Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    10/08/2024, 11:56 UTC

General

  • Target

    85f60708ffbbec97aa71eebb00dcd0e2_JaffaCakes118.exe

  • Size

    321KB

  • MD5

    85f60708ffbbec97aa71eebb00dcd0e2

  • SHA1

    b34671c1e34184a31b734acb61b6131736208bb5

  • SHA256

    95d8bbaf14c46100684f502055399d5ed5d4fc34986f1660386d68fe5001e0cc

  • SHA512

    920b5e8cdc774cd48585644026135b25030b299899e3ac4930617446c513d2b28ada435002b76a9184faa935bf4a41290c3539f67640b14f2b3faf32ee12a739

  • SSDEEP

    6144:iwTTu7g4DQC6ziRo0sYXkADm5TsCQIaNEN4xxgB3ixuqFsE6aMhZDw:nopF6K1dzUIIaNniB3nq+nah

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1320
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1372
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1428
          • C:\Users\Admin\AppData\Local\Temp\85f60708ffbbec97aa71eebb00dcd0e2_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\85f60708ffbbec97aa71eebb00dcd0e2_JaffaCakes118.exe"
            2⤵
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of UnmapMainImage
            • Suspicious use of WriteProcessMemory
            PID:1344
            • C:\Users\Admin\AppData\Roaming\Ocot\foofy.exe
              "C:\Users\Admin\AppData\Roaming\Ocot\foofy.exe"
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of UnmapMainImage
              • Suspicious use of WriteProcessMemory
              PID:1712
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp0efabb88.bat"
              3⤵
              • Deletes itself
              • System Location Discovery: System Language Discovery
              PID:2960
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:1500

          Network

            No results found
          No results found
          • 95.156.25.106:20663
            foofy.exe
            218 B
            1
          • 190.30.106.158:23269
            foofy.exe
            236 B
            1
          • 99.177.65.23:27905
            foofy.exe
            140 B
            1
          • 94.68.141.75:12140
            foofy.exe
            266 B
            1
          • 94.70.111.73:26496
            foofy.exe
            270 B
            1
          • 77.38.46.117:15823
            foofy.exe
            281 B
            1
          • 111.250.55.207:23616
            foofy.exe
            151 B
            1
          • 69.208.93.133:28885
            foofy.exe
            179 B
            1
          • 89.123.11.72:28952
            foofy.exe
            263 B
            1

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\tmp0efabb88.bat

            Filesize

            271B

            MD5

            a3f8a95d0f8c2a60ba8bad074f64c6e2

            SHA1

            cefaddd0ac1b8a9d36ef158803c83ef666adb7ec

            SHA256

            36eea204e19a47a797a6e0be5f59e77757717aca5c44a549d5a702aa4f563126

            SHA512

            681543f815420665b79f44aa91d2aead36b1a11dff06c51afe3b75d7c6dfb4c8fad1e684000c3d4a095c82effb40b5ee5be5330c488ded415aa76a6394c49e45

          • C:\Users\Admin\AppData\Roaming\Etypuj\aqev.das

            Filesize

            380B

            MD5

            c2129c6c7d7eaca8c363af5db0911ba7

            SHA1

            6142fc6f35cb3152bd1893fad323709ceee0712c

            SHA256

            7f654dc16bc585fe69e12b58d203bf3c4597f4f57ab0664ca234d93e72e67ec4

            SHA512

            18cae9ade735a31b7fdbbc42f6f2283df499ef10f3dfe18b44c30084cdf4e8e9893ca6d86b7cd8870a76a0bd15cbe8b0de31fd6ad48f0384f8520790f9c8e279

          • C:\Users\Admin\AppData\Roaming\Ocot\foofy.exe

            Filesize

            321KB

            MD5

            6619c80867ef4a96f5c7f166393c5399

            SHA1

            777ccdf6ba1bf7cfeaaf12c75bce89aea397ebfc

            SHA256

            9dba324f02ec311b904b88dba1f8049f3b25358f02492c0918b7aa8fb1c1bc00

            SHA512

            2e04143b044c4f495b917896bc61edbf60d253ddad1aba61032fdf71c9a90f6e7e77f0149ed1ce1e6639f3ae5b979b4152450f8c85e972fe6e5f7cadc1abb6a8

          • memory/1320-19-0x0000000002300000-0x0000000002341000-memory.dmp

            Filesize

            260KB

          • memory/1320-27-0x0000000002300000-0x0000000002341000-memory.dmp

            Filesize

            260KB

          • memory/1320-21-0x0000000002300000-0x0000000002341000-memory.dmp

            Filesize

            260KB

          • memory/1320-23-0x0000000002300000-0x0000000002341000-memory.dmp

            Filesize

            260KB

          • memory/1320-25-0x0000000002300000-0x0000000002341000-memory.dmp

            Filesize

            260KB

          • memory/1344-53-0x0000000001CF0000-0x0000000001D31000-memory.dmp

            Filesize

            260KB

          • memory/1344-0-0x0000000000340000-0x0000000000381000-memory.dmp

            Filesize

            260KB

          • memory/1344-54-0x0000000001CF0000-0x0000000001D31000-memory.dmp

            Filesize

            260KB

          • memory/1344-81-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/1344-79-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/1344-77-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/1344-76-0x0000000077980000-0x0000000077981000-memory.dmp

            Filesize

            4KB

          • memory/1344-75-0x0000000001CF0000-0x0000000001D31000-memory.dmp

            Filesize

            260KB

          • memory/1344-73-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/1344-71-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/1344-69-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/1344-67-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/1344-65-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/1344-63-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/1344-61-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/1344-59-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/1344-57-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/1344-55-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/1344-9-0x0000000000400000-0x0000000000441000-memory.dmp

            Filesize

            260KB

          • memory/1344-52-0x0000000001CF0000-0x0000000001D31000-memory.dmp

            Filesize

            260KB

          • memory/1344-50-0x0000000001CF0000-0x0000000001D31000-memory.dmp

            Filesize

            260KB

          • memory/1344-2-0x0000000000400000-0x0000000000441000-memory.dmp

            Filesize

            260KB

          • memory/1344-162-0x0000000000400000-0x0000000000441000-memory.dmp

            Filesize

            260KB

          • memory/1344-163-0x0000000000390000-0x00000000003E3000-memory.dmp

            Filesize

            332KB

          • memory/1344-164-0x0000000001CF0000-0x0000000001D31000-memory.dmp

            Filesize

            260KB

          • memory/1344-1-0x0000000000390000-0x00000000003E3000-memory.dmp

            Filesize

            332KB

          • memory/1344-138-0x0000000000450000-0x0000000000451000-memory.dmp

            Filesize

            4KB

          • memory/1344-4-0x0000000000400000-0x0000000000441000-memory.dmp

            Filesize

            260KB

          • memory/1344-3-0x0000000000400000-0x0000000000441000-memory.dmp

            Filesize

            260KB

          • memory/1344-51-0x0000000001CF0000-0x0000000001D31000-memory.dmp

            Filesize

            260KB

          • memory/1372-31-0x0000000002180000-0x00000000021C1000-memory.dmp

            Filesize

            260KB

          • memory/1372-37-0x0000000002180000-0x00000000021C1000-memory.dmp

            Filesize

            260KB

          • memory/1372-35-0x0000000002180000-0x00000000021C1000-memory.dmp

            Filesize

            260KB

          • memory/1372-33-0x0000000002180000-0x00000000021C1000-memory.dmp

            Filesize

            260KB

          • memory/1428-41-0x0000000002920000-0x0000000002961000-memory.dmp

            Filesize

            260KB

          • memory/1428-40-0x0000000002920000-0x0000000002961000-memory.dmp

            Filesize

            260KB

          • memory/1428-43-0x0000000002920000-0x0000000002961000-memory.dmp

            Filesize

            260KB

          • memory/1428-42-0x0000000002920000-0x0000000002961000-memory.dmp

            Filesize

            260KB

          • memory/1500-47-0x0000000001DA0000-0x0000000001DE1000-memory.dmp

            Filesize

            260KB

          • memory/1500-45-0x0000000001DA0000-0x0000000001DE1000-memory.dmp

            Filesize

            260KB

          • memory/1500-46-0x0000000001DA0000-0x0000000001DE1000-memory.dmp

            Filesize

            260KB

          • memory/1500-48-0x0000000001DA0000-0x0000000001DE1000-memory.dmp

            Filesize

            260KB

          • memory/1712-15-0x0000000000270000-0x00000000002B1000-memory.dmp

            Filesize

            260KB

          • memory/1712-17-0x0000000000400000-0x0000000000441000-memory.dmp

            Filesize

            260KB

          • memory/1712-16-0x0000000000370000-0x00000000003C3000-memory.dmp

            Filesize

            332KB

          • memory/1712-283-0x0000000000400000-0x0000000000441000-memory.dmp

            Filesize

            260KB

          We care about your privacy.

          This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.