Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19/07/2024, 19:36

General

  • Target

    5d5f808e490dfc3834944c4be767fb4a_JaffaCakes118.exe

  • Size

    18KB

  • MD5

    5d5f808e490dfc3834944c4be767fb4a

  • SHA1

    b2cb7a354a9ba57c8cf926f6706602142fec0df3

  • SHA256

    d3c2840821cd83fdb557233fa3f116e698aeeb080772b080cd71205bcdc0584b

  • SHA512

    b7f773b16c13df69bc4ec3568a09d4b720c5e7e2264874f7bcf5d192b938db61fbb80c114bfbe8476e79c4fc35f4b1ca1a68fc36afa966410585c7aceeef0627

  • SSDEEP

    384:uuU0rM5jduU74Qzu5+haGA6OeP0jLWOWVOa/C47dF0/tIrUbqezcg:1pIOUcQiUaWTsq7ZCJtIrsqyv

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1200
      • C:\Users\Admin\AppData\Local\Temp\5d5f808e490dfc3834944c4be767fb4a_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\5d5f808e490dfc3834944c4be767fb4a_JaffaCakes118.exe"
        2⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2624

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Windows\SysWOW64\dndsioc.dll

      Filesize

      27KB

      MD5

      97bbe5457587eefb38c7bc778a1b694c

      SHA1

      95673050c98aef2cd197f2122ad106a531d470fe

      SHA256

      9ee017dd9ca243a2f9980d838540d5e80384dee57becd555ce9f8cdcc2ba030f

      SHA512

      be9706e82793e291cb9f3afb31fd8ed49580bb3de1ae2345a7b9ff9ce25df8a6b5d00cdf1b4f4b65d5c5a4195fc5b156051a01a6edea1cc57dd96d7584efbcbf

    • memory/1200-2-0x00000000021D0000-0x00000000021D1000-memory.dmp

      Filesize

      4KB

    • memory/2624-15-0x0000000000250000-0x0000000000251000-memory.dmp

      Filesize

      4KB

    • memory/2624-11-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/2624-19-0x0000000000402000-0x0000000000403000-memory.dmp

      Filesize

      4KB

    • memory/2624-20-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB