • MD5

    392cc99c6daaa2adb4b62922be28a8f1

  • SHA1

    f273c455678a6c84db8821264a0d4119ca757914

  • SHA256

    7c53d166f8f0242c4eb078cfda8593af367b35a00717c8d51d740aa0022aa7ee

  • SHA512

    e53c4b7acd6e280be29d51cb9d72c69be72dd17f55a19fcb768487b90d738574539b815518b8f36bd09f05b4c9319effb261ad67bf6df8190552667d933ff90b

  • SSDEEP

    1536:58KSZqruCGaP4gsjVTTI31YLcP38NYfN9sx+CyOPQ5e:XSuu1aP4ZTk31YLe8N6Sx+CyOV

Malware Config

Signatures

  • Windows security bypass 2 TTPs 3 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies Control Panel 3 IoCs
  • Modifies registry class 22 IoCs
  • Runs net.exe
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\392cc99c6daaa2adb4b62922be28a8f1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\392cc99c6daaa2adb4b62922be28a8f1_JaffaCakes118.exe"
    1⤵
    • Windows security bypass
    • Windows security modification
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Suspicious use of WriteProcessMemory
    PID:1072
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\system32\regsvr32.exe /s C:\Windows\iehost.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:2320
    • C:\Windows\SysWOW64\net.exe
      C:\Windows\system32\net.exe stop "Security Center"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2700
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop "Security Center"
        3⤵
          PID:3052

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\iehost.dll

      Filesize

      15KB

      MD5

      d09ba8ce003d53d734ee42c470b4958a

      SHA1

      69b25869843be992d8c33f9b8e5e2a56b3a74729

      SHA256

      d1eac348b38bd635604dcb7d73ba3dfa725dd4f430b9e343f66b10d30a256042

      SHA512

      d5368f9dfa3a7a626eb0e529f066fd52780956d769d6e8db3100e7f0b11b06997a9e4bc947b5703e8b5834ed3115a82885707389e1f38a8509542b166c4294ef

    • memory/1072-1-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/1072-0-0x0000000000403000-0x0000000000413000-memory.dmp

      Filesize

      64KB

    • memory/1072-2-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/1072-7-0x0000000000400000-0x0000000000425000-memory.dmp

      Filesize

      148KB

    • memory/2320-6-0x0000000010000000-0x0000000010008000-memory.dmp

      Filesize

      32KB

    • memory/2320-5-0x0000000010003000-0x0000000010006000-memory.dmp

      Filesize

      12KB

    • memory/2320-8-0x0000000010003000-0x0000000010006000-memory.dmp

      Filesize

      12KB