Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    12/08/2024, 13:25

General

  • Target

    8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe

  • Size

    264KB

  • MD5

    8ee5151279f21a802c7c4a35c438559e

  • SHA1

    968c2a3637bab54cb8eaf3e5552e42f612ef5786

  • SHA256

    c4539628a4b771a1b1276de073b43d9ebf669154c7c89fdb5cc63ec6e3230047

  • SHA512

    35688680ec958269b9e764fbec21115b1533d3a99b2fc56f61da4cd132d9e5b63db9c121444d5b79e35b6973980e5809a49e451b73e18f2f2467668af25f91a0

  • SSDEEP

    6144:3/nyiyjGgZdQL4MF7w8iigvookK2vhlwfk:vyzl24MRTgb2c8

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe"
    1⤵
    • Adds policy Run key to start application
    • Boot or Logon Autostart Execution: Active Setup
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2536
    • C:\Program Files (x86)\Common Files\Win SVC 32service.exe
      "C:\Program Files (x86)\Common Files\Win SVC 32service.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2380
      • C:\Windows\SysWOW64\explorer.exe
        explorer.exe
        3⤵
          PID:2892

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Program Files (x86)\Common Files\Win SVC 32service.exe

      Filesize

      240KB

      MD5

      c7fab3f0c3c415d7b1708f0679201af4

      SHA1

      2cdb6fd004237fbf8203a0a72b6fd99305d270b4

      SHA256

      8569945915e878d2bed8690466ecd63c125b094770c9df121aa2f21f00e73ef0

      SHA512

      1cb4a99f38a95335ace8278d4ab3f7fd2a1d12920626c4a5251d4c228e8a60291fc1c59d6f635bc61b5660268723d03c760b268386ef7fd4db36b8544fc61b3a

    • memory/2892-16-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB

    • memory/2892-20-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB

    • memory/2892-27-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2892-26-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB

    • memory/2892-18-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB