Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    15/07/2024, 01:31

General

  • Target

    47a91b5977ae37d569959af59a336c40_JaffaCakes118.exe

  • Size

    859KB

  • MD5

    47a91b5977ae37d569959af59a336c40

  • SHA1

    e4657211489bfb52c32c83bae99a9b650292bda9

  • SHA256

    168724fb7e0800b37d13e77cb330269d8e14d148c42ad3f8187eaaa314b55634

  • SHA512

    2ed539ec166ba394c715662eccbc3aaaaa970929557c2b920e9112108297c26af02c014875032da36fc4165ba225fc97150c111225439e1abde876f26640bb30

  • SSDEEP

    24576:BYZ6wn7I5umaj2HQcb43MxpjtAHEhKnOBW:BYZn7IzaSHZU8jqkW

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of FindShellTrayWindow 12 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\47a91b5977ae37d569959af59a336c40_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\47a91b5977ae37d569959af59a336c40_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\ProgramData\isecurity.exe
      C:\ProgramData\isecurity.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Enumerates connected drives
      • Writes to the Master Boot Record (MBR)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \ProgramData\isecurity.exe

    Filesize

    852KB

    MD5

    3b7d1d2b1a6b25bf101d5ea10a74bc28

    SHA1

    489519c9c131607d1fceda90e10a62a81670ae6b

    SHA256

    f6c18e427735de4da48218875064a6ed09521265685f8e659c36072a1f0a1d26

    SHA512

    c2dc268a57751ffc2416fd9787f1931b783f7d9721341e12f34a8fb9fa7645e828e308249b3c385920b6e5dce75cfe6417a9294262aaa7fad17a4cb136de7a8e

  • memory/2180-0-0x0000000000487000-0x0000000000488000-memory.dmp

    Filesize

    4KB

  • memory/2180-1-0x0000000000400000-0x0000000000507000-memory.dmp

    Filesize

    1.0MB

  • memory/2180-2-0x0000000000400000-0x0000000000507000-memory.dmp

    Filesize

    1.0MB

  • memory/2180-5-0x0000000000400000-0x0000000000507000-memory.dmp

    Filesize

    1.0MB

  • memory/2604-45-0x0000000000400000-0x0000000000A42000-memory.dmp

    Filesize

    6.3MB

  • memory/2604-49-0x0000000000400000-0x0000000000A42000-memory.dmp

    Filesize

    6.3MB

  • memory/2604-23-0x0000000000400000-0x0000000000A42000-memory.dmp

    Filesize

    6.3MB

  • memory/2604-22-0x0000000000400000-0x0000000000A42000-memory.dmp

    Filesize

    6.3MB

  • memory/2604-24-0x0000000000400000-0x0000000000A42000-memory.dmp

    Filesize

    6.3MB

  • memory/2604-25-0x0000000000400000-0x0000000000A42000-memory.dmp

    Filesize

    6.3MB

  • memory/2604-42-0x0000000000400000-0x0000000000A42000-memory.dmp

    Filesize

    6.3MB

  • memory/2604-43-0x0000000000400000-0x0000000000A42000-memory.dmp

    Filesize

    6.3MB

  • memory/2604-44-0x0000000000400000-0x0000000000A42000-memory.dmp

    Filesize

    6.3MB

  • memory/2604-21-0x0000000000400000-0x0000000000A42000-memory.dmp

    Filesize

    6.3MB

  • memory/2604-46-0x0000000000400000-0x0000000000A42000-memory.dmp

    Filesize

    6.3MB

  • memory/2604-47-0x0000000000400000-0x0000000000A42000-memory.dmp

    Filesize

    6.3MB

  • memory/2604-48-0x0000000000400000-0x0000000000A42000-memory.dmp

    Filesize

    6.3MB

  • memory/2604-19-0x0000000000400000-0x0000000000A42000-memory.dmp

    Filesize

    6.3MB

  • memory/2604-51-0x0000000000400000-0x0000000000A42000-memory.dmp

    Filesize

    6.3MB

  • memory/2604-52-0x0000000000400000-0x0000000000A42000-memory.dmp

    Filesize

    6.3MB

  • memory/2604-53-0x0000000000400000-0x0000000000A42000-memory.dmp

    Filesize

    6.3MB

  • memory/2604-54-0x0000000000400000-0x0000000000A42000-memory.dmp

    Filesize

    6.3MB

  • memory/2604-55-0x0000000000400000-0x0000000000A42000-memory.dmp

    Filesize

    6.3MB

  • memory/2604-56-0x0000000000400000-0x0000000000A42000-memory.dmp

    Filesize

    6.3MB

  • memory/2604-57-0x0000000000400000-0x0000000000A42000-memory.dmp

    Filesize

    6.3MB

  • memory/2604-58-0x0000000000400000-0x0000000000A42000-memory.dmp

    Filesize

    6.3MB

  • memory/2604-59-0x0000000000400000-0x0000000000A42000-memory.dmp

    Filesize

    6.3MB

  • memory/2604-60-0x0000000000400000-0x0000000000A42000-memory.dmp

    Filesize

    6.3MB

  • memory/2604-61-0x0000000000400000-0x0000000000A42000-memory.dmp

    Filesize

    6.3MB