Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    14/08/2024, 18:58

General

  • Target

    9749842cb2fedc3928a1662472a4fe24_JaffaCakes118.exe

  • Size

    42KB

  • MD5

    9749842cb2fedc3928a1662472a4fe24

  • SHA1

    e4c7d667b087bb2422749910bc3e304a1849ca6a

  • SHA256

    74eeb9d595dfdf9afa4d527473ed2a96e824bef1aba1a7290f477101ee4614ab

  • SHA512

    dab951c78e92fe20ef91b9d77502d921e78e9dd5f7a2f2bc2625762294316569a3a4ab505379c682fd78cea386010593d51ecbea1eff623f797e8e845dd340bb

  • SSDEEP

    768:A9Z1p/ija+1IWNLpOyof5p43O+nAU4axhO/wbbQl:A9Z6VDof5WJwV

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 24 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9749842cb2fedc3928a1662472a4fe24_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9749842cb2fedc3928a1662472a4fe24_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1820
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.delphibbs.com/
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1720
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1720 CREDAT:275457 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1820-0-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/1820-3-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/1820-5-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/1820-7-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/1820-9-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/1820-12-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB