Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    16/07/2024, 07:52

General

  • Target

    4d6956af35f20e9e450e3764f93f7002_JaffaCakes118.exe

  • Size

    1.7MB

  • MD5

    4d6956af35f20e9e450e3764f93f7002

  • SHA1

    bb29842aa46edf5699f8d13aaa32daa4e8571c33

  • SHA256

    c3466a9ff9243efe9a6de5152f92c745e0f355f81769037bda306918a82cdd34

  • SHA512

    4ec87803ca6db1bdadcdffb925ff12b70b039c6a16ac29b6106df0a956d625da28c325393f9371e9114a9eb60b9930df25eebec4dca102895ebe2a7a6a89a1ca

  • SSDEEP

    24576:RBgyjZumcNJjM1dHrMgGfQZmiZLjej/qJOo9yevNTnEgXjGpwH2bmot9:RduLj68Iej/qko9B5RibpT

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d6956af35f20e9e450e3764f93f7002_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4d6956af35f20e9e450e3764f93f7002_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Users\Admin\AppData\Local\ctfmon.exe
      "C:\Users\Admin\AppData\Local\ctfmon.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2260
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\winupdate.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2700
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V ctfmon /D "\"C:\Users\Admin\AppData\Local\ctfmon.exe\"" /f
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2696
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V ctfmon /D "\"C:\Users\Admin\AppData\Local\ctfmon.exe\"" /f
            5⤵
            • Adds Run key to start application
            • Modifies registry key
            PID:2668
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2260 -s 576
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2456
    • C:\Users\Admin\AppData\Local\Eirador Multi v1861.exe
      "C:\Users\Admin\AppData\Local\Eirador Multi v1861.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:2528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\winupdate.bat

    Filesize

    148B

    MD5

    f75271341aacb5971293c8483a89bc83

    SHA1

    c90ef90dd26977763e5f35a3f7c89268dbe83fbd

    SHA256

    e1f428dada2c4611ff6acc2b61672e92b2ca42b67015bfbabde458224c61b1b1

    SHA512

    db401e289e9b3d1f5258e3a2c60e0113c2195c8acd5712c2e97f058f916e2008e9b846119b4cbbd26337e2f62b9b0f21cd046f07c6c166d3bcf43f689a3397a7

  • C:\Users\Admin\AppData\Local\ntdata.dll

    Filesize

    268KB

    MD5

    ed174f4a9bd2409068db32757b3bc384

    SHA1

    397d786a611a5f02932839df7a6a630a656516eb

    SHA256

    3aedc83eb1a417e83f99cc5aa956f0cf3de3fdd5083b0e9c3f7ced24cf074eaf

    SHA512

    d19c6c7ddd59b85d3337362521fe622c94df1d7c9f53e6be38a61969feb3d9c9b3bac0b318c729a6a5e91419f0e1a85954ba4f58c0baac6ac5f6dbb47950a305

  • C:\Users\Admin\AppData\Local\ntldr.dll

    Filesize

    72KB

    MD5

    395c78df12233992b0a2a4de48e8d7ed

    SHA1

    735cebcca0b8945d2f562605b93921fb3a7c960b

    SHA256

    49c842ab6754bdef2cf3443c7b63bcc854deda5474424754af741b42de3ae825

    SHA512

    d66a755ed45670e34296727d67fae83fbff0c7fe286feab73e2df37717185627449c4a63deffeeb013ac61935f344245b7f75f90153cef70ddc0109721bb86c8

  • \Users\Admin\AppData\Local\Eirador Multi v1861.exe

    Filesize

    400KB

    MD5

    2cccaa37025aaa3967f2cc6db25d0c68

    SHA1

    791d7f8ef09ffe60ce4423aee3fdc382b188fc23

    SHA256

    3d9ae884f80a509b3120872e1126ce273902a1cfe3e28fd862484a8e755257ea

    SHA512

    49f08d950652ece90ba5cc4d45222cdc138debefbaabc10c7ec93b9a45d9c6f92b32c68a441a9405fd8397e09fadd56846504e295e25ff0e69e6fde156f8bb01

  • \Users\Admin\AppData\Local\ctfmon.exe

    Filesize

    560KB

    MD5

    a8072393ca67951159b23630acd2971b

    SHA1

    4c986472e2320f0a522e655820a31a76db418efc

    SHA256

    734d16d34150addd7b9e5c34072be244ddc743ecdcb5e5745d91c3ee7298b88a

    SHA512

    c0b6d87225637cabecfa39a3ce8e12b77e8b8865b53a5981401ca452012d966ffa5e0b400a48acd63649c543755111034c9d8ea4366cebc37b1a65afef5dda89

  • memory/2260-15-0x0000000000220000-0x0000000000269000-memory.dmp

    Filesize

    292KB

  • memory/2260-22-0x0000000000220000-0x0000000000269000-memory.dmp

    Filesize

    292KB

  • memory/2260-27-0x0000000000390000-0x00000000003A7000-memory.dmp

    Filesize

    92KB

  • memory/2260-46-0x0000000000400000-0x0000000000498000-memory.dmp

    Filesize

    608KB

  • memory/2260-47-0x0000000000220000-0x0000000000269000-memory.dmp

    Filesize

    292KB

  • memory/2260-55-0x0000000000400000-0x0000000000498000-memory.dmp

    Filesize

    608KB

  • memory/2528-44-0x0000000000220000-0x0000000000269000-memory.dmp

    Filesize

    292KB

  • memory/2528-45-0x0000000000390000-0x00000000003A7000-memory.dmp

    Filesize

    92KB

  • memory/2872-0-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2872-28-0x0000000004000000-0x00000000041BD000-memory.dmp

    Filesize

    1.7MB