Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19/07/2024, 07:51

General

  • Target

    5b0cbce55e2774adf8eef9d00ed6b902_JaffaCakes118.exe

  • Size

    194KB

  • MD5

    5b0cbce55e2774adf8eef9d00ed6b902

  • SHA1

    32c3f341d21dcb054f3b2804347481c52eec6437

  • SHA256

    bda8b07199ccb0aafc6797eaa9d7e7a63dd585f1733b3f6436101949cfbce839

  • SHA512

    307a65d54ab732c0290843d53438af6e5e594328792191071d3a0eb6906854462c5d8687b6644c713f1be734b2359101cd4c676dc5ae93619c61acb67e880a3d

  • SSDEEP

    6144:pmE1ZqjiDAHmTwsL2V6bbLiqmOqzz+oyM:w6Zqj2WsL2V83MbGoyM

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 53 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1100
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1200
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1252
          • C:\Users\Admin\AppData\Local\Temp\5b0cbce55e2774adf8eef9d00ed6b902_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\5b0cbce55e2774adf8eef9d00ed6b902_JaffaCakes118.exe"
            2⤵
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2096
            • C:\Users\Admin\AppData\Roaming\Faxial\soen.exe
              "C:\Users\Admin\AppData\Roaming\Faxial\soen.exe"
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:2764
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpdc7b10a2.bat"
              3⤵
              • Deletes itself
              PID:1652
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:1180
          • C:\Program Files\Windows Mail\WinMail.exe
            "C:\Program Files\Windows Mail\WinMail.exe" -Embedding
            1⤵
            • NTFS ADS
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            PID:1852
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
            1⤵
              PID:944
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
              1⤵
                PID:1900
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                1⤵
                  PID:2972

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\edb.log

                  Filesize

                  2.0MB

                  MD5

                  9b3e6ebda4feefbde0091b3787e73253

                  SHA1

                  2ff0516c6a8978af4243b6de0316b36de9d93072

                  SHA256

                  ae9f62be4f51360ba9b54408818d07145e8d807e9a3f69303f979bef9c3421a7

                  SHA512

                  61f6d991131086ff44f0b5e28eb8173cdc72d03ccf39abcc44f0cbd2f7bf1fac27294d8cd04e32e6fd520d816692dacdd8e1f0716efc9dad7163f2c143db3184

                • C:\Users\Admin\AppData\Local\Temp\tmpdc7b10a2.bat

                  Filesize

                  271B

                  MD5

                  7357a12c0ff4f4e681fe85ec0b2605b0

                  SHA1

                  b0ba766c256e053cdb7d64569f3b6df9b288b8ed

                  SHA256

                  676982222a4400b25ab587298a41192a89823246b3d36b06ce74ae2bc88f99d7

                  SHA512

                  b48f647948d0801df77569cde55f242b9145123fc01ac765d6ef25c4b5e4fba162b6772ac34fd10195d8e632d08801e830cc40fdb6967ff90843fe7d2a62f9fd

                • C:\Users\Admin\AppData\Roaming\Faxial\soen.exe

                  Filesize

                  194KB

                  MD5

                  28af82cea0664726815412fae78201de

                  SHA1

                  9787cd9588f6c4e3a0bc8dc27bc5332f1f38d7cf

                  SHA256

                  624e943b910bee4881b4676fee099c3c59642fd1dec477dbbcfac549201fb6ec

                  SHA512

                  1ec977c02c0bf02d72d14ddc1a71b93eae65a1070f29083ff8d0d16d8e594f40dcc7fecddcf3d2f7bedccd4bbbfb4edc37388ac583aa9ce68f66dc0c437636a1

                • memory/1100-37-0x0000000001FB0000-0x0000000001FE3000-memory.dmp

                  Filesize

                  204KB

                • memory/1100-31-0x0000000001FB0000-0x0000000001FE3000-memory.dmp

                  Filesize

                  204KB

                • memory/1100-33-0x0000000001FB0000-0x0000000001FE3000-memory.dmp

                  Filesize

                  204KB

                • memory/1100-36-0x0000000001FB0000-0x0000000001FE3000-memory.dmp

                  Filesize

                  204KB

                • memory/1100-29-0x0000000001FB0000-0x0000000001FE3000-memory.dmp

                  Filesize

                  204KB

                • memory/1180-51-0x0000000001F30000-0x0000000001F63000-memory.dmp

                  Filesize

                  204KB

                • memory/1180-54-0x0000000001F30000-0x0000000001F63000-memory.dmp

                  Filesize

                  204KB

                • memory/1180-55-0x0000000001F30000-0x0000000001F63000-memory.dmp

                  Filesize

                  204KB

                • memory/1180-57-0x0000000001F30000-0x0000000001F63000-memory.dmp

                  Filesize

                  204KB

                • memory/1200-41-0x0000000002010000-0x0000000002043000-memory.dmp

                  Filesize

                  204KB

                • memory/1200-42-0x0000000002010000-0x0000000002043000-memory.dmp

                  Filesize

                  204KB

                • memory/1200-43-0x0000000002010000-0x0000000002043000-memory.dmp

                  Filesize

                  204KB

                • memory/1200-44-0x0000000002010000-0x0000000002043000-memory.dmp

                  Filesize

                  204KB

                • memory/1252-49-0x0000000002AF0000-0x0000000002B23000-memory.dmp

                  Filesize

                  204KB

                • memory/1252-46-0x0000000002AF0000-0x0000000002B23000-memory.dmp

                  Filesize

                  204KB

                • memory/1252-47-0x0000000002AF0000-0x0000000002B23000-memory.dmp

                  Filesize

                  204KB

                • memory/1252-48-0x0000000002AF0000-0x0000000002B23000-memory.dmp

                  Filesize

                  204KB

                • memory/2096-61-0x00000000003A0000-0x00000000003D3000-memory.dmp

                  Filesize

                  204KB

                • memory/2096-0-0x0000000000400000-0x000000000046A000-memory.dmp

                  Filesize

                  424KB

                • memory/2096-1-0x0000000000220000-0x0000000000234000-memory.dmp

                  Filesize

                  80KB

                • memory/2096-19-0x0000000000540000-0x00000000005AA000-memory.dmp

                  Filesize

                  424KB

                • memory/2096-60-0x00000000003A0000-0x00000000003D3000-memory.dmp

                  Filesize

                  204KB

                • memory/2096-62-0x00000000003A0000-0x00000000003D3000-memory.dmp

                  Filesize

                  204KB

                • memory/2096-63-0x00000000003A0000-0x00000000003D3000-memory.dmp

                  Filesize

                  204KB

                • memory/2096-65-0x00000000003A0000-0x00000000003D3000-memory.dmp

                  Filesize

                  204KB

                • memory/2096-64-0x00000000003A0000-0x00000000003D3000-memory.dmp

                  Filesize

                  204KB

                • memory/2096-18-0x0000000000540000-0x00000000005AA000-memory.dmp

                  Filesize

                  424KB

                • memory/2096-7-0x0000000000260000-0x0000000000261000-memory.dmp

                  Filesize

                  4KB

                • memory/2096-4-0x0000000000400000-0x000000000046A000-memory.dmp

                  Filesize

                  424KB

                • memory/2096-3-0x0000000000400000-0x000000000046A000-memory.dmp

                  Filesize

                  424KB

                • memory/2096-5-0x0000000000260000-0x0000000000261000-memory.dmp

                  Filesize

                  4KB

                • memory/2096-68-0x0000000000270000-0x0000000000271000-memory.dmp

                  Filesize

                  4KB

                • memory/2096-70-0x0000000000270000-0x0000000000271000-memory.dmp

                  Filesize

                  4KB

                • memory/2096-72-0x00000000003A0000-0x00000000003D3000-memory.dmp

                  Filesize

                  204KB

                • memory/2096-76-0x00000000003A0000-0x00000000003D3000-memory.dmp

                  Filesize

                  204KB

                • memory/2096-75-0x0000000000270000-0x0000000000271000-memory.dmp

                  Filesize

                  4KB

                • memory/2096-78-0x0000000000270000-0x0000000000271000-memory.dmp

                  Filesize

                  4KB

                • memory/2096-213-0x0000000000270000-0x0000000000271000-memory.dmp

                  Filesize

                  4KB

                • memory/2096-212-0x0000000077D90000-0x0000000077D91000-memory.dmp

                  Filesize

                  4KB

                • memory/2096-2-0x0000000000400000-0x000000000046A000-memory.dmp

                  Filesize

                  424KB

                • memory/2096-299-0x00000000003A0000-0x00000000003D3000-memory.dmp

                  Filesize

                  204KB

                • memory/2096-298-0x0000000000400000-0x000000000046A000-memory.dmp

                  Filesize

                  424KB

                • memory/2764-20-0x0000000000400000-0x000000000046A000-memory.dmp

                  Filesize

                  424KB

                • memory/2764-552-0x0000000000400000-0x000000000046A000-memory.dmp

                  Filesize

                  424KB