Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14/08/2024, 09:34

General

  • Target

    95884ed73676f98121999381108bf4ff_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    95884ed73676f98121999381108bf4ff

  • SHA1

    edc886278c592725c04d49c6328fb935a9e8b18f

  • SHA256

    217bab9422384ca9099f0d8ea8ee4082f43f5ec2e5f16b5f63bcc993d35b5a7a

  • SHA512

    416da658d41819d3607611575b51ac27eb0c6a9279bfd5c1f796bd32e6c235da57d7f4e65c02168955de3ebb81f38e8f18ad6a8ba95d8d248003a53d187a47d1

  • SSDEEP

    24576:TrhG/ZwUNXqyvzBXTCkpM1AzywGIDyfJd5Oh/BXyoOCswn:si8HvzBSmz2rv5Y/kwn

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 3 IoCs
  • Modifies registry class 20 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\95884ed73676f98121999381108bf4ff_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\95884ed73676f98121999381108bf4ff_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:900
    • C:\Users\Admin\AppData\Local\Temp\setup_000024.exe
      "C:\Users\Admin\AppData\Local\Temp\setup_000024.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:1880
    • C:\Users\Admin\AppData\Local\Temp\max2_133daohang4.exe
      "C:\Users\Admin\AppData\Local\Temp\max2_133daohang4.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2380
    • C:\Users\Admin\AppData\Local\Temp\Baidu-Toolbar-jytxz.exe
      "C:\Users\Admin\AppData\Local\Temp\Baidu-Toolbar-jytxz.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:1728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Launch Internet Explorer Browser.lnk

    Filesize

    1KB

    MD5

    7c0448b0889c3cf1e5af6df5b1813d6f

    SHA1

    303031f5db3486e92d48a994cafade062c883a0d

    SHA256

    ac1ba9b53dac34089354ea7ed75ed6fbc509856b6dcf7f435a4502b88c29f61f

    SHA512

    401079a1192f57f3b84ab184f24f79d811b4197ae25faac28338abdf9740c71712500a218301b940a02065e88ce766ec4778c570e76e0a6692a52835b53d1298

  • \Users\Admin\AppData\Local\Temp\Baidu-Toolbar-jytxz.exe

    Filesize

    842KB

    MD5

    53313ae428555585f4c4e15311a5af06

    SHA1

    642b4118708b54bc08a353a2fda3645133c4213f

    SHA256

    5acbcbd3d6f353efa0c8d12483646c2a33b76058a0b866ad447dfab9cc9a7eea

    SHA512

    1f6afc216de13dc4dfe2342e579fae74c030383ec45d39339504b0a6487ba0e341196a2c9a91912272915afcece6cac4effb956cacb82d12c968d00af762ccbd

  • \Users\Admin\AppData\Local\Temp\max2_133daohang4.exe

    Filesize

    65KB

    MD5

    b904cf041cacaae74655cf009acfed2e

    SHA1

    028ef889562a55bc98119fe2c186efb35f556bd1

    SHA256

    72f4498744d1c856eb35028fc0fa59bf0a78b0fa833c49ead54115f08c2f3846

    SHA512

    4ebf41f49fdcb1b70c6b88351c85dff98eb2f75787e36b8741e922363ec8134399450351c431cefed42d1757163eb6196275d2c6509a9c4826bcc4961d726d4c

  • \Users\Admin\AppData\Local\Temp\nsyB8C5.tmp\ShellLink.dll

    Filesize

    4KB

    MD5

    073d44e11a4bcff06e72e1ebfe5605f7

    SHA1

    5f4e85ab7a1a636d95b50479a10bcb5583af93f3

    SHA256

    b96b39cb4ad98f4820b6fd17b67e43d8d0f4b2667d50caa46eff44af245d75bb

    SHA512

    e9f99b96334764ae47aa026f7f24cfb736859a9131bd1c5ec7e070e830b651787f49910911f82e4ade0dc62fea0ad54ba210b07e44830eb2be6abb710a418a98

  • \Users\Admin\AppData\Local\Temp\nsyB8C5.tmp\System.dll

    Filesize

    11KB

    MD5

    00a0194c20ee912257df53bfe258ee4a

    SHA1

    d7b4e319bc5119024690dc8230b9cc919b1b86b2

    SHA256

    dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

    SHA512

    3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

  • \Users\Admin\AppData\Local\Temp\nsyB962.tmp\InetLoad2.dll

    Filesize

    21KB

    MD5

    33322da8b36ea8b67448ec34c827a319

    SHA1

    45cae4b64ecc9bb5d3f1e01faaa14e067e74828d

    SHA256

    fcc886a8ef7575e292ef6210902581273e33047da2f3f6e0092b7887a212c2f0

    SHA512

    e97a4b427e89832c6555ac64044b5b3745164482afd3ff7c4b17005c99f245cc7c7e97653abad345810caca3f472c43f51036157f32926ea81306c939e9e1c3c

  • \Users\Admin\AppData\Local\Temp\setup_000024.exe

    Filesize

    172KB

    MD5

    fdfcf15f217fea1e18935a3ba6f05a72

    SHA1

    28bbcd5bc8492444e3835a58b33c00678a624962

    SHA256

    b394ec60d0ab16a425ae363aa49fc6cea8619962f5c3162355c928d7739c6144

    SHA512

    30fd1a2ce044bcf7063c66520b5b95d3a968b361cabdba3e0e4e5bdd2809c528198cd64d1ef280c2e7549cddd4b0a0fd58c633ae5cbea951d6e16e54b0793541

  • memory/900-9-0x0000000000450000-0x00000000004E6000-memory.dmp

    Filesize

    600KB

  • memory/1880-253-0x00000000003E0000-0x00000000003F0000-memory.dmp

    Filesize

    64KB

  • memory/1880-250-0x0000000010000000-0x0000000010043000-memory.dmp

    Filesize

    268KB

  • memory/1880-19-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/1880-31-0x0000000000340000-0x00000000003D6000-memory.dmp

    Filesize

    600KB

  • memory/1880-25-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/1880-34-0x000000000046A000-0x000000000046B000-memory.dmp

    Filesize

    4KB

  • memory/1880-254-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/1880-255-0x00000000003E0000-0x00000000003F0000-memory.dmp

    Filesize

    64KB