Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    01/08/2024, 22:23 UTC

General

  • Target

    81f65d2b179a0811f3d70f91323e8d33_JaffaCakes118.exe

  • Size

    933KB

  • MD5

    81f65d2b179a0811f3d70f91323e8d33

  • SHA1

    452c58efa74f02a48fa933b742e2a6b5518d099c

  • SHA256

    d13d73e111ab838dd2ff845c8ee19467baeab19c0eed98c418ede729be1385bb

  • SHA512

    8b86cfb7e86c6f33e6fe8c5ce644349b8e9cfc6aa97dba12eb0d468eb057861987dfd8ed39a2199c03dd152db926a5a91299facdf836ce349e104a8ada86c6c0

  • SSDEEP

    24576:yc7i4YmiuQr6JZbt/VesAUDWIsE0ONr9kSBhEwbjkvkj:ycW4YmiP61NeC6IsEbkSBhEwEs

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 9 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\81f65d2b179a0811f3d70f91323e8d33_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\81f65d2b179a0811f3d70f91323e8d33_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2376
    • C:\ProgramData\defender.exe
      C:\ProgramData\defender.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Enumerates connected drives
      • Writes to the Master Boot Record (MBR)
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:1804

Network

  • flag-us
    DNS
    download4clean.com
    81f65d2b179a0811f3d70f91323e8d33_JaffaCakes118.exe
    Remote address:
    8.8.8.8:53
    Request
    download4clean.com
    IN A
    Response
  • flag-us
    DNS
    soft-4download.com
    defender.exe
    Remote address:
    8.8.8.8:53
    Request
    soft-4download.com
    IN A
    Response
No results found
  • 8.8.8.8:53
    download4clean.com
    dns
    81f65d2b179a0811f3d70f91323e8d33_JaffaCakes118.exe
    64 B
    137 B
    1
    1

    DNS Request

    download4clean.com

  • 8.8.8.8:53
    soft-4download.com
    dns
    defender.exe
    64 B
    137 B
    1
    1

    DNS Request

    soft-4download.com

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \ProgramData\defender.exe

    Filesize

    852KB

    MD5

    a00438249cb56dc0445e49e5603f6cf2

    SHA1

    e56e5ff5e42ba861b50682ddac6462541b4571b0

    SHA256

    52d827471d58876682e6cfde41481083eef3a6c2ba353938e4b9d5413a577cc0

    SHA512

    c3af31b15df5539428a8eb0e427ac3206bdbba8cb339ecb5ce531c4def7b94f0dc4a70614b48c6446db36f4d79c188c3d260ac2e78cb0e9611a7ee1d10af3004

  • memory/1804-29-0x0000000000400000-0x0000000000A21000-memory.dmp

    Filesize

    6.1MB

  • memory/1804-30-0x0000000000400000-0x0000000000A21000-memory.dmp

    Filesize

    6.1MB

  • memory/1804-45-0x0000000000400000-0x0000000000A21000-memory.dmp

    Filesize

    6.1MB

  • memory/1804-44-0x0000000000400000-0x0000000000A21000-memory.dmp

    Filesize

    6.1MB

  • memory/1804-43-0x0000000000400000-0x0000000000A21000-memory.dmp

    Filesize

    6.1MB

  • memory/1804-42-0x0000000000400000-0x0000000000A21000-memory.dmp

    Filesize

    6.1MB

  • memory/1804-41-0x0000000000400000-0x0000000000A21000-memory.dmp

    Filesize

    6.1MB

  • memory/1804-19-0x0000000000400000-0x0000000000A21000-memory.dmp

    Filesize

    6.1MB

  • memory/1804-20-0x0000000000400000-0x0000000000A21000-memory.dmp

    Filesize

    6.1MB

  • memory/1804-40-0x0000000000400000-0x0000000000A21000-memory.dmp

    Filesize

    6.1MB

  • memory/1804-23-0x0000000000400000-0x0000000000A21000-memory.dmp

    Filesize

    6.1MB

  • memory/1804-25-0x0000000000400000-0x0000000000A21000-memory.dmp

    Filesize

    6.1MB

  • memory/1804-26-0x0000000000400000-0x0000000000A21000-memory.dmp

    Filesize

    6.1MB

  • memory/1804-27-0x0000000000400000-0x0000000000A21000-memory.dmp

    Filesize

    6.1MB

  • memory/1804-39-0x0000000000400000-0x0000000000A21000-memory.dmp

    Filesize

    6.1MB

  • memory/1804-28-0x0000000000400000-0x0000000000A21000-memory.dmp

    Filesize

    6.1MB

  • memory/1804-32-0x0000000000400000-0x0000000000A21000-memory.dmp

    Filesize

    6.1MB

  • memory/1804-31-0x0000000000400000-0x0000000000A21000-memory.dmp

    Filesize

    6.1MB

  • memory/1804-38-0x0000000000400000-0x0000000000A21000-memory.dmp

    Filesize

    6.1MB

  • memory/1804-34-0x0000000000400000-0x0000000000A21000-memory.dmp

    Filesize

    6.1MB

  • memory/1804-35-0x0000000000400000-0x0000000000A21000-memory.dmp

    Filesize

    6.1MB

  • memory/1804-36-0x0000000000400000-0x0000000000A21000-memory.dmp

    Filesize

    6.1MB

  • memory/1804-37-0x0000000000400000-0x0000000000A21000-memory.dmp

    Filesize

    6.1MB

  • memory/2376-0-0x0000000000400000-0x00000000006DF000-memory.dmp

    Filesize

    2.9MB

  • memory/2376-2-0x0000000000400000-0x00000000006DF000-memory.dmp

    Filesize

    2.9MB

  • memory/2376-22-0x0000000000400000-0x00000000006DF000-memory.dmp

    Filesize

    2.9MB

  • memory/2376-18-0x0000000002AB0000-0x00000000030D1000-memory.dmp

    Filesize

    6.1MB

  • memory/2376-12-0x00000000003F0000-0x0000000000400000-memory.dmp

    Filesize

    64KB

  • memory/2376-1-0x00000000020F0000-0x0000000002100000-memory.dmp

    Filesize

    64KB

  • memory/2376-8-0x0000000000404000-0x0000000000405000-memory.dmp

    Filesize

    4KB

  • memory/2376-5-0x0000000077140000-0x0000000077141000-memory.dmp

    Filesize

    4KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.