Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14/07/2024, 02:35

General

  • Target

    43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe

  • Size

    26KB

  • MD5

    43f4a2878cadd6343b497ff2fb490856

  • SHA1

    7909df003d31fe602dcf02427221b6a3fcca2585

  • SHA256

    f6040b4047094868e17be9428ea636efb9406f6526e2eb10a3f3917e48c96f6a

  • SHA512

    1742a70157a5872346acb2724ae9de324633f92cb7429061735587359ba01c7d3ab95b96fe6b8cd60f6a47192e1793c164769f63bcc8d56e3d5b732e21953a88

  • SSDEEP

    768:Chw2aHt0dcYsITFT2jqQKG/d4uH8Czb0OmSM:Ww2UF9IJs5f/d42zbgb

Score
10/10

Malware Config

Signatures

  • Modifies security service 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates connected drives 3 TTPs 42 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 21 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:2544
    • C:\Program Files\Common Files\System\tdhleba.exe
      "C:\Program Files\Common Files\System\tdhleba.exe"
      2⤵
      • Modifies security service
      • Modifies visiblity of hidden/system files in Explorer
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3032
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c echo Y| cacls C:\Program Files\dld.dat /t /g everyone:F
        3⤵
          PID:2776
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            4⤵
              PID:2976
            • C:\Windows\SysWOW64\cacls.exe
              cacls C:\Program Files\dld.dat /t /g everyone:F
              4⤵
                PID:1480
          • C:\Program Files\Common Files\Microsoft Shared\tettaje.exe
            "C:\Program Files\Common Files\Microsoft Shared\tettaje.exe"
            2⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:2320
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c echo Y| cacls C:\Program Files\meex.exe /t /g everyone:F
              3⤵
                PID:2652
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  4⤵
                    PID:1728
                  • C:\Windows\SysWOW64\cacls.exe
                    cacls C:\Program Files\meex.exe /t /g everyone:F
                    4⤵
                      PID:536
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                  2⤵
                    PID:2812
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                    2⤵
                      PID:2828
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                      2⤵
                        PID:2924
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                        2⤵
                          PID:2808
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                          2⤵
                            PID:2772
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                            2⤵
                              PID:2368
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                              2⤵
                              • Deletes itself
                              PID:2756
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                              2⤵
                                PID:3040
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                                2⤵
                                  PID:2624
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                                  2⤵
                                    PID:2264
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                                    2⤵
                                      PID:2732
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                                      2⤵
                                        PID:1804
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                                        2⤵
                                          PID:2928
                                        • C:\Windows\SysWOW64\cmd.exe
                                          C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                                          2⤵
                                            PID:2664
                                          • C:\Windows\SysWOW64\cmd.exe
                                            C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                                            2⤵
                                              PID:2936
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                                              2⤵
                                                PID:792
                                              • C:\Windows\SysWOW64\cmd.exe
                                                C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                                                2⤵
                                                  PID:2788
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                                                  2⤵
                                                    PID:2620
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                                                    2⤵
                                                      PID:2628
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                                                      2⤵
                                                        PID:2636
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                                                        2⤵
                                                          PID:2660
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                                                          2⤵
                                                            PID:2680
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                                                            2⤵
                                                              PID:2072
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\43f4a2878cadd6343b497ff2fb490856_JaffaCakes118.exe"
                                                              2⤵
                                                                PID:2328

                                                            Network

                                                            MITRE ATT&CK Enterprise v15

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\Program Files\Common Files\System\tdhleba.exe

                                                              Filesize

                                                              26KB

                                                              MD5

                                                              43f4a2878cadd6343b497ff2fb490856

                                                              SHA1

                                                              7909df003d31fe602dcf02427221b6a3fcca2585

                                                              SHA256

                                                              f6040b4047094868e17be9428ea636efb9406f6526e2eb10a3f3917e48c96f6a

                                                              SHA512

                                                              1742a70157a5872346acb2724ae9de324633f92cb7429061735587359ba01c7d3ab95b96fe6b8cd60f6a47192e1793c164769f63bcc8d56e3d5b732e21953a88

                                                            • C:\autorun.inf

                                                              Filesize

                                                              169B

                                                              MD5

                                                              a54b00618165462a8efb329fed687faa

                                                              SHA1

                                                              11aeca130e833935fe7efdb8403433eb271cc4f8

                                                              SHA256

                                                              ee4862d6ebf8e622959c213db4513d043bb8fede1e376f908ae09f7bcf75e244

                                                              SHA512

                                                              72de05b116bd3c2d00393f1076942df1e328c257aceffd16aeda09841bf4e2f20a8fa0dcf1782512cb4bbe5781056ec8ee67ea95eb204d891013b6f2204271be

                                                            • memory/2320-26-0x0000000000400000-0x0000000000422000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2320-27-0x0000000000220000-0x0000000000320000-memory.dmp

                                                              Filesize

                                                              1024KB

                                                            • memory/2320-24-0x0000000000400000-0x0000000000422000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2320-54-0x0000000000400000-0x0000000000422000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2544-1-0x0000000000400000-0x0000000000422000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2544-12-0x0000000000570000-0x0000000000592000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2544-0-0x0000000000400000-0x0000000000422000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2544-28-0x0000000000400000-0x0000000000422000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/2544-2-0x00000000001B0000-0x00000000001B1000-memory.dmp

                                                              Filesize

                                                              4KB

                                                            • memory/3032-14-0x0000000000400000-0x0000000000422000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/3032-16-0x00000000002A0000-0x00000000002E0000-memory.dmp

                                                              Filesize

                                                              256KB

                                                            • memory/3032-13-0x0000000000400000-0x0000000000422000-memory.dmp

                                                              Filesize

                                                              136KB

                                                            • memory/3032-51-0x0000000000400000-0x0000000000422000-memory.dmp

                                                              Filesize

                                                              136KB