Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    10/08/2024, 20:20

General

  • Target

    8787ab0122b63692d45c711c62a9ae5b_JaffaCakes118.exe

  • Size

    415KB

  • MD5

    8787ab0122b63692d45c711c62a9ae5b

  • SHA1

    08775e96e366e268baef80c5f24da6f3ca2b657e

  • SHA256

    858c1a15ec73430b4d1dc2f3c3fa1365ba935c4d2d03718d290f71847e352935

  • SHA512

    56f375b0ef196327a9c75714ab8435a5dd49d9bec8ff7073ba487bfacb407152ace3910b6107bba5d016fb7d89615c9ef161d3b074504bc28ffa3fdcee859592

  • SSDEEP

    6144:qE5WuXs2oRlewgvbhHm+UQVgz2kSnzcuxuCQWHX9VPF15FfbXuZow1C7uDZ1w+:jqZE9G+UQVgz2kSouxuRgXFdSowb1

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8787ab0122b63692d45c711c62a9ae5b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8787ab0122b63692d45c711c62a9ae5b_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Users\Admin\AppData\Local\Temp\svchosty.exe
      "C:\Users\Admin\AppData\Local\Temp\svchosty.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2352
      • C:\Users\Admin\AppData\Local\Temp\svchosty.exe
        C:\Users\Admin\AppData\Local\Temp\svchosty.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1496
        • C:\Users\Admin\AppData\Local\Temp\svchosty.exe
          C:\Users\Admin\AppData\Local\Temp\svchosty.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2716
          • C:\Users\Admin\AppData\Local\Temp\svchosty.exe
            C:\Users\Admin\AppData\Local\Temp\svchosty.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2828
            • C:\Users\Admin\AppData\Local\Temp\svchosty.exe
              C:\Users\Admin\AppData\Local\Temp\svchosty.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2796
              • C:\Users\Admin\AppData\Local\Temp\svchosty.exe
                C:\Users\Admin\AppData\Local\Temp\svchosty.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2596
                • C:\Users\Admin\AppData\Local\Temp\svchosty.exe
                  C:\Users\Admin\AppData\Local\Temp\svchosty.exe
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Modifies Internet Explorer settings
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:2816
                  • C:\Users\Admin\AppData\Local\Temp\svchosty.exe
                    C:\Users\Admin\AppData\Local\Temp\svchosty.exe
                    9⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    • Modifies Internet Explorer settings
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:2820
                    • C:\Users\Admin\AppData\Local\Temp\svchosty.exe
                      C:\Users\Admin\AppData\Local\Temp\svchosty.exe
                      10⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • System Location Discovery: System Language Discovery
                      • Modifies Internet Explorer settings
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      PID:2840
                      • C:\Users\Admin\AppData\Local\Temp\svchosty.exe
                        C:\Users\Admin\AppData\Local\Temp\svchosty.exe
                        11⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:2924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SPRIFH8L\js3[1].js

    Filesize

    1KB

    MD5

    a66b149a7ebc798955373415d683f32a

    SHA1

    15ceaba8cfae8368600620ae97aa26ae7331d626

    SHA256

    036c94653e84e6078c087abeb3ac8804491d27b27938839ae3df42b31e2238d9

    SHA512

    286add411911651ed9217ab94b286d4e3fb546f4bf39c451eff86df0b6daab412d2fd97e0e34c4b71322e862eddf8bc1efdb9d7e1e3c53c15bb420f609966443

  • \Users\Admin\AppData\Local\Temp\svchosty.exe

    Filesize

    295KB

    MD5

    83ae2790b4528531046b9903361af5c6

    SHA1

    ff01b966dfa8d41fb18fd1af36e5fd92b5d44838

    SHA256

    57eb9423f455c973371def560c38bd6fe3c936680c408181574ba452c989febf

    SHA512

    8c665f58596ebcb7821976ca65b20b98bf435ee63ad3424804b3ab764b90ae5c82a5307fb34f7329de0f567155c37d919c79af545b4480c48428bdd81e25132a

  • memory/1496-58-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/1496-29-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/1496-95-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/1496-33-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/1496-30-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/1496-116-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2352-21-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2352-26-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2352-23-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2352-22-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2352-20-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2352-115-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2352-57-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2352-19-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2352-94-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2596-120-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2596-99-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2596-62-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2716-96-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2716-59-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2716-117-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2796-119-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2796-61-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2796-98-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2816-121-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2816-100-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2816-63-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2820-122-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2820-64-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2820-101-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2828-118-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2828-97-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2828-60-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2840-102-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2840-65-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2840-123-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2924-56-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/3056-3-0x0000000000400000-0x000000000046C000-memory.dmp

    Filesize

    432KB

  • memory/3056-2-0x0000000000400000-0x000000000046C000-memory.dmp

    Filesize

    432KB

  • memory/3056-0-0x0000000000457000-0x0000000000469000-memory.dmp

    Filesize

    72KB