Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    19/07/2024, 03:20

General

  • Target

    5a4398f51e01b23c23769793ae6105cd_JaffaCakes118.exe

  • Size

    165KB

  • MD5

    5a4398f51e01b23c23769793ae6105cd

  • SHA1

    058c1f0cc30fd7b795b10c3485b9d846d26648ec

  • SHA256

    0eb09f5c800a01e103075e07b842d754bf78e0f7f5ece90d4dcb86d605036c8d

  • SHA512

    7d041217c541870262882494a8d0d6b8eb185cb0d9d7ca5de85165a36f37aa328bd0948cc8200ec6adf9bff809461b7b53934a9353cd7bdb761dd33a5d5aa384

  • SSDEEP

    3072:bKdwnC2FbHW5yLQfeigjKC8Q2/b+iL8nuiJZHp3U:Znxb2QQmiWKJ5b+A8nuiJZHp3

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a4398f51e01b23c23769793ae6105cd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5a4398f51e01b23c23769793ae6105cd_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2140
    • C:\Users\Admin\AppData\Local\Temp\5a4398f51e01b23c23769793ae6105cd_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\5a4398f51e01b23c23769793ae6105cd_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
        PID:2128
      • C:\Users\Admin\AppData\Local\Temp\5a4398f51e01b23c23769793ae6105cd_JaffaCakes118.exe
        C:\Users\Admin\AppData\Local\Temp\5a4398f51e01b23c23769793ae6105cd_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
        2⤵
          PID:2652

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\3DCB.EF7

        Filesize

        600B

        MD5

        2eab7e9561de21551a75a50530024f66

        SHA1

        659d7894ee14bfe8504ebbb93f802368c088fe29

        SHA256

        5499b56ca759d932b50fc0d1c4625d68aac89b6920809d7610519d92dd4b4815

        SHA512

        3f170cb224022310220e4b1f262505c29ba9c0552999b7c03e4dfc781541c563586f4ae8ac7ed39919069046fedcf5c282c8694482baa85b252b1d5265b1e64b

      • C:\Users\Admin\AppData\Roaming\3DCB.EF7

        Filesize

        1KB

        MD5

        2a65ecf7b76c1a5ba0eafc318920fa04

        SHA1

        60d502c0e97694af16bb94f6ce39ef796ead9ca2

        SHA256

        1b1361a44790e2e3a3c5572e9b980505232290c7d6f77546c2a3a02b9195c1de

        SHA512

        83e169b1e85b1834dbf96e1ca6f241771e87c8bc6b472260a221c6dacedfd4bd28f48f0fae0df6f7e3003262a65fc8348a6a62942cebe9122bceeeb70d5e92d9

      • C:\Users\Admin\AppData\Roaming\3DCB.EF7

        Filesize

        996B

        MD5

        c77230f395a495e50fd287f90d2f4a0a

        SHA1

        0c46958a8f31125796576cd143c00d448831bec6

        SHA256

        d509d7d185cddad53f79698c94dca7c2f7146aba9c5aa094919f290482f1381a

        SHA512

        6da13f04816a7c8fffbfb637f4d044029e553fe3bbf4b19d1cbe7859676b9413a63b04060ccf75c669c43db67666a1900591f20013f1424f9acbfbaa69a42f40

      • memory/2128-11-0x0000000000400000-0x0000000000445000-memory.dmp

        Filesize

        276KB

      • memory/2128-13-0x0000000000400000-0x0000000000445000-memory.dmp

        Filesize

        276KB

      • memory/2140-2-0x0000000000400000-0x0000000000445000-memory.dmp

        Filesize

        276KB

      • memory/2140-85-0x0000000000400000-0x0000000000445000-memory.dmp

        Filesize

        276KB

      • memory/2140-194-0x0000000000400000-0x0000000000445000-memory.dmp

        Filesize

        276KB

      • memory/2652-86-0x0000000000400000-0x0000000000445000-memory.dmp

        Filesize

        276KB

      • memory/2652-88-0x0000000000400000-0x0000000000445000-memory.dmp

        Filesize

        276KB