Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    12/07/2024, 00:59

General

  • Target

    3b68985626cab622f8b6e7c64992da15_JaffaCakes118.exe

  • Size

    190KB

  • MD5

    3b68985626cab622f8b6e7c64992da15

  • SHA1

    088c23e7452254185bc1d68bc8938dafb74d2e6f

  • SHA256

    18f25368f92e615e37bcbf6b9dd746e78c284fa43e54785f0d1a424ff216584a

  • SHA512

    ea5fc7800890882b9f92e49ed80027a8d23560bdba21ecf7428daff3bd7d4ee559c9acb957c0645dc5b7fed96de63b4f846e5f843422ccaca170b95aab0274d9

  • SSDEEP

    3072:ehp6MQRMEJMxrYZCX2lx775d5NSpu6s2Wcy4rYnXZpMGPa4eRskmKgKWlPIE:ehpmFMdPX2lx77efs2WcyHnXZfax+KA

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 10 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b68985626cab622f8b6e7c64992da15_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3b68985626cab622f8b6e7c64992da15_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Suspicious use of WriteProcessMemory
    PID:2376
    • C:\Users\Admin\AppData\Local\Temp\3b68985626cab622f8b6e7c64992da15_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\3b68985626cab622f8b6e7c64992da15_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\conhost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
        PID:2272
      • C:\Users\Admin\AppData\Local\Temp\3b68985626cab622f8b6e7c64992da15_JaffaCakes118.exe
        C:\Users\Admin\AppData\Local\Temp\3b68985626cab622f8b6e7c64992da15_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
        2⤵
          PID:2544

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\DFCC.286

        Filesize

        600B

        MD5

        023672eb08b046d9473163d55923f26c

        SHA1

        960fd49533af48cfed23f8d880c2fc31545bf28a

        SHA256

        491b537cc528837ebec2861728bff9b31f3ab7efbd1e0f6426abb7bd906c0083

        SHA512

        29eed29de125b15c9f015d20d3122438c2f0a8c2dec68e266e444414f84c3cb36a367ba8e3ca17e433effb26529cda8cd0301361d788da67cf3ed62dcb287383

      • C:\Users\Admin\AppData\Roaming\DFCC.286

        Filesize

        1KB

        MD5

        018d6f6338731c28f82f34b024c38703

        SHA1

        ec8a74c1d2339bf850ec092cd3bd3a5fde8501ad

        SHA256

        cdc80de755ba0c13e6662d99636f44da517d01e7b9179a961fb2e62a54ab330a

        SHA512

        42cbe7550e901e90fd168d0c3d27bb34ebbe077ea5e1be4d6a5a48a1d762aa52a154231ba761ae36d8e74c5baf760b2e0c9f29f9e0c942ad933500d91882053f

      • C:\Users\Admin\AppData\Roaming\DFCC.286

        Filesize

        996B

        MD5

        2fa6e3a699269323d47575d42b6990da

        SHA1

        15752e41892d08b6e35a5c10e89ef57a96e02419

        SHA256

        5dd347db725a8a870b1db52b2b3cdd26917350dfd921d66d0bbb89da308bc7ec

        SHA512

        cf3bff19ac203a5c05399024c951c95f84d15732b3c3d1ab87cb3a04bcddd8bae9d389e81f2e88926ab57f40f7c0d48d62d595e67d73e21c1522c7d8cbef71fa

      • memory/2272-8-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2272-7-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2376-1-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2376-68-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2376-129-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2376-3-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2376-171-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2544-71-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2544-70-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB

      • memory/2544-73-0x0000000000400000-0x000000000046B000-memory.dmp

        Filesize

        428KB