Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    12/08/2024, 04:03

General

  • Target

    8d3e0e19c791f2ff44ac2f70fb1ca6d7_JaffaCakes118.exe

  • Size

    597KB

  • MD5

    8d3e0e19c791f2ff44ac2f70fb1ca6d7

  • SHA1

    148ac486bf1429edb7a18aad370f381b9e492830

  • SHA256

    231acfa8dce1762e738b15a0ffd0b815d08529b8e9cec50ab74c594a838d0faa

  • SHA512

    ee6bf2667ffeeaa021a6b1bdbb5276a794df2e64ff91e2cd7869064c100c097482d6617ee69ac17ece29e3d7083c26a9e048596046e4c9a8f786d81ac5036c68

  • SSDEEP

    12288:on0yj3congXXc1sZmOijVZ71kEGuy6/+/+C+IMFml/v0rOxT+Lal:onvzcongXXc1+mOs6Ruy6/+WbrOu6

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d3e0e19c791f2ff44ac2f70fb1ca6d7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8d3e0e19c791f2ff44ac2f70fb1ca6d7_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:600
    • C:\Users\Admin\AppData\Local\Temp\MSN.exe
      "C:\Users\Admin\AppData\Local\Temp\MSN.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3012
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 36
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:484

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\MSN.exe

    Filesize

    9KB

    MD5

    9cd907f6b88fd2717b6422b73a0551af

    SHA1

    eca573bcbcef1c8320fb45870d7a8233bae7d594

    SHA256

    51737d4ded7dc2a208a177e55474cf50d262f9ee9631bfcb87538ec879fd23ec

    SHA512

    3f30e182a6a275843a72ba943348a9fb739374e7de3361efc63b65d9f3d2b4898168fadb67a7b1e6f3fa4975d6c782d3f27c31f4f4b2d225868fbf7442439161

  • memory/600-1-0x0000000000401000-0x0000000000402000-memory.dmp

    Filesize

    4KB

  • memory/600-13-0x0000000000400000-0x0000000000495000-memory.dmp

    Filesize

    596KB

  • memory/3012-17-0x0000000000400000-0x0000000000402400-memory.dmp

    Filesize

    9KB