Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    14/07/2024, 12:34

General

  • Target

    45d5534682aeb775864521a1a21a278c_JaffaCakes118.exe

  • Size

    41KB

  • MD5

    45d5534682aeb775864521a1a21a278c

  • SHA1

    26cce1b00b010b9d93dad0a4b9ecf1dafa49b108

  • SHA256

    54590d644de03dc43f008e49fcadb73d7482ec7e590e628981b87375aff3a526

  • SHA512

    c5074765b64070bc1736d55b12778a8585ef99a85d5dd80dbb8dd85f036c1b7a24869fb060f84b86c3407eb4078d070a8abc86e4126ab339abf3728fe7649731

  • SSDEEP

    768:3RoW9cI/ZAqDTolzBtiBaq0I8fYoNVhWIPumVbc7ZGME:1yIGqwllId4YoN/W3mVI7ZzE

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\45d5534682aeb775864521a1a21a278c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\45d5534682aeb775864521a1a21a278c_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2596
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\delself.bat" "
      2⤵
        PID:2464

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\delself.bat

      Filesize

      230B

      MD5

      cd82e0887e1005bc841a1f331b12377e

      SHA1

      182eca593499b4bc05f9b413fc88f94955bcea64

      SHA256

      7c08732b9c9d1b75d509c5b182c27d6e293554659494d6c87a1aec0848ca3ef3

      SHA512

      5d3af50177d2329ebc3a477409a99021ac93095bc75fb48cd0e6bd9c31a833e880694ced87d6603ad06829b8b0edcd4aeb6bee2575d1b9321814f22857171ede

    • memory/2596-0-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2596-3-0x0000000000402000-0x000000000040F000-memory.dmp

      Filesize

      52KB

    • memory/2596-4-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB