Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 10:45

General

  • Target

    73b7ddabf675ca2d58a79b3edf45da32_JaffaCakes118.exe

  • Size

    178KB

  • MD5

    73b7ddabf675ca2d58a79b3edf45da32

  • SHA1

    ae6fc7ea40271f1805a9c435cd37ef93f26eb478

  • SHA256

    6ecd9e4891ee35776f4094870f5fec73e1912b9b63629268a92261674c6eba6b

  • SHA512

    2d57deb64681f1d747461968b16b5fa82a8eb81658335d039a8118329ce31ac231472124362520a822770d65f482c14beb412626756825371b3aa9e50cd726ed

  • SSDEEP

    3072:u0Gox2PD7tC6PN5k/WqGIvMEhc+5n6CdJK8GcBHNmjoH90DGzhQ:6ogPGWqGU/n6CbzGcBIMHIGl

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73b7ddabf675ca2d58a79b3edf45da32_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\73b7ddabf675ca2d58a79b3edf45da32_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Windows\Ggyzaa.exe
      C:\Windows\Ggyzaa.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      PID:1932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Ggyzaa.exe

    Filesize

    178KB

    MD5

    73b7ddabf675ca2d58a79b3edf45da32

    SHA1

    ae6fc7ea40271f1805a9c435cd37ef93f26eb478

    SHA256

    6ecd9e4891ee35776f4094870f5fec73e1912b9b63629268a92261674c6eba6b

    SHA512

    2d57deb64681f1d747461968b16b5fa82a8eb81658335d039a8118329ce31ac231472124362520a822770d65f482c14beb412626756825371b3aa9e50cd726ed

  • C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job

    Filesize

    372B

    MD5

    a98d766bb3743cd6a1e1162c8331797a

    SHA1

    9aa579ad3b9b75fc40adc918eddea49a7246c3ef

    SHA256

    10684820c206664fde9e516911ce5b521578eb756480870141aed24c8006e90e

    SHA512

    e6d412bd0d0a336f3669e765fb15c5d6af361c3396e99fbe4d4c794bfebf8094ad821c7b83460660061ac800243c0831aa6a0f76456b53f3831dc19192d4b1f4

  • memory/1932-45487-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1932-9-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1932-45485-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1932-45486-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1932-45488-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1932-45489-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1932-45490-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1932-45491-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1932-45495-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2932-8-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2932-1-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2932-45484-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2932-0-0x00000000001F0000-0x0000000000205000-memory.dmp

    Filesize

    84KB