Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20/07/2024, 00:24

General

  • Target

    5e50674fc2ca3eff46bed2e9cc3a11e1_JaffaCakes118.exe

  • Size

    134KB

  • MD5

    5e50674fc2ca3eff46bed2e9cc3a11e1

  • SHA1

    1c8252cdd0a204cbeb5534c0a3b6dd82716895af

  • SHA256

    163aed40fd6bd0f885f3d6201583bdc062044792d2b0ea8c0757ce00a6d4f0e2

  • SHA512

    7e2f769583eb45cf16ae41fa61280de2f798594f2710d524b8de047b7445f2c00a1d7bfd81b55e9d9e931cf984cfe8d6ad1d80bf73239ca08a92eba1d81f25ca

  • SSDEEP

    1536:jSqyQc5gsfh84Xpuu0rDhaltXkXo8UTaSzrbuip5hVNlwmWhyE1yoQgSE:MtRy4srDEioFaSiip5hVrwXTvS

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1360
      • C:\Users\Admin\AppData\Local\Temp\5e50674fc2ca3eff46bed2e9cc3a11e1_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\5e50674fc2ca3eff46bed2e9cc3a11e1_JaffaCakes118.exe"
        2⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:1916
        • C:\Users\Admin\DocumentsSERVER.EXE
          "C:\Users\Admin\DocumentsSERVER.EXE"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2716
        • C:\Windows\svchost.exe
          "C:\Windows\svchost.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Enumerates connected drives
          • Drops autorun.inf file
          • Drops file in Program Files directory
          • Suspicious use of WriteProcessMemory
          PID:2728
          • C:\Users\Admin\DocumentsSERVER.EXE
            "C:\Users\Admin\DocumentsSERVER.EXE"
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2660

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\DocumentsMSG

      Filesize

      25B

      MD5

      cc06342cb0ace7abe917191cf4d52689

      SHA1

      0b762d77d20896f7721c3592477e6ddbb7b3fa70

      SHA256

      deaa10e000c4d758c5cb8e476c3122c0e904c46cfcb50819454e44ed8de8991e

      SHA512

      b943f7fe58bc333dd1ababdfea63de0420176e4727d15fac631cf045f6146fb73f2f68e7c6ed446becd25ebe7a353f284e13fdcace11db2d675595d445e7287a

    • C:\Users\Admin\DocumentsURL

      Filesize

      39B

      MD5

      67235f540ada2c2e6832c1debb5d536c

      SHA1

      e5f70c2074623a863b2dc3ef9cd83642d7a2ab6a

      SHA256

      29bd5b90368a01a560a525c156ee07580cd4642e1f71728d04437fa52982d1cd

      SHA512

      e5aab95437ca53a294eb10aa901b3be6683552b0365ff20ffbd1faa325095aea59e5c92d2c8b8a1a3558f2eb13dcb9d6fbf448d962de25d374d89b191d9faeea

    • C:\Windows\svchost.exe

      Filesize

      134KB

      MD5

      5e50674fc2ca3eff46bed2e9cc3a11e1

      SHA1

      1c8252cdd0a204cbeb5534c0a3b6dd82716895af

      SHA256

      163aed40fd6bd0f885f3d6201583bdc062044792d2b0ea8c0757ce00a6d4f0e2

      SHA512

      7e2f769583eb45cf16ae41fa61280de2f798594f2710d524b8de047b7445f2c00a1d7bfd81b55e9d9e931cf984cfe8d6ad1d80bf73239ca08a92eba1d81f25ca

    • \Users\Admin\DocumentsSERVER.EXE

      Filesize

      33KB

      MD5

      6500980b9874022352f7a11c3b45ea4c

      SHA1

      1ff410ae32eed7af834f11c9901a03bdbafe93b2

      SHA256

      daecb4df367c14fd5ed31dd5db8aa33c3969ca9e4af6fe4da1826e2a8864ef02

      SHA512

      432fad3e75c1a01033d8e311cc4d275c5a041cb7350d1f5fd28c4a8240b290b089ef377f117f9aa1979515db001c161ab76c389c0be7fe7ce381e80945e48a59

    • memory/1360-42-0x000000007EFD0000-0x000000007EFD1000-memory.dmp

      Filesize

      4KB

    • memory/1360-39-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

      Filesize

      28KB

    • memory/1916-22-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB

    • memory/1916-4-0x0000000000430000-0x0000000000439000-memory.dmp

      Filesize

      36KB

    • memory/2660-31-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2716-51-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2728-29-0x00000000002F0000-0x00000000002F9000-memory.dmp

      Filesize

      36KB

    • memory/2728-30-0x00000000002F0000-0x00000000002F9000-memory.dmp

      Filesize

      36KB

    • memory/2728-64-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB