Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    10/08/2024, 02:01

General

  • Target

    8466881663f5200ad94231c1b3eed871_JaffaCakes118.exe

  • Size

    28KB

  • MD5

    8466881663f5200ad94231c1b3eed871

  • SHA1

    fd7c5a95d07417aa0ff5495a1dbb50f13318452d

  • SHA256

    601bf1fa21fa03e4f0ea9af3519c6e46b38a5315cbcc1724f630863e8b854f6f

  • SHA512

    856ff64e9bfd3ec5b02f19423062729be850fa1d19f2ee847ef31771c97b40575d9430ac22dff9ea2ead7f61d3241466c897904b719a618cef8035218ef841b0

  • SSDEEP

    384:1vxBbK26lj5Id8SpHx9jLhsznnVxA1WmP5w7GGCJlqqwMyNAavfp:Dv8IRRdsxq1DjJcqfAB

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 26 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8466881663f5200ad94231c1b3eed871_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8466881663f5200ad94231c1b3eed871_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:492

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp6EAB.tmp

    Filesize

    28KB

    MD5

    22d07526210c4e408ec1ae73eac85c3c

    SHA1

    a304b4361bd12144c7ab226dc689fb112dd0a523

    SHA256

    ef5c37f9d018eaa09385dc01f228d9c96606fad30d1ca4147b6166df23f92321

    SHA512

    00e57f8e239cdeb2377b76278546e8f81b910b143969eb6efa1b69a0aa121eff6dabb7383508453aae5e8271a40b2133969bba56ba54a258fddcf5aa9ed5afc3

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    1KB

    MD5

    d0e55268389c3f2d27dbf59d436c8fc2

    SHA1

    211eaebf95482f7c779ee2b6f738e35ac84177b0

    SHA256

    55124f5e1059cdcf3c56faea45e4b9c6f6dd0c9f5d3725e8b44162298cb12849

    SHA512

    782950dfcf64460d5e819f9482ebb804fc5121d50fc03d650d8c11dd06deddc9d63df64654f48c7169edb86ef2339cd9f46e81e3c7d3425f5fc36362f6013592

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/492-23-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/492-30-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/492-82-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/492-18-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/492-89-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/492-77-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/492-73-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/492-84-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/492-32-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/492-37-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/492-42-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/492-44-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/492-71-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/492-49-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/492-11-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1688-48-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1688-70-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1688-2-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1688-72-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1688-25-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB

  • memory/1688-76-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1688-24-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB

  • memory/1688-81-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1688-17-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1688-83-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1688-9-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB

  • memory/1688-88-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/1688-10-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB