Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22/07/2024, 15:07

General

  • Target

    63ab5461f5c9f1c5ca36e6cf9e9dd680_JaffaCakes118.exe

  • Size

    165KB

  • MD5

    63ab5461f5c9f1c5ca36e6cf9e9dd680

  • SHA1

    00ae86ef1c6d69b63b4432ab9fd249202c57099e

  • SHA256

    3b23ad50000234bf5c42790f27cafacdcf1eda51c4b58b055cd9150d10b918de

  • SHA512

    64087b075d1721f48388ac2c6dd349f0b2ad3071e5642dc705f16df168cefd990505ce640baeef4bc28e08ef8a49130aad31fb52941efa0584b9880290842c86

  • SSDEEP

    3072:UmIosdOXnhB5+Q5wgAlVtrS8Z8cz2XUfe3tV0RS2N0Sg7ovQ/hD+CSwvTbkRiG:U9e3hmQ58Mne2XUfvbCxoIJQcTww

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\63ab5461f5c9f1c5ca36e6cf9e9dd680_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\63ab5461f5c9f1c5ca36e6cf9e9dd680_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Users\Admin\AppData\Local\Temp\63ab5461f5c9f1c5ca36e6cf9e9dd680_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\63ab5461f5c9f1c5ca36e6cf9e9dd680_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\dwm.exe%C:\Users\Admin\AppData\Roaming
      2⤵
        PID:2376
      • C:\Users\Admin\AppData\Local\Temp\63ab5461f5c9f1c5ca36e6cf9e9dd680_JaffaCakes118.exe
        C:\Users\Admin\AppData\Local\Temp\63ab5461f5c9f1c5ca36e6cf9e9dd680_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\csrss.exe%C:\Users\Admin\AppData\Local\Temp
        2⤵
          PID:1152

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\6B06.6E3

        Filesize

        1KB

        MD5

        255a86e10d8af2143fde64538d199b71

        SHA1

        1bff7b7dfa8d41420d23d4df54c0d0adea2b3332

        SHA256

        ed07f99c54b0021b1431a1e409d78ff1391bc2bb14eb970581b2c5b55ba2e81d

        SHA512

        9f6a5316cf8284c684e6790ce8bcd3baf757063833aa52423f7b3851d76c456cef981f32dd322799a8dbd56db22263d7f4b2eddecbbde7290689c62aaa1f72be

      • C:\Users\Admin\AppData\Roaming\6B06.6E3

        Filesize

        600B

        MD5

        8cfebfb3f702f1c38216e7ad84a341cc

        SHA1

        d88c7105750c2b67143bd6e0123e5456b5285df0

        SHA256

        6396933f9c662bc01fada2e1e785f0cd68b2235f13df5f2756079ce6b6beaecf

        SHA512

        ef2cba0333a02eb7a1de0ca11f568398d60cbbb3b88a6b0cb909a5d26fd2002b134c92a470940818f58c7f2f2481d9f62d35a9b98a9e043abb351c9d9a6ddf84

      • C:\Users\Admin\AppData\Roaming\6B06.6E3

        Filesize

        996B

        MD5

        e166c7ab4ab421cadabf52537764729f

        SHA1

        46dacbb5d2713d88277c955ad7c4d4e2c1553e23

        SHA256

        fa6733fbd858d985b401b988238251fc89d55efaf508ea12a0463be6c143bd13

        SHA512

        38989e3968b3b95533d8dc57639627ef0c5568f317eb2b59321895fb9f534fb0c4b7ec1d8ddfbe39e46e43b01ef0779b865660ccd0d11ab3bd52bfc34e6ff52a

      • memory/1152-75-0x0000000000400000-0x000000000043D000-memory.dmp

        Filesize

        244KB

      • memory/1152-76-0x0000000000400000-0x000000000043D000-memory.dmp

        Filesize

        244KB

      • memory/2120-1-0x0000000000400000-0x000000000043D000-memory.dmp

        Filesize

        244KB

      • memory/2120-14-0x0000000000400000-0x000000000043D000-memory.dmp

        Filesize

        244KB

      • memory/2120-77-0x0000000000400000-0x000000000043D000-memory.dmp

        Filesize

        244KB

      • memory/2120-167-0x0000000000400000-0x000000000043D000-memory.dmp

        Filesize

        244KB

      • memory/2376-5-0x0000000000400000-0x000000000043D000-memory.dmp

        Filesize

        244KB

      • memory/2376-4-0x0000000000400000-0x000000000043D000-memory.dmp

        Filesize

        244KB

      • memory/2376-7-0x0000000000400000-0x000000000043D000-memory.dmp

        Filesize

        244KB