Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    15/07/2024, 23:12

General

  • Target

    4bd2c52e186724048297272d7136fc61_JaffaCakes118.exe

  • Size

    798KB

  • MD5

    4bd2c52e186724048297272d7136fc61

  • SHA1

    659f0c54a828e323929270316d7d09454f06ffb9

  • SHA256

    50b1460ce4a4ce2ca237c33574e5c0a1c5ea2507126f9609eccf946adb208c63

  • SHA512

    0b47e325eee4a35c977d1c3257adc795b000feb7bab9a0e524ce5fa19f438a58dd9508688dea926df87de041e04495eb3f7f04fa5691741effccbec26b4c5f70

  • SSDEEP

    12288:KbUcFcNsToul44cHeFywvx4SVdbuH8eypCmRq9Cy7ngOBMUcJyR9MqnJ6NDezdYd:KYVxd4jFdd3q9CsMha9MLuYZMRZa1

Score
8/10

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 9 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4bd2c52e186724048297272d7136fc61_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4bd2c52e186724048297272d7136fc61_JaffaCakes118.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Adds Run key to start application
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe"
      2⤵
        PID:1796

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2024-0-0x00000000004E2000-0x00000000005AA000-memory.dmp

      Filesize

      800KB

    • memory/2024-1-0x0000000000400000-0x00000000005A945D-memory.dmp

      Filesize

      1.7MB

    • memory/2024-2-0x0000000010410000-0x000000001043E000-memory.dmp

      Filesize

      184KB

    • memory/2024-4-0x0000000010410000-0x000000001043E000-memory.dmp

      Filesize

      184KB

    • memory/2024-9-0x00000000003B0000-0x00000000003DE000-memory.dmp

      Filesize

      184KB

    • memory/2024-20-0x00000000003B0000-0x00000000003DE000-memory.dmp

      Filesize

      184KB

    • memory/2024-25-0x0000000000400000-0x00000000005A945D-memory.dmp

      Filesize

      1.7MB

    • memory/2024-23-0x00000000003B0000-0x00000000003DE000-memory.dmp

      Filesize

      184KB

    • memory/2024-10-0x00000000003B0000-0x00000000003DE000-memory.dmp

      Filesize

      184KB