Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    12/07/2024, 06:11 UTC

General

  • Target

    3c40fe6b00ba54b544a1096cfdcbe4b6_JaffaCakes118.exe

  • Size

    418KB

  • MD5

    3c40fe6b00ba54b544a1096cfdcbe4b6

  • SHA1

    2689cc65e0503573cfd8ff6fd0ea172c12874de1

  • SHA256

    8ae7ef926e745ef5bca777ead1ad926bbe0ce84cf6ec4ac567235681f00e7d85

  • SHA512

    c4a34657213f1739d44f23413d3782aa3e79e92e5e62ef6cf5c5938aac9044d404d4e8de5a117faab6ff4f7b9fe8ef0ee12512cf85f188b23f2a7d025814bfbf

  • SSDEEP

    12288:VqHtCe8K/lGRgOUqmq9kR6lhKX2XwXrFzxdOLAnSNaA2RV4:QHgK/cRgOnmq9g67IQQ/Y

Score
6/10

Malware Config

Signatures

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1204
      • C:\Users\Admin\AppData\Local\Temp\3c40fe6b00ba54b544a1096cfdcbe4b6_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\3c40fe6b00ba54b544a1096cfdcbe4b6_JaffaCakes118.exe"
        2⤵
        • Maps connected drives based on registry
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2416
        • C:\Users\Admin\AppData\Local\Temp\3c40fe6b00ba54b544a1096cfdcbe4b6_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\3c40fe6b00ba54b544a1096cfdcbe4b6_JaffaCakes118.exe"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2888

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1204-36-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

      Filesize

      28KB

    • memory/1204-39-0x000000007EFD0000-0x000000007EFD1000-memory.dmp

      Filesize

      4KB

    • memory/2416-15-0x0000000001F60000-0x0000000001F61000-memory.dmp

      Filesize

      4KB

    • memory/2416-12-0x0000000003580000-0x000000000358B000-memory.dmp

      Filesize

      44KB

    • memory/2416-29-0x0000000000270000-0x0000000000271000-memory.dmp

      Filesize

      4KB

    • memory/2416-30-0x00000000035A0000-0x00000000035A1000-memory.dmp

      Filesize

      4KB

    • memory/2416-28-0x0000000000220000-0x0000000000221000-memory.dmp

      Filesize

      4KB

    • memory/2416-11-0x0000000000570000-0x0000000000571000-memory.dmp

      Filesize

      4KB

    • memory/2416-25-0x0000000001F20000-0x0000000001F21000-memory.dmp

      Filesize

      4KB

    • memory/2416-24-0x00000000026E0000-0x00000000026E1000-memory.dmp

      Filesize

      4KB

    • memory/2416-23-0x0000000001FE0000-0x0000000001FE1000-memory.dmp

      Filesize

      4KB

    • memory/2416-22-0x0000000001FA0000-0x0000000001FA1000-memory.dmp

      Filesize

      4KB

    • memory/2416-21-0x00000000026F0000-0x00000000026F1000-memory.dmp

      Filesize

      4KB

    • memory/2416-20-0x0000000001FB0000-0x0000000001FB1000-memory.dmp

      Filesize

      4KB

    • memory/2416-19-0x0000000001FC0000-0x0000000001FC1000-memory.dmp

      Filesize

      4KB

    • memory/2416-18-0x0000000001F70000-0x0000000001F71000-memory.dmp

      Filesize

      4KB

    • memory/2416-17-0x00000000005D0000-0x00000000005D1000-memory.dmp

      Filesize

      4KB

    • memory/2416-16-0x0000000001F30000-0x0000000001F31000-memory.dmp

      Filesize

      4KB

    • memory/2416-0-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/2416-14-0x00000000005E0000-0x00000000005E1000-memory.dmp

      Filesize

      4KB

    • memory/2416-3-0x00000000002A0000-0x00000000002A1000-memory.dmp

      Filesize

      4KB

    • memory/2416-13-0x0000000001F10000-0x0000000001F11000-memory.dmp

      Filesize

      4KB

    • memory/2416-27-0x0000000003570000-0x0000000003572000-memory.dmp

      Filesize

      8KB

    • memory/2416-10-0x0000000003590000-0x0000000003591000-memory.dmp

      Filesize

      4KB

    • memory/2416-9-0x00000000005A0000-0x00000000005A1000-memory.dmp

      Filesize

      4KB

    • memory/2416-8-0x00000000002C0000-0x00000000002C1000-memory.dmp

      Filesize

      4KB

    • memory/2416-7-0x00000000005B0000-0x00000000005B1000-memory.dmp

      Filesize

      4KB

    • memory/2416-6-0x0000000000280000-0x0000000000281000-memory.dmp

      Filesize

      4KB

    • memory/2416-5-0x0000000000590000-0x0000000000591000-memory.dmp

      Filesize

      4KB

    • memory/2416-53-0x00000000070A0000-0x0000000007122000-memory.dmp

      Filesize

      520KB

    • memory/2416-51-0x0000000000390000-0x00000000003F0000-memory.dmp

      Filesize

      384KB

    • memory/2416-33-0x00000000070A0000-0x0000000007122000-memory.dmp

      Filesize

      520KB

    • memory/2416-50-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/2416-4-0x0000000000290000-0x0000000000291000-memory.dmp

      Filesize

      4KB

    • memory/2416-1-0x0000000000390000-0x00000000003F0000-memory.dmp

      Filesize

      384KB

    • memory/2888-48-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2888-32-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2888-34-0x0000000000400000-0x00000000004083A0-memory.dmp

      Filesize

      32KB

    • memory/2888-31-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.