Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14/07/2024, 14:47

General

  • Target

    4647bc3cb996ddc6daee76665b4ba2d6_JaffaCakes118.exe

  • Size

    110KB

  • MD5

    4647bc3cb996ddc6daee76665b4ba2d6

  • SHA1

    0e73f53e23f47e6b4bb6f37869b4f5a448758859

  • SHA256

    8eb2a376ab5ff63812ff684e4d4ad87a301f4ff84cd3e8cc3d027ea8ca0c309e

  • SHA512

    9cb4db872efdbb194f0319858c45ca38562e2142ee4d73a92eae7028efaf64799e26ecf82d64430f518a6e3fac87541b36093db6311c6201ca08e072d21ca28e

  • SSDEEP

    1536:dTKdhmMFi+lokn0CcuQpuv0Ix0vkHWR8ceQDxeOg:dT8cUi20DuQpKnsMkrBg

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Unexpected DNS network traffic destination 10 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4647bc3cb996ddc6daee76665b4ba2d6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4647bc3cb996ddc6daee76665b4ba2d6_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2428
    • C:\Users\Admin\AppData\Local\Temp\4647bc3cb996ddc6daee76665b4ba2d6_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\4647bc3cb996ddc6daee76665b4ba2d6_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:3040
      • C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe
        "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\4647bc3cb996ddc6daee76665b4ba2d6_JaffaCakes118.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2864
        • C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe
          "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\4647bc3cb996ddc6daee76665b4ba2d6_JaffaCakes118.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2308
          • C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe
            "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe" "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\4647bc3cb996ddc6daee76665b4ba2d6_JaffaCakes118.exe
            5⤵
              PID:2868

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Program Files (x86)\Microsoft Office\Office14\BCSSync.exe

      Filesize

      110KB

      MD5

      e58e009cba9aad2328b275e7814724e1

      SHA1

      be4e0764c6d2625ee112af4413487227334bae77

      SHA256

      01b5429b7209d2e8e7154b57eab91a0c46cad2990b0749838f9f714a5a9b6c84

      SHA512

      217ba9cefd75f5ac7b8773bd468e428205e7b5d8e844fdcf1436bfbbfbf94caed9280d6c495e379f811c46a4595ac80cf0d8a24e1861a7553eebaed7e898a015

    • memory/2308-46-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/3040-0-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/3040-14-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/3040-12-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/3040-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/3040-8-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/3040-6-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/3040-4-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/3040-2-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/3040-43-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB