Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22/07/2024, 10:16

General

  • Target

    62d3aec6810087be69c484dc7a6b8b10_JaffaCakes118.exe

  • Size

    2.0MB

  • MD5

    62d3aec6810087be69c484dc7a6b8b10

  • SHA1

    0ea62978f2744a66f4366b2cd2db3580ac73cd8a

  • SHA256

    d0a9479c32727ae724869a3f71c08b98652b0a8ebb67e25517befdcdbd0e081f

  • SHA512

    e4c1f3136734933d57890211e961802f8c6630cd74f45a8b8245284d9c9d0ab854df4eec26d34a2416ddbd7c38d6e35bcb00d132b85f2b4331bba2182710e094

  • SSDEEP

    49152:pnTQ395uZOKnsh3jYTKqqNNOEox3Teed3cYMkMjYWG:drkKwjYWpNvAncYMkMju

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\62d3aec6810087be69c484dc7a6b8b10_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\62d3aec6810087be69c484dc7a6b8b10_JaffaCakes118.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Checks whether UAC is enabled
    • Writes to the Master Boot Record (MBR)
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2404-0-0x0000000000400000-0x0000000000925000-memory.dmp

    Filesize

    5.1MB

  • memory/2404-1-0x0000000077080000-0x0000000077082000-memory.dmp

    Filesize

    8KB

  • memory/2404-17-0x0000000000400000-0x0000000000925000-memory.dmp

    Filesize

    5.1MB

  • memory/2404-16-0x0000000000414000-0x0000000000415000-memory.dmp

    Filesize

    4KB

  • memory/2404-15-0x0000000004880000-0x0000000004881000-memory.dmp

    Filesize

    4KB

  • memory/2404-14-0x0000000004840000-0x0000000004841000-memory.dmp

    Filesize

    4KB

  • memory/2404-13-0x0000000004760000-0x0000000004761000-memory.dmp

    Filesize

    4KB

  • memory/2404-12-0x0000000004020000-0x0000000004021000-memory.dmp

    Filesize

    4KB

  • memory/2404-11-0x0000000004770000-0x0000000004771000-memory.dmp

    Filesize

    4KB

  • memory/2404-10-0x00000000046F0000-0x00000000046F1000-memory.dmp

    Filesize

    4KB

  • memory/2404-9-0x0000000004790000-0x0000000004791000-memory.dmp

    Filesize

    4KB

  • memory/2404-8-0x00000000046E0000-0x00000000046E1000-memory.dmp

    Filesize

    4KB

  • memory/2404-7-0x00000000047D0000-0x00000000047D1000-memory.dmp

    Filesize

    4KB

  • memory/2404-6-0x0000000004780000-0x0000000004781000-memory.dmp

    Filesize

    4KB

  • memory/2404-5-0x0000000004060000-0x0000000004061000-memory.dmp

    Filesize

    4KB

  • memory/2404-4-0x0000000004080000-0x0000000004082000-memory.dmp

    Filesize

    8KB

  • memory/2404-3-0x0000000004070000-0x0000000004071000-memory.dmp

    Filesize

    4KB

  • memory/2404-2-0x00000000046C0000-0x00000000046C2000-memory.dmp

    Filesize

    8KB

  • memory/2404-18-0x0000000000400000-0x0000000000925000-memory.dmp

    Filesize

    5.1MB

  • memory/2404-19-0x0000000000400000-0x0000000000925000-memory.dmp

    Filesize

    5.1MB

  • memory/2404-21-0x0000000000400000-0x0000000000925000-memory.dmp

    Filesize

    5.1MB

  • memory/2404-20-0x0000000000400000-0x0000000000925000-memory.dmp

    Filesize

    5.1MB