Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    27/07/2024, 05:55

General

  • Target

    772cac15ce601e0da72e2a46b75f5c30_JaffaCakes118.exe

  • Size

    14KB

  • MD5

    772cac15ce601e0da72e2a46b75f5c30

  • SHA1

    ec5b3006ef013b618643bb93eab6942d3c140a1e

  • SHA256

    d93696fa7d758f55c7f8b9c283ec2dcaeb5c572e932287e43cd8a12b98ebefef

  • SHA512

    572109b1ca9770bff5777ad0380d1edfbbf53bec032015d270009479f8ed5ac8399cf88525e497f561391b206f8a7def411a2f340cfde2b23dbeacded3ae59ac

  • SSDEEP

    384:3ghZQWvPfJvw3qXs/JsDCmeTWkz/khvb56Cqq:iQePa3p/KCTFz/khv9V

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in System32 directory 9 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 55 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\System32\spoolsv.exe
    C:\Windows\System32\spoolsv.exe
    1⤵
      PID:108
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1252
        • C:\Users\Admin\AppData\Local\Temp\772cac15ce601e0da72e2a46b75f5c30_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\772cac15ce601e0da72e2a46b75f5c30_JaffaCakes118.exe"
          2⤵
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1948
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\772cac15ce601e0da72e2a46b75f5c30_JaffaCakes118.exe"
            3⤵
            • Deletes itself
            • System Location Discovery: System Language Discovery
            PID:1220

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\bndfxdh.dll

        Filesize

        26KB

        MD5

        76c247520224a7da51aed20dc4a833d8

        SHA1

        5e651f100f11a6b7a6683e723c92661f851dbeac

        SHA256

        4cdfc11ca779a9c9cf2ef3b9247242a9bee99f3d1ce111371d78bd5eb025a2de

        SHA512

        f7a970b31a6eb5186116907a6bc65bb22fe4a964221a9beaa04b87e77179590c4e62e189c955c9bb497eebf15b6dc9599bb79bb2d6d00213a0f3535d57e2bdcd

      • memory/1252-11-0x0000000002AF0000-0x0000000002AF1000-memory.dmp

        Filesize

        4KB

      • memory/1948-17-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB