Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    27/07/2024, 09:42

General

  • Target

    77b76bdfceebc9e121909a05110a9a67_JaffaCakes118.exe

  • Size

    23KB

  • MD5

    77b76bdfceebc9e121909a05110a9a67

  • SHA1

    49679fc9e65d328648194a66a14044bf64af01bc

  • SHA256

    87cf2004c02c4ecff63ce17d16ddf887e38cd4a8256b3847c078f89a5204efae

  • SHA512

    c0940efc55b2440d5c9fa97180796d1becfe86d5c8dbc15a9d5bed383e046c84d2e8b264079dc706bc7aabecfc44abb7ce541d8de50d6ea0e9485a48acdff10a

  • SSDEEP

    384:Z3f7Pi4i+rK8Yn81j9cAyngJA62zbzo5etDA3+t0hNowt4uVml5e41L:ZzVr9mU5ks5s4WTe41

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\77b76bdfceebc9e121909a05110a9a67_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\77b76bdfceebc9e121909a05110a9a67_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2596
    • C:\Windows\SysWOW64\svchost.exe
      svchost.exe
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1700
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\2228227.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2228227.bat

    Filesize

    263B

    MD5

    70f118f62c72d4c5fa76d08a6acd5a72

    SHA1

    ffa3f1d875f11e59f5e58b81743dee183131eba4

    SHA256

    7e8971e19eaf19a85538fa5f2911998e68fad4a465ab66370a4096d3334f34ca

    SHA512

    0a8c66e3cc6eed3325274b57e12b91115984df5db7dd07fc57724037d851764de9f5f13bcd252be52fca46fd6b39874c5bd40e9a797fa509516010fa464b8bff

  • memory/1700-4-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/1700-5-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/1700-1-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/1700-6-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/1700-17-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2596-0-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2596-15-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB