Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21/07/2024, 19:31

General

  • Target

    611a201b2c055dca0d15916bd60b6ab1_JaffaCakes118.exe

  • Size

    282KB

  • MD5

    611a201b2c055dca0d15916bd60b6ab1

  • SHA1

    b665fa95b797e91ccc8bdd1e2228fc5112cb27c3

  • SHA256

    69ef9064f92006a1beafec2f55f1f686dd9dafe4864ec8c5279384d78977086e

  • SHA512

    5c335d5855b3b3ba07d6e791be9d61dfbbcd8f719ac1cc614a5d914cca94dc2cf70fed07aff87726e9c33231529611b6b6a80ea21269c636a57fc3c3b61561ed

  • SSDEEP

    6144:ZLwSv3A6hlVbPG9usjTSKoXVOdgFyVbi2HtoQzb1pBVUjWO:ZMSY8lNPYHw85qWbUj3

Score
7/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\611a201b2c055dca0d15916bd60b6ab1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\611a201b2c055dca0d15916bd60b6ab1_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2928
    • C:\Users\Admin\AppData\Local\Temp\ckrdyr.exe
      "C:\Users\Admin\AppData\Local\Temp\ckrdyr.exe"
      2⤵
      • Executes dropped EXE
      PID:1508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\ckrdyr.exe

    Filesize

    117KB

    MD5

    d36d8859f9b974d49d4b837d373d1674

    SHA1

    b7e995a5e809b8beca970b189c460b66f3d99935

    SHA256

    45d0873050b62c11da8c090b835bc47edcdb35f50de40fa0c2387e1c1c4fcdad

    SHA512

    96a955d825fa175b10ba3d8e4bbc56252f8ec40d287b73b11fb2f2217d0866b3214e81ae6fc2db110799a352ed033fa5c38b8dfa92d5c1658b67ed070008c9ae

  • \Users\Admin\AppData\Local\Temp\wibyix.tmp

    Filesize

    51KB

    MD5

    91a804e7b75d591f33cd58bf28c23f20

    SHA1

    182b6847f12f7193552bf05392b193643e21d085

    SHA256

    346aca2c18c86babaea64d15684bfac4ba601654dbc07cd9aac9e3e311024276

    SHA512

    062b6e4fbfcf51f6731537132a25f3a370260d6d6aedbba9f7d9271dfde63533e71ebdd9f5042170796fb491c40cfae543fe488f5b338b0be3669a747eb76cc4

  • memory/1508-16-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1508-17-0x0000000000220000-0x0000000000233000-memory.dmp

    Filesize

    76KB

  • memory/2928-7-0x0000000075120000-0x0000000075144000-memory.dmp

    Filesize

    144KB

  • memory/2928-19-0x0000000075120000-0x0000000075144000-memory.dmp

    Filesize

    144KB

  • memory/2928-20-0x0000000075120000-0x0000000075144000-memory.dmp

    Filesize

    144KB

  • memory/2928-21-0x0000000075120000-0x0000000075144000-memory.dmp

    Filesize

    144KB