Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20/07/2024, 00:41

General

  • Target

    5e5e55de1809e0e6c1c445ce6d9ba554_JaffaCakes118.exe

  • Size

    225KB

  • MD5

    5e5e55de1809e0e6c1c445ce6d9ba554

  • SHA1

    bcd31361519a80072ed714a499eb390930c178b9

  • SHA256

    70ec0c2e0c67594f82d5339b831b3e277d5aa4f95fc845a81a3b56204b2a9a11

  • SHA512

    3332f9656aa6462d3b543fda30f50c2f09b0aa0f41eb287db5ebcb87072a36df26927bf8c9257fc572181a299e29395efc9d80ba6a928f72e558e4eeb38a15a5

  • SSDEEP

    6144:bFpaENSH3B/HQ2QLCGdouu7Zuj98j1xRQeE6CDMY1:/aEEXB/HQ0GuHZujejKeExDMe

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e5e55de1809e0e6c1c445ce6d9ba554_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5e5e55de1809e0e6c1c445ce6d9ba554_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1560
    • C:\Windows\svchost.exe
      C:\Windows\svchost.exe
      2⤵
      • Executes dropped EXE
      PID:1168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\svchost.exe

    Filesize

    225KB

    MD5

    5e5e55de1809e0e6c1c445ce6d9ba554

    SHA1

    bcd31361519a80072ed714a499eb390930c178b9

    SHA256

    70ec0c2e0c67594f82d5339b831b3e277d5aa4f95fc845a81a3b56204b2a9a11

    SHA512

    3332f9656aa6462d3b543fda30f50c2f09b0aa0f41eb287db5ebcb87072a36df26927bf8c9257fc572181a299e29395efc9d80ba6a928f72e558e4eeb38a15a5

  • memory/1168-17-0x0000000000400000-0x0000000000499000-memory.dmp

    Filesize

    612KB

  • memory/1168-16-0x0000000000400000-0x0000000000499000-memory.dmp

    Filesize

    612KB

  • memory/1168-21-0x0000000000400000-0x0000000000499000-memory.dmp

    Filesize

    612KB

  • memory/1168-20-0x0000000000400000-0x0000000000499000-memory.dmp

    Filesize

    612KB

  • memory/1168-12-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/1168-11-0x0000000000220000-0x0000000000222000-memory.dmp

    Filesize

    8KB

  • memory/1168-18-0x0000000000400000-0x0000000000499000-memory.dmp

    Filesize

    612KB

  • memory/1168-19-0x0000000000220000-0x0000000000222000-memory.dmp

    Filesize

    8KB

  • memory/1560-8-0x0000000000330000-0x00000000003C9000-memory.dmp

    Filesize

    612KB

  • memory/1560-13-0x0000000000400000-0x0000000000499000-memory.dmp

    Filesize

    612KB

  • memory/1560-14-0x0000000000400000-0x0000000000499000-memory.dmp

    Filesize

    612KB

  • memory/1560-0-0x0000000000400000-0x0000000000499000-memory.dmp

    Filesize

    612KB

  • memory/1560-15-0x0000000000330000-0x0000000000332000-memory.dmp

    Filesize

    8KB

  • memory/1560-2-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/1560-1-0x0000000000220000-0x0000000000222000-memory.dmp

    Filesize

    8KB

  • memory/1560-10-0x0000000000330000-0x00000000003C9000-memory.dmp

    Filesize

    612KB