Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21/07/2024, 20:22

General

  • Target

    6143736cbf1e558288fd36e7783e3fe0_JaffaCakes118.exe

  • Size

    2.5MB

  • MD5

    6143736cbf1e558288fd36e7783e3fe0

  • SHA1

    dd702d462ce6bef77696f8c9262e637757dd9eda

  • SHA256

    f80c412c21b19b558467e90f06fc102b236dc0ea6ba5bf053155655920c5a7a7

  • SHA512

    44ced96cae6bf90be28267cbf973495a3c6f2cee31f652af32b86eaf008392e122f6cb7d25ac46457cc3e4e1a71915563c4563cb09090a4b6497f21584c97bb6

  • SSDEEP

    24576:hWO0o2929Hr9jNJWPpbGSNcceVYDcbxFUSxC1RcZtbS8BlDBtbzKwY19Ga1b7y2C:QOnZHrnoPp1ePxSj1Rs33bzHO19uV

Score
7/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6143736cbf1e558288fd36e7783e3fe0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6143736cbf1e558288fd36e7783e3fe0_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\~zm_{0FC86284-CDBC-4431-B4D6-A942E47A99F3}\css\style.css

    Filesize

    2KB

    MD5

    7757619b8df51d677c79395a84e0c539

    SHA1

    8fa1685f830da61a0f4bbdb1db428f4dbef9c971

    SHA256

    7c8000bdae47f22b1db799db5e583902737de0fe37bf2581b18bedb63155b1a3

    SHA512

    3b779b7e4694bf11600b802ea690871f7e65f880c56b5b76fbb0ceede64feee143f6d23031dc485510cb496dad89705999f2e66d4df2390ca318570ff6c7d731

  • C:\Users\Admin\AppData\Local\Temp\~zm_{0FC86284-CDBC-4431-B4D6-A942E47A99F3}\images\cellar_bg.jpg

    Filesize

    548B

    MD5

    4777779f71fde6d16f6cc99013c8daff

    SHA1

    312f97b25bd743a8a8d2268bdfd1ac53701345c2

    SHA256

    46e860286f1f016711f9e6a8b36335ba549c58aadd67322dae897c0f83c06cd2

    SHA512

    1b4cc3e5613c6bef54b47d23a53315f802a016d5961b81b4eab4012c8da1045fae3af486c97e281f9829d83f9190af29e685be2b3bf3ebc89cbbf0d4fcf5e775

  • C:\Users\Admin\AppData\Local\Temp\~zm_{0FC86284-CDBC-4431-B4D6-A942E47A99F3}\images\index_top.jpg

    Filesize

    26KB

    MD5

    05c3582a4efb14334262dec9320b8ac3

    SHA1

    0c6d42c0f417c05ae285327b49002474021e4703

    SHA256

    48f5f24c3b2b24c244cf7211dd9804557436d6e617d9891e308934f32c2301c1

    SHA512

    f4532bf0d0676f64dd114139a86049c093c61c3926a929a2652d7f7d724dcb7505c03bbac3687c7a56f313359d5022137ffa25035d69cf2f91a745f867a124d5

  • C:\Users\Admin\AppData\Local\Temp\~zm_{0FC86284-CDBC-4431-B4D6-A942E47A99F3}\page.html

    Filesize

    1KB

    MD5

    208bf1089774167723e951ea69f6e60c

    SHA1

    6749d9193301e617997a0b1db2c5d1441b6477a5

    SHA256

    e3838c923b1e2f95d8be973d7e149f984bdcd03109648be0a80d1d4ab499e35b

    SHA512

    d5d42863cc001e2a66ada472e8bac3114a026e1927018f1ecb48e5f21743b4db770360e66522d86c3adb22a73a3e53b7a78e91c47a74135bb35531238d3618e0

  • \Users\Admin\AppData\Local\Temp\{D4C5AF53-DBDE-4A1F-A036-D41CBAD28469}.dll

    Filesize

    120KB

    MD5

    c9f333d1ff898672a34805f94a265329

    SHA1

    2deaac66698fb2e9b3868d23034c3211c508b739

    SHA256

    07e546811635574c77edfda126b0e5f5292b4ea13f35158eddedcfc3cbf74b6b

    SHA512

    048c71e48e2def0bfc69ebfb69b834d650a9377082782333f50728fdfd6675df8093d0c87e606022e55d09f81549d4ca3b640bcdd33b9ddc9aace03ee1466add

  • memory/824-0-0x0000000000400000-0x00000000005A5000-memory.dmp

    Filesize

    1.6MB

  • memory/824-1-0x0000000000400000-0x00000000005A5000-memory.dmp

    Filesize

    1.6MB

  • memory/824-5-0x0000000000400000-0x00000000005A5000-memory.dmp

    Filesize

    1.6MB

  • memory/824-32-0x00000000038B0000-0x000000000390B000-memory.dmp

    Filesize

    364KB

  • memory/824-78-0x0000000000400000-0x00000000005A5000-memory.dmp

    Filesize

    1.6MB

  • memory/824-80-0x00000000038B0000-0x000000000390B000-memory.dmp

    Filesize

    364KB