Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25/07/2024, 17:51

General

  • Target

    70a08d5f3cb7d39f50b04f28ff3fa7c8_JaffaCakes118.exe

  • Size

    322KB

  • MD5

    70a08d5f3cb7d39f50b04f28ff3fa7c8

  • SHA1

    23215060bf0bdf499faf664bedd15fd939d018f7

  • SHA256

    00d518bc3b6ad6b7731611fa7ccbca1423eef827e5c3ef0b9ea7a1dce30d6f1d

  • SHA512

    01702b05eebc8bb6b59ffcfd6393ba3bbf728b8e30e3a3edbdde42d5abd946314f9a65a8fff9aeac6345bed9a60d3d3c3abc4986372a5ae23ea7d03dec173d50

  • SSDEEP

    6144:5YswEpkRX4iDMBSZmjIKBIU5yi33ZI0qIMIJy2Y6ztdkblUECxwd:5SEpk14iDmKGI0IqrZIwMx2Y6J6blU5w

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\70a08d5f3cb7d39f50b04f28ff3fa7c8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\70a08d5f3cb7d39f50b04f28ff3fa7c8_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    PID:2072
  • C:\Users\Admin\AppData\Local\Temp\hxmwif.exe
    C:\Users\Admin\AppData\Local\Temp\hxmwif.exe -svc
    1⤵
    • Executes dropped EXE
    • Enumerates connected drives
    • Modifies Internet Explorer settings
    PID:2148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\hxmwif.exe

    Filesize

    322KB

    MD5

    70a08d5f3cb7d39f50b04f28ff3fa7c8

    SHA1

    23215060bf0bdf499faf664bedd15fd939d018f7

    SHA256

    00d518bc3b6ad6b7731611fa7ccbca1423eef827e5c3ef0b9ea7a1dce30d6f1d

    SHA512

    01702b05eebc8bb6b59ffcfd6393ba3bbf728b8e30e3a3edbdde42d5abd946314f9a65a8fff9aeac6345bed9a60d3d3c3abc4986372a5ae23ea7d03dec173d50

  • memory/2072-0-0x00000000001B0000-0x00000000001C2000-memory.dmp

    Filesize

    72KB

  • memory/2072-1-0x00000000001D0000-0x00000000001EA000-memory.dmp

    Filesize

    104KB

  • memory/2072-2-0x00000000001D0000-0x00000000001EA000-memory.dmp

    Filesize

    104KB

  • memory/2072-12-0x00000000001D0000-0x00000000001EA000-memory.dmp

    Filesize

    104KB

  • memory/2072-11-0x00000000001D0000-0x00000000001EA000-memory.dmp

    Filesize

    104KB

  • memory/2072-34-0x00000000001D0000-0x00000000001EA000-memory.dmp

    Filesize

    104KB

  • memory/2072-33-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB

  • memory/2148-25-0x00000000002C0000-0x00000000002DA000-memory.dmp

    Filesize

    104KB

  • memory/2148-27-0x00000000002C0000-0x00000000002DA000-memory.dmp

    Filesize

    104KB

  • memory/2148-29-0x00000000002C0000-0x00000000002DA000-memory.dmp

    Filesize

    104KB

  • memory/2148-28-0x00000000002C0000-0x00000000002DA000-memory.dmp

    Filesize

    104KB

  • memory/2148-32-0x00000000002C0000-0x00000000002DA000-memory.dmp

    Filesize

    104KB

  • memory/2148-26-0x00000000002C0000-0x00000000002DA000-memory.dmp

    Filesize

    104KB

  • memory/2148-16-0x00000000002C0000-0x00000000002DA000-memory.dmp

    Filesize

    104KB

  • memory/2148-35-0x0000000000400000-0x000000000045A000-memory.dmp

    Filesize

    360KB