Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 03:02

General

  • Target

    725aaf787e45af3724762bafed23bd6d_JaffaCakes118.exe

  • Size

    5.1MB

  • MD5

    725aaf787e45af3724762bafed23bd6d

  • SHA1

    0ba4558a6bc61a9ae4f29ad4cc17e6216e05f244

  • SHA256

    de8c8b9da365ddab4c02abcadaf9ccbf3f4b84c5ff5ea8daec4ee6165a66a68f

  • SHA512

    3ab62e87a02863d45dd83c574fa14070c688a71f6c1b74cf7268f84a68833354d7e90dc42af0b9e2cbced38d9442236d5eb47ba8b33214a1606d52089fb0c580

  • SSDEEP

    98304:M/bNJcxgxcZIfFsMn/d+mpdlGndCQEJ/hJ6ZYWo5egHVCcOI8emUhZHBEGY:M/bLQ8B1NLkEJhbvUcOwmUh9BE/

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\725aaf787e45af3724762bafed23bd6d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\725aaf787e45af3724762bafed23bd6d_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Users\Admin\AppData\Local\Temp\nsjC4E6.tmp\InstGameInfoHelper.exe
      "C:\Users\Admin\AppData\Local\Temp\nsjC4E6.tmp\InstGameInfoHelper.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      PID:2552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    970d27eb9c28b6dbb070f4ac7e7c42d0

    SHA1

    59f564ecc09d4c48d68d6648e296c493a0bb0da3

    SHA256

    820240f6f8b2b9ee1e18af24ab5c23e2eadf3b86ff51ce9310ca3185dc67f620

    SHA512

    99dcb57b62c33f1587a08e38189ec3d1104980a5798e0c56fda2d46ed6d12e82473edb411c089955e0eec498f19e657c92d82eae166dd2742781a5eec1e54b3d

  • C:\Users\Admin\AppData\Local\Temp\CabD413.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarD445.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\nsjC4E6.tmp\ftdownload.dat

    Filesize

    512B

    MD5

    82503470ddb0fae91d68482e29282679

    SHA1

    38cccf9c11f11d1cf77567346319239608159803

    SHA256

    f9d5d206050c98ff8493d21a32caf1234799eb0606d3feee67507ec1be03b0d8

    SHA512

    c0c3887e8cd87a84cb26dd8e684a45ab2792777f50789432a1fc2167bca5a0bac5cd2f60f84b61f9f6ccd6607ea76d7d498777e14d443c78bbbb8a05949fd5cd

  • C:\Users\Admin\AppData\Local\Temp\nsjC4E6.tmp\gametitle.txt

    Filesize

    26B

    MD5

    4f8f59c5d87bef2b8d82dc0f4ed6e8a3

    SHA1

    c9210e085e007e5efcd6198c44a0c30c4e1719e3

    SHA256

    5434919091d3c1db0c86789afbfc64297b59b9053c862240bc10f7afb655b03b

    SHA512

    2fff97400675381c354fa44fff2902f89db3722faaf4dd1858a08540f7d9adeca6fe27a09cfb0a8b53989891bf34f7a3e20910f4340a4c101d7774eaa965e87e

  • C:\Users\Admin\AppData\Local\Temp\nsjC4E6.tmp\tn_feat.bmp

    Filesize

    4KB

    MD5

    032de7dc94187858eeffd18e9bb24469

    SHA1

    94e5838af273feb65fe262df010e5da4886ca8e6

    SHA256

    0cc16a7d68a25b25cfcbfb8b2da27c834c22fb6bc6617e6e03012065d3608116

    SHA512

    ccd0c6955036f19783f896d7849e6f0d5f127a991f139e29ea59b238536b4c4fa81cfd9735e4f9d670035d4180b089411897a6bacccf1a53c479f48c643d2385

  • \Users\Admin\AppData\Local\Temp\nsjC4E6.tmp\InstGameInfoHelper.exe

    Filesize

    99KB

    MD5

    3d3d2bf9c42dbdf97247775c00f22190

    SHA1

    7a046170aaeb5e1a29d8c8cd7c32225f49237aa1

    SHA256

    59f09ba2c79a209008e76d0478bb691a9fdb2180d84318d9fc73b10401aa853a

    SHA512

    6e66c4ff467e286cd5dc1d4ccd412fec32cfd01514db6c339fd275eaab5f3b549e223e9330bc61ff19048df70b81b66dfcc78ac351aa2c5ff45cf8d197140466

  • \Users\Admin\AppData\Local\Temp\nsjC4E6.tmp\System.dll

    Filesize

    11KB

    MD5

    00a0194c20ee912257df53bfe258ee4a

    SHA1

    d7b4e319bc5119024690dc8230b9cc919b1b86b2

    SHA256

    dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

    SHA512

    3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

  • \Users\Admin\AppData\Local\Temp\nsjC4E6.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    e54eb27fb5048964e8d1ec7a1f72334b

    SHA1

    2b76d7aedafd724de96532b00fbc6c7c370e4609

    SHA256

    ff00f5f7b8d6ca6a79aebd08f9625a5579affcd09f3a25fdf728a7942527a824

    SHA512

    c9ddd19484a6218f926295a88f8776aff6c0a98565714290485f9b3b53e7b673724946defed0207064d6ab0b1baa7cb3477952f61dbe22947238d3f5802fa4f4