Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    13/08/2024, 17:25

General

  • Target

    9408b6cd8ac1e4e6208e4ee07bf79736_JaffaCakes118.exe

  • Size

    277KB

  • MD5

    9408b6cd8ac1e4e6208e4ee07bf79736

  • SHA1

    b45dc0d049d71e802b69e66fd851f96029b15d8b

  • SHA256

    e8a5ae606ef639d020de48c954f3d43ff463a6e045d05a331ebc1a5088aada1b

  • SHA512

    243848be4aa9a29f1cc52aa51c6a172b50225f352f012bea58f0ad4f126c719a2589f322aef881343fe694801738922f9f34af9fc97b17aa45ec177b8801e298

  • SSDEEP

    6144:W8+/V1fTvXcO217yj61Pxijls3NM+mFSyu9ezbypHv4+Rv6SFo7jVvvw:B+/V1fTfcv5yQPxij+aFSFevcHjRQNw

Malware Config

Signatures

  • Modifies security service 2 TTPs 1 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Disables taskbar notifications via registry modification
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 22 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9408b6cd8ac1e4e6208e4ee07bf79736_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9408b6cd8ac1e4e6208e4ee07bf79736_JaffaCakes118.exe"
    1⤵
    • Modifies security service
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1596
    • C:\Users\Admin\AppData\Local\Temp\9408b6cd8ac1e4e6208e4ee07bf79736_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\9408b6cd8ac1e4e6208e4ee07bf79736_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\2DD62\C766F.exe%C:\Users\Admin\AppData\Roaming\2DD62
      2⤵
      • System Location Discovery: System Language Discovery
      PID:768
    • C:\Users\Admin\AppData\Local\Temp\9408b6cd8ac1e4e6208e4ee07bf79736_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\9408b6cd8ac1e4e6208e4ee07bf79736_JaffaCakes118.exe startC:\Program Files (x86)\62C86\lvvm.exe%C:\Program Files (x86)\62C86
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2392
    • C:\Program Files (x86)\LP\6F92\4366.tmp
      "C:\Program Files (x86)\LP\6F92\4366.tmp"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:976
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2100
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\2DD62\2C86.DD6

    Filesize

    1KB

    MD5

    47c35a454883a59998734e234eabc456

    SHA1

    8923461328cab1db4f569fbf55181504381f090f

    SHA256

    f1d7a532d10e8d9e1028e8708e9aa389a9f471b08fadf424b0cd6c707f6826d8

    SHA512

    cdb799a37bdf18e3e00d05bb9b15839307b0ae369900efbc8da5c570d7f60f3ae2c619f231c7749def9903faf3e79a3a206be84ceb7ceb018e0a0ec17437e939

  • C:\Users\Admin\AppData\Roaming\2DD62\2C86.DD6

    Filesize

    1KB

    MD5

    04759e7f6e87cbc785ff873d245223ab

    SHA1

    3ba0928f6eb8c5dd36bd8e7071ddbce5dc5bfc82

    SHA256

    45b49598d962f98dbead94b292adc730ac234b9d1d781b66235164af88fcccba

    SHA512

    de6e34132a5663eadac25a259bd2d5100ea7a28dfd8894f6c3c749976c059739c60484522d97c6a4cb8e06af85cb9cf6de3ceb5b7720eb0927a755d95578bdd9

  • C:\Users\Admin\AppData\Roaming\2DD62\2C86.DD6

    Filesize

    600B

    MD5

    c45b14f4a30ee317ddf7e3a8176c3b22

    SHA1

    788cbf64da3db199ebd0a25df230f24500766e77

    SHA256

    866e8d332c325aa85e342677c8be268d6609bea2cf8c03fcbeec1f2551496bf4

    SHA512

    bad33ec060602d04faa3480849de7083adcd63afae451d8a9ce21e7e0f5363dbbf3ea4e650d6f65dc2be40edbaffc4ace5ee2c3174e3a515554b0f8a79b7e2cb

  • C:\Users\Admin\AppData\Roaming\2DD62\2C86.DD6

    Filesize

    996B

    MD5

    d8f5f4bef2bc39f654e5cd45b9d977df

    SHA1

    088aa5b7e571cc6624b3f86a2c9a7ed0d852eb2d

    SHA256

    06cab161ae72280255121d77e2c332e912197ca755a385abcbab4c79798035da

    SHA512

    7369b3f13a1c2e0c176be5b04cf7e41fb6bfbf28a7071c5cfaeecd40074a9158a9b37c90c6205e80fa4ab6f1a07fe6f06fc25f733e2834e72cbc4e656d67789d

  • \Program Files (x86)\LP\6F92\4366.tmp

    Filesize

    96KB

    MD5

    7af38992a27888b3f24b3d67e0cd15f7

    SHA1

    ba6c20941f33522c90a8fbf2518706ae4889b2e4

    SHA256

    8d7f9ac62c3a46ba220f1b68b8ff95e960e5385e6a63855ff61acdc1e1efa756

    SHA512

    c89e27cc8c5e8a611342616b799f3b458fa793f9689e379f59fdb0ad042efcfbb2ddded40e580fccff52177eefc933337c8903f886a2b4100884c506e59f6c35

  • memory/768-13-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/768-14-0x000000000056A000-0x00000000005AF000-memory.dmp

    Filesize

    276KB

  • memory/768-12-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/976-191-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1596-15-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/1596-75-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/1596-76-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/1596-1-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/1596-2-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/1596-189-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/1596-195-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2392-73-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2392-74-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB