Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    16/07/2024, 01:52

General

  • Target

    4c534640c1640866fb3f340b7f2f097b_JaffaCakes118.exe

  • Size

    526KB

  • MD5

    4c534640c1640866fb3f340b7f2f097b

  • SHA1

    87335d6780313da3243963768c56a1d57da4ffba

  • SHA256

    74f7681392fa6d1d6c62467d8a9b3ab60df26820ce60fad04585b7cb68d444b1

  • SHA512

    7b66b294999d9266a476e40e0b263197a499207a7d82c7cf22b1ad55bf458a281dc967b273255665f2232c4698365ac483735412bd7248ecc8c8e17a543e3ab5

  • SSDEEP

    12288:FVpo70X4yQySH6u40Prkl84/0zGoPqLbI16MMcxwireV:F3+0Xh46N+2czaPE6MHxw7

Score
8/10

Malware Config

Signatures

  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • UPX packed file 15 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c534640c1640866fb3f340b7f2f097b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4c534640c1640866fb3f340b7f2f097b_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Users\Admin\AppData\Local\Temp\QvodSetup5.exe
      "C:\Users\Admin\AppData\Local\Temp\QvodSetup5.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2896
    • C:\Users\Admin\AppData\Local\Temp\qvodplay7.exe
      "C:\Users\Admin\AppData\Local\Temp\qvodplay7.exe"
      2⤵
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2484
      • C:\Users\Admin\AppData\Local\Temp\~25946532.exe
        C:\Users\Admin\AppData\Local\Temp\~25946532.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2740
        • C:\Windows\SysWOW64\cmd.exe
          cmd
          4⤵
            PID:1200

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\QvodSetup5.exe

      Filesize

      540KB

      MD5

      59e20e2ec60d5946ad54b64a3deb1c83

      SHA1

      7027c9308b7b2d14ff9fd7b81efa81a1c9a0ec68

      SHA256

      538c299746b0afa502968f74f13220069a204e06d008c429a19762ee7ae097bc

      SHA512

      283824f4d63fdef8eba6a078dc7dcaff401cc13aee6e3c970f0505772b4b1525e2ad805dc2e90b3140f3d9523ea7db575eaf860db60f6c2b4a8edb289d447aa9

    • C:\Users\Admin\AppData\Local\Temp\qvodplay7.exe

      Filesize

      29KB

      MD5

      1a3440da9f8f5cad3319d8b2e17772be

      SHA1

      fb3c6ec93d7d15228f77d71651a8f24a1a35facf

      SHA256

      09c7ece20c9b50b0d272cc40c45a965d289a9ae73441a0b893de3c9532aeeae3

      SHA512

      b22e08e4fc4a4acb760a3d56992b9d73f1ccb5ac2eaff04f66587b55b3a3396f3760840c50e7800f1e51cd95ef95f6d70a41e6c3766ed60cb41ada85920c5e23

    • \Users\Admin\AppData\Local\Temp\~25946532.exe

      Filesize

      8KB

      MD5

      1c85b838536b8027027ed9a9019f6e57

      SHA1

      193086e31000ad275b91798e6ab2bf1823f28fb7

      SHA256

      513684483d92bef7b9ea5f279b47cededbfa059bd7688f0944cd9c3e0a7c4c3c

      SHA512

      7fa2da850652713edc6e187d0014f12ae877d8f6699160a4e0b1ed6d8163279316ace4d81373ee98f22a7f5b816f81a531af1a23c0e9ebb35546e9f8e0d9e25c

    • memory/2484-32-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/2484-49-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/2484-20-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/2484-38-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/2896-37-0x0000000000400000-0x00000000004E7000-memory.dmp

      Filesize

      924KB

    • memory/2896-59-0x0000000000400000-0x00000000004E7000-memory.dmp

      Filesize

      924KB

    • memory/2896-31-0x0000000000400000-0x00000000004E7000-memory.dmp

      Filesize

      924KB

    • memory/2896-67-0x0000000000400000-0x00000000004E7000-memory.dmp

      Filesize

      924KB

    • memory/2896-24-0x00000000004F0000-0x00000000005D7000-memory.dmp

      Filesize

      924KB

    • memory/2896-39-0x00000000004F0000-0x00000000005D7000-memory.dmp

      Filesize

      924KB

    • memory/2896-19-0x0000000000400000-0x00000000004E7000-memory.dmp

      Filesize

      924KB

    • memory/2896-61-0x0000000000400000-0x00000000004E7000-memory.dmp

      Filesize

      924KB

    • memory/2896-48-0x0000000000400000-0x00000000004E7000-memory.dmp

      Filesize

      924KB

    • memory/2896-51-0x0000000000400000-0x00000000004E7000-memory.dmp

      Filesize

      924KB

    • memory/2896-55-0x0000000000400000-0x00000000004E7000-memory.dmp

      Filesize

      924KB

    • memory/3020-18-0x0000000000400000-0x0000000000485398-memory.dmp

      Filesize

      532KB

    • memory/3020-7-0x0000000002D50000-0x0000000002E37000-memory.dmp

      Filesize

      924KB

    • memory/3020-1-0x0000000000400000-0x0000000000485398-memory.dmp

      Filesize

      532KB