Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    15/07/2024, 18:37

General

  • Target

    4ae8a5ce179eaefe40c694f9fae8bd48_JaffaCakes118.exe

  • Size

    73KB

  • MD5

    4ae8a5ce179eaefe40c694f9fae8bd48

  • SHA1

    84ee6882afef02f81b4ff1284809567600320179

  • SHA256

    87306c6bb1a048408d12ac101e7c1d83c1556a3fda29d7d430dc5667fc1ea1d5

  • SHA512

    4cd3753e22f4d5f592e3782404e59679ecba56d73a68732289d3851d079dc9b6532a6bf733150efd15c71c4f0a149933a515ddc3032e7216a76c8dbaf5ed31d9

  • SSDEEP

    1536:cB/Mz7IPM8QX41zUIF5uM2IHSlrd0SIivppoNn:cB/MI0X42ILutIorRONn

Score
8/10

Malware Config

Signatures

  • Server Software Component: Terminal Services DLL 1 TTPs 14 IoCs
  • Loads dropped DLL 24 IoCs
  • Drops file in System32 directory 14 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ae8a5ce179eaefe40c694f9fae8bd48_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4ae8a5ce179eaefe40c694f9fae8bd48_JaffaCakes118.exe"
    1⤵
    • Server Software Component: Terminal Services DLL
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    PID:3048
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    PID:2680
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    PID:2644
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    PID:2552
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    PID:3004
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    PID:2716
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    PID:2576
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    PID:2068
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
      PID:1840
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k netsvcs
      1⤵
      • Loads dropped DLL
      PID:1224
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k netsvcs
      1⤵
      • Loads dropped DLL
      PID:1696
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k netsvcs
      1⤵
      • Loads dropped DLL
      PID:1760
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k netsvcs
      1⤵
      • Loads dropped DLL
      PID:1044
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k netsvcs
      1⤵
      • Loads dropped DLL
      PID:1040

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \??\c:\windows\SysWOW64\fastuserswitchingcompatibility.dll

      Filesize

      73KB

      MD5

      591b98460855033cc339e5fff3ae037d

      SHA1

      f8622d2cfcf9d98fb904c20007123d460f09d1c3

      SHA256

      e5cb57fdc92aae9925627ba5af71ae631bce4834253c32e16503c07941bce169

      SHA512

      63ad1d4edeadf02801389b49586d14b5514de754b0880740c1246803a66c7fbf280e5bfa27e22fa0dbd4d672e5c3a7a9cfdbaad633d90523f09f6b829a95d9ae

    • memory/1044-65-0x0000000074260000-0x000000007427F000-memory.dmp

      Filesize

      124KB

    • memory/1224-50-0x0000000074260000-0x000000007427F000-memory.dmp

      Filesize

      124KB

    • memory/1696-56-0x0000000074280000-0x000000007429F000-memory.dmp

      Filesize

      124KB

    • memory/2552-25-0x0000000074260000-0x000000007427F000-memory.dmp

      Filesize

      124KB

    • memory/2552-24-0x0000000074280000-0x000000007429F000-memory.dmp

      Filesize

      124KB

    • memory/2644-17-0x0000000073D30000-0x0000000073D4F000-memory.dmp

      Filesize

      124KB

    • memory/2644-18-0x0000000073D10000-0x0000000073D2F000-memory.dmp

      Filesize

      124KB

    • memory/2680-10-0x0000000074280000-0x000000007429F000-memory.dmp

      Filesize

      124KB

    • memory/2680-11-0x0000000074260000-0x000000007427F000-memory.dmp

      Filesize

      124KB

    • memory/3048-1-0x0000000000DF0000-0x0000000000E0F000-memory.dmp

      Filesize

      124KB

    • memory/3048-5-0x0000000000E0E000-0x0000000000E0F000-memory.dmp

      Filesize

      4KB

    • memory/3048-30-0x0000000000020000-0x000000000003F000-memory.dmp

      Filesize

      124KB

    • memory/3048-2-0x0000000000020000-0x000000000003F000-memory.dmp

      Filesize

      124KB

    • memory/3048-3-0x0000000000020000-0x000000000003F000-memory.dmp

      Filesize

      124KB

    • memory/3048-4-0x0000000000020000-0x000000000003F000-memory.dmp

      Filesize

      124KB