Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    21/07/2024, 21:04

General

  • Target

    6163c1f1f0592371f237aa4c8beea275_JaffaCakes118.exe

  • Size

    17KB

  • MD5

    6163c1f1f0592371f237aa4c8beea275

  • SHA1

    f48fb88fc63721e587693a2c25580ef2f9f94bc2

  • SHA256

    5f9ed063bdf77fb7eb20387fa715fd2ff135f58fdf81c29a1d132f9110da78a7

  • SHA512

    43f408045fa615befa2a0ec0ae5d4d80755994a43403e790d71e0cacda871c6459450e324aa71ef437ab62c4b34cf13abf298ef911eb7874b2a89d5d95839a6d

  • SSDEEP

    384:f8N9qwONi/yub707G8gmExBS+rGGSZcdX1Hbc9vfyGwZo:UNQ6zb7b8rEUZwlHbc9vKBu

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6163c1f1f0592371f237aa4c8beea275_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6163c1f1f0592371f237aa4c8beea275_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2728
    • C:\Users\Admin\AppData\Local\Temp\test.exe
      "C:\Users\Admin\AppData\Local\Temp\test.exe"
      2⤵
      • Executes dropped EXE
      PID:1792
  • C:\Users\Admin\AppData\Local\Temp\test.exe
    "C:\Users\Admin\AppData\Local\Temp\test.exe"
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    PID:2624
  • C:\Users\Admin\AppData\Local\Temp\test.exe
    "C:\Users\Admin\AppData\Local\Temp\test.exe"
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    PID:580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\test.exe

    Filesize

    17KB

    MD5

    6163c1f1f0592371f237aa4c8beea275

    SHA1

    f48fb88fc63721e587693a2c25580ef2f9f94bc2

    SHA256

    5f9ed063bdf77fb7eb20387fa715fd2ff135f58fdf81c29a1d132f9110da78a7

    SHA512

    43f408045fa615befa2a0ec0ae5d4d80755994a43403e790d71e0cacda871c6459450e324aa71ef437ab62c4b34cf13abf298ef911eb7874b2a89d5d95839a6d

  • memory/580-32-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/580-26-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1792-31-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1792-37-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1792-23-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1792-36-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2624-6-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2624-13-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2728-12-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2728-21-0x0000000000220000-0x000000000022E000-memory.dmp

    Filesize

    56KB

  • memory/2728-22-0x0000000000220000-0x000000000022E000-memory.dmp

    Filesize

    56KB

  • memory/2728-4-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB