Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    126s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19/07/2024, 12:30

General

  • Target

    5bf47ed55ca18de73c445849c97a4a83_JaffaCakes118.exe

  • Size

    38KB

  • MD5

    5bf47ed55ca18de73c445849c97a4a83

  • SHA1

    d5f3ce1425e1bdeb23a55d3c3cf9422b98e6fbf1

  • SHA256

    00231c130c23fd1ca67b97a553fb8e1521f140cd23e491f6c9c933a3a9fc6ab9

  • SHA512

    6acddc1d095b88489d6613225ebf491c679a7d523d4c2757c604d4fa7795bc9d31b94397a8139abd674914616938dde28bd257ea62a53645a80a0d4a67f9f63f

  • SSDEEP

    768:zTfKEPzAb+XSDBY4UprWYz23CzIspM6Ak0anLQ:z7TyVMST3CsxHfanLQ

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Unexpected DNS network traffic destination 10 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5bf47ed55ca18de73c445849c97a4a83_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5bf47ed55ca18de73c445849c97a4a83_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1848
    • C:\Users\Admin\AppData\Local\Temp\5bf47ed55ca18de73c445849c97a4a83_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\5bf47ed55ca18de73c445849c97a4a83_JaffaCakes118.exe
      2⤵
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2296
      • C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe
        "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe" DEL:C:\Users\Admin\AppData\Local\Temp\5bf47ed55ca18de73c445849c97a4a83_JaffaCakes118.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2796
        • C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe
          "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2672
          • C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe
            "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync .exe" "C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe"
            5⤵
              PID:2608

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Program Files (x86)\Microsoft Office\Office14\BCSSync.exe

      Filesize

      38KB

      MD5

      0490343c439be3c21fe2e69e6670931c

      SHA1

      27fc47f9ff07127ab7f402ab644a4128ce0a1657

      SHA256

      f7617bf792ff9347e1c71b8334da536a0f2a3359f5deb345ad211581b2d7cbd9

      SHA512

      45479134e66b4fb4f71f8d550e68424b2cac84366373dca703cab03a1537e5495f648a6c565bc02415c35744c5c48fc6394377dd2abf6718aa4086983624e23f

    • memory/2296-10-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2296-8-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2296-6-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2296-4-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2296-2-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2296-0-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2296-12-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2296-24-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2296-40-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2672-42-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB