Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25/07/2024, 22:49

General

  • Target

    7190429ebed522f075d681fe954f31a1_JaffaCakes118.exe

  • Size

    67KB

  • MD5

    7190429ebed522f075d681fe954f31a1

  • SHA1

    42395773fe5e2be1cfc23e2845698408534729ed

  • SHA256

    02e9e36ada2ab7558dee5fdca7032e921b8a5fdc560b4517f5b84a47d9e28b30

  • SHA512

    ae1ca3613f4a3a0e3eb6c3d69f05da4f941bfd1c63899946bca124159cd806d6607a674500b18e1ea9a98feea61ff543f1ae494fe11defc85b7a597ad397e477

  • SSDEEP

    1536:ujNVWVukRGXdOlZ9FxNMW0ooKqpPyUNyOxd9F27LtdsLqHfEq1+CttZ:aDWVukRGXdMZ9FxNMW0ooKqpP7NyQdj0

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7190429ebed522f075d681fe954f31a1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7190429ebed522f075d681fe954f31a1_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:2660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\x1c110381.dll

    Filesize

    1.1MB

    MD5

    2ee1e467d73642afddb03019f58c252b

    SHA1

    ea1f3b03f46db029a955190692cecbc571e1d46c

    SHA256

    5a7d5dafe22082b3ed035d640578ed7b5005edfe80e5c911774ec77a2caff1b3

    SHA512

    3482715d7c9adbfe61f7834120d1a8fce47ae5d70add285ddcfe8802a5d4a95ae00ae82079b9b9639c5d4fa5126ecfc61e1b09a141c0fea86926e26fc22f9082

  • memory/2660-10-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2660-20-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB