Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    20/07/2024, 07:48

General

  • Target

    5fa091ad6704e7cdf5c8a123c805ca9f_JaffaCakes118.exe

  • Size

    587KB

  • MD5

    5fa091ad6704e7cdf5c8a123c805ca9f

  • SHA1

    bc74a97f858f5d63f731b066cf10a4fb76789bda

  • SHA256

    7d500da23186f8ff6801436da28f275ad9f1fd5c9e1df0a279b170d433d47463

  • SHA512

    6f6983e98882af71ffb0b2f34e013a7da6702bb92029ba62b19c409bb4231f93c97fc3f998e6a3f45fe9b7d2de4050b7bf42e939130e46f6b7c2f2dcb1ec0bc2

  • SSDEEP

    12288:OglfapVP8SSDHsfwt2cQ7QiV5greCqGLIbugZ6HvN2pxnQYeDfTpoS:OPbRLfwBTjqELGubHspxno

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 14 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5fa091ad6704e7cdf5c8a123c805ca9f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5fa091ad6704e7cdf5c8a123c805ca9f_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2748
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\LWHTXD.bat
      2⤵
      • Deletes itself
      PID:2776
  • C:\Windows\SVCHOST.EXE
    C:\Windows\SVCHOST.EXE
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Suspicious use of FindShellTrayWindow
    PID:2952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\LWHTXD.bat

    Filesize

    218B

    MD5

    aa02ef5e948d701e109f14a582f01576

    SHA1

    3199f56cd4593e4c8e9c45d4fbfd68f2c8eb0505

    SHA256

    fa7e928f88d2534097e39842e7d3a9e10aab610914f3a5a47a00eb6442818b19

    SHA512

    4a1e9e73c2bc9c0751d0e3a50672f1f7b4eec699ca9c81aeb412afea4e6c28181914b1661cdb85f96917999d1a5bf355caf5f2c5e3fb726909904e0c1563d88a

  • C:\Windows\SVCHOST.EXE

    Filesize

    587KB

    MD5

    5fa091ad6704e7cdf5c8a123c805ca9f

    SHA1

    bc74a97f858f5d63f731b066cf10a4fb76789bda

    SHA256

    7d500da23186f8ff6801436da28f275ad9f1fd5c9e1df0a279b170d433d47463

    SHA512

    6f6983e98882af71ffb0b2f34e013a7da6702bb92029ba62b19c409bb4231f93c97fc3f998e6a3f45fe9b7d2de4050b7bf42e939130e46f6b7c2f2dcb1ec0bc2

  • memory/2748-0-0x0000000010000000-0x0000000010095000-memory.dmp

    Filesize

    596KB

  • memory/2748-1-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/2748-13-0x0000000010000000-0x0000000010095000-memory.dmp

    Filesize

    596KB

  • memory/2952-4-0x0000000010000000-0x0000000010095000-memory.dmp

    Filesize

    596KB

  • memory/2952-5-0x00000000002E0000-0x00000000002E1000-memory.dmp

    Filesize

    4KB

  • memory/2952-16-0x0000000010000000-0x0000000010095000-memory.dmp

    Filesize

    596KB

  • memory/2952-17-0x00000000002E0000-0x00000000002E1000-memory.dmp

    Filesize

    4KB