Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22/07/2024, 14:32

General

  • Target

    638d7b28db4faf93feade63c448defd6_JaffaCakes118.exe

  • Size

    264KB

  • MD5

    638d7b28db4faf93feade63c448defd6

  • SHA1

    55df792d0e211a16f72adec6c6132846f6d4d9ea

  • SHA256

    5acf40c28e3a379bb1175d587785e3f46d8c5e334428c4f19d5c09093b7b0bb2

  • SHA512

    e5fd966bc4af20f0ec1b15696df5f53cc1ba9a5cd513ce01ab0a0f26403abf81f3d0e9f0b1a8ac21773f9d51ce276259ec93e0c9c7f2932deb0d48f527dcfa3a

  • SSDEEP

    6144:hmBAzkkQkxLQh51HIs+7lo9JUfWO7yRUmh23C:qAzkkQ4QW9lgUfvuRUmA

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 13 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 42 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 36 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 27 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\638d7b28db4faf93feade63c448defd6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\638d7b28db4faf93feade63c448defd6_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2420
  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:2472
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    PID:2868
  • C:\Windows\system32\dllhost.exe
    C:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}
    1⤵
    • Drops file in Windows directory
    PID:2216
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2712
  • C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
    1⤵
    • Executes dropped EXE
    • Windows security modification
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ose.vir

    Filesize

    284KB

    MD5

    7ffeb68eb174c10b3f48898548a2f2a0

    SHA1

    6a02857cd6c936fe1566969450996e8d2d6af707

    SHA256

    9f120500f86cd50bcfefd660dd2ddd192b7ec6909ec6d910978ed0b7c2d53269

    SHA512

    3a7ee1ab3addb35746241579ab3713520900c8cc3d852532ae26c252b0821351158a0f2b97c8b37197351935c1e284b627912f675fffd0c8c8e5eee30a41627c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\setup.exe

    Filesize

    1.2MB

    MD5

    81c19480abd4ea36763852ec1ee742d4

    SHA1

    5b9469f27c40c96d6a74de59ed6c4eafcaa1a08a

    SHA256

    bdfe435ad5d00e55ea05332e2de62bd2aafc8bab6ec8925dbc0036226db700cd

    SHA512

    3b71d6dc9d0f8c5d652b75db80078fee37c5e6b71cf1ad744b1b38c4ed553681ad50e6e6aaee8570cfef7c0b831e85b5156b44cb6c3f6d0a79c2ed1a7d1cbe58

  • C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE

    Filesize

    284KB

    MD5

    ccbe84c9e68c6f9269a9e8f344b2b268

    SHA1

    5ec6de35046543e061a7813d45679c9dcb7ffa31

    SHA256

    14760932dc9736a5ee0a461ed4785e9b26a16b1f4192464bf16f09cca49f86b1

    SHA512

    0468e84c3f6000a07a04b6f63adb744170edd610b716210ca8f2a032c5545ec6b286d849e9536e81374f7d3fb8d6e76c731de866c87df584c7d8d11149a70ff0

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

    Filesize

    203KB

    MD5

    b1d2ed747521f46003ce81db6010899b

    SHA1

    46953f90aaa0db3fa544b0b8360be7f9b1e42209

    SHA256

    034f93fa79b824d07e625cd7274ddcfa0e0394c4acf7fe2e39857d3209a78301

    SHA512

    c14f80124c9a4db90dab9aab76b5fea4c0f75e8fdbc1c26615942dac2ddd1d39f881e2cb6cceb1b5c1fd651d8c12c265dce95071ca4f492a88ecc4b177908549

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log

    Filesize

    1003KB

    MD5

    32d9bf7b4144a0ba91fae5af0d27e40d

    SHA1

    907a17061ed4349c3ec92dea39dcf96fce47c481

    SHA256

    9f01ce560ed9b72d8ec5a3405dc7c9516b4644d8066464398ba848a7251b536a

    SHA512

    e4281310da94902b5b0d2dcf2e09e86ed61672c032415f773fca247c449fe3b47a674078ca578def0f6b8ade9ae728f764c8b142316e35df95067743ab45683a

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    234KB

    MD5

    f48fccad6b03b71c69f9ee32b07cf7ca

    SHA1

    e70e67c97d0546cf0e5a8a8a6b04c3ef28ad88ce

    SHA256

    e89f60820959675edfcc0fad0853269014d34ad6f0e876bb9dc4f0d30a47c359

    SHA512

    fd2e75e2845ef156853528512503c5fa8366fd8856dbc68fe82724236a8695b371ab1509b6031a3c3f65c068bda813fe3002ee6c4a0c4924491357fcbd29ff02

  • \??\c:\program files (x86)\microsoft office\office14\groove.exe

    Filesize

    29.7MB

    MD5

    23e9f1c36f2133861d7de68c272afe73

    SHA1

    376280c702805b9f90c118fe1fd5fdc8445dc925

    SHA256

    d9121faeaa0d7ba3cb0a3b6db8ad5318d6b44ce2124231938b8ab5f9bb2d4916

    SHA512

    6bf3f4d7ae8dfb64f4d9b52eeec95bce81baf172e33a8ca31d88a25bc8aa263dade973b0ba2b9fb3ba20b581bc5a15fdee7d21fc86691f89bc8a08ac23acf723

  • \??\c:\windows\SysWOW64\searchindexer.exe

    Filesize

    562KB

    MD5

    4d9efe5ed9b01fb4227c824872ba7ba1

    SHA1

    049f1f1d48d58e262974d7286ae5d6fc0d5dc267

    SHA256

    7ebbfda1ca3f57a1f1ef0e426a19399397a5fceded3cc0d9bab6687e168918bf

    SHA512

    58bddf7283d291ea81f42cc3774165ec572410e19429508b03a1d9a86d6d130b05de0c8d8a5ddee7aecc74319edd6ce75a8dcf3400eab6c98aec2dd1dfe2c5a9

  • \??\c:\windows\SysWOW64\svchost.exe

    Filesize

    164KB

    MD5

    8d91d3624cab9b598965d560836814ac

    SHA1

    fbf9ce22bf53e51e5f27232cab81b3fb76237b6e

    SHA256

    09096d1e21a81b4f5699287ecbd575d559fa4e37ad93c0802da6c0f7ead5bcdd

    SHA512

    249dde889c63c10b9ca141146810e1ad02d9c4176b9b5c124c953cc5961118f4ad092e6751639a47ebb714ced50d85ca9636649e55172bb91e4217d74daca4c9

  • memory/2420-0-0x0000000001000000-0x000000000109A000-memory.dmp

    Filesize

    616KB

  • memory/2472-24-0x0000000010000000-0x0000000010070000-memory.dmp

    Filesize

    448KB

  • memory/2472-11-0x0000000010000000-0x0000000010070000-memory.dmp

    Filesize

    448KB

  • memory/2656-42-0x000000002E000000-0x000000002E086000-memory.dmp

    Filesize

    536KB

  • memory/2868-22-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB