Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    105s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25/07/2024, 13:31

General

  • Target

    6fc6ae36d4b8f5994d4cd9cd26de9728_JaffaCakes118.exe

  • Size

    233KB

  • MD5

    6fc6ae36d4b8f5994d4cd9cd26de9728

  • SHA1

    58116a7f38dab1d2fb752afa598802676ba0897e

  • SHA256

    2f8136071dccbbe3188bf50419491aa08816ff2b7662bbbd5c07c325f633fa48

  • SHA512

    ce294fe3406865c627071c19b03aab7968027efe276762dfc6f917b35c49c63850ebdd4e7d78f2e5321c759711e42011b2a780d787db151856d8de4d01c9b71a

  • SSDEEP

    6144:S183YxSfwjBaU+8cNiC/8KzkjHPTDX+kp:VIYfwAU09vzk3

Malware Config

Signatures

  • Loads dropped DLL 7 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6fc6ae36d4b8f5994d4cd9cd26de9728_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6fc6ae36d4b8f5994d4cd9cd26de9728_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:760
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c move /Y "C:\Users\Admin\AppData\Local\Temp\Drivers\*.*" "C:\Users\Admin\AppData\Local\Temp\Drivers\Legacy"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2484
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del /Q "C:\Users\Admin\AppData\Local\Temp\Drivers\Legacy\ds2490winusb_*.*"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1640
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del /Q "C:\Users\Admin\AppData\Local\Temp\Drivers\Legacy\WdfCoInstaller01005.dll"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2624
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del /Q "C:\Users\Admin\AppData\Local\Temp\Drivers\Legacy\WinUSBCoInstaller.dll"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsp20EA.tmp\ioSpecial.ini

    Filesize

    513B

    MD5

    b334ab5e4d4caf2625946bf63f02814c

    SHA1

    75a01224d2a2e89e9e2177b149eaafab3058503a

    SHA256

    f2850a7dda107b9fcefc5f8707eecd080f6ab73b9f5674d6bb75a3baeba2cd78

    SHA512

    05917c201daf9e75892f63a8ad1577e958206bacf1c28f3e3a5e614fd57146de0f955535abb1955cd420d077008a8a00f16fe03429b5b1f75cacd17ea0d18f74

  • \Users\Admin\AppData\Local\Temp\nsp20EA.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    0dc0cc7a6d9db685bf05a7e5f3ea4781

    SHA1

    5d8b6268eeec9d8d904bc9d988a4b588b392213f

    SHA256

    8e287326f1cdd5ef2dcd7a72537c68cbe4299ceb1f820707c5820f3aa6d8206c

    SHA512

    814dd17ebb434f4a3356f716c783ab7f569f9ee34ce5274fa50392526925f044798f8006198ac7afe3d1c2ca83a2ca8c472ca53fec5f12bbfbbe0707abacd6b0

  • \Users\Admin\AppData\Local\Temp\nsp20EA.tmp\NSISdl.dll

    Filesize

    17KB

    MD5

    9194668e4763bb5f0573d020a1e29d54

    SHA1

    d7cd6aaba3728e40f128fa97d2c57b60d82868ca

    SHA256

    f73984bd94184b0cc9ae5023b90ef81a7f3f06480f66cbb2a015d7f115e2923b

    SHA512

    2d32747b00e231ee2df67d0e71428f0e3b4e3f265bcbed11cfbe2a88ea5ad7cac6d321ae0ab1daab13cfe25ce8d76338c16195b01ac2ab84479c20cfe8ee6d54

  • \Users\Admin\AppData\Local\Temp\nsp20EA.tmp\System.dll

    Filesize

    11KB

    MD5

    00a0194c20ee912257df53bfe258ee4a

    SHA1

    d7b4e319bc5119024690dc8230b9cc919b1b86b2

    SHA256

    dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

    SHA512

    3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667