Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    17s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    27/07/2024, 07:12

General

  • Target

    775336da181d11c262497cb1d171f144_JaffaCakes118.exe

  • Size

    393KB

  • MD5

    775336da181d11c262497cb1d171f144

  • SHA1

    daaff16fb08aa47b3c8fc7c3797e0c7da49cd20a

  • SHA256

    46c6e596250e0b993f0119e2d619cb4163bc543afc135c956cc196f3c6af0302

  • SHA512

    d146b1c711fbedd7d72d9ab1fe91a261adc77a3ff74e30ff060843b76ba6efbcc855308c9f99b2e853a9b4f80ee19b465cb2983671edbc0c73af7705ab41650b

  • SSDEEP

    12288:Uutrzh9xOXkYVfkeAlWRURCDSQBOM5TiRz:Uutr5OUYVce2WRURQmQiRz

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\775336da181d11c262497cb1d171f144_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\775336da181d11c262497cb1d171f144_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2916
    • C:\Windows\SysWOW64\mshta.exe
      "C:\Windows\System32\mshta.exe" "javascript:new ActiveXObject('WScript.Shell').Run('Devourer_3.0_15025121807012.bat -Open',0);window.close()"
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:2668
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\Devourer_3.0_15025121807012.bat" -Open"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2684
    • C:\Windows\SysWOW64\mshta.exe
      "C:\Windows\System32\mshta.exe" "javascript:new ActiveXObject('WScript.Shell').Run('Devourer_3.0_15025121807012.bat',0);window.close()"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2828
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\Devourer_3.0_15025121807012.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2520

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Devourer_3.0_15025121807012.bat

    Filesize

    286KB

    MD5

    38f8fccb9008928261f0545e2079c7fb

    SHA1

    f2ee896cd0a854451269b05a383f46806cba41b7

    SHA256

    f25f2850ae1f03a52a8dbf21ef2f3ed4470d418560e8272b2fefd42fcd74e1af

    SHA512

    991ff7cde6db9cea6e020a00f08f56f45901af8da315ec94ad06f9483af82ff164b9d625ef13235e2b6cbddb1a055739c1b5ce824f775879bb7953216a30dd2c