Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 20:54

General

  • Target

    ac8a19aa396c0e36de3062b555a0710f_JaffaCakes118.exe

  • Size

    1.3MB

  • MD5

    ac8a19aa396c0e36de3062b555a0710f

  • SHA1

    4f876961a6ee86b029ecdf33bdccb1e35f299460

  • SHA256

    34abdf449c108aa88b479eaa59ba4e8ddbde0a6e2e34869af0392d5f2865d6ee

  • SHA512

    005d4d7e07f45690667190c193916cbe6907d6d430d4ec80da99711c4a6881ff68050e37f7e632f06c88756b5d356570151fbeaa8440d7655d19a33f1f77bc95

  • SSDEEP

    24576:4ZxTIGZ5daCDmWMfeCc85BuHkW1yKHl8V/4AIpLlouWQYNyBcSdC96L6q4TPaxPM:4XT3ZHDKFBsBl8VAHsxN73RNLDR

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax main executable 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in System32 directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac8a19aa396c0e36de3062b555a0710f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ac8a19aa396c0e36de3062b555a0710f_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Windows\SysWOW64\FHSEXG\CNL.exe
      "C:\Windows\system32\FHSEXG\CNL.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1616
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\FHSEXG\CNL.exe > nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2592
    • C:\Users\Admin\AppData\Local\Temp\STB-09.exe
      "C:\Users\Admin\AppData\Local\Temp\STB-09.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\STB-09.exe

    Filesize

    249KB

    MD5

    66df62cccbef60a833c5fc35f0c784d7

    SHA1

    368750b0e379ed242867bc442ebeac3e6d9c3c61

    SHA256

    55cbb6a102bda34a54b2bacfdd2a5f02926a5ccd78d17a375b3dba15a0c37f39

    SHA512

    39dd3ce0c83ad0af71991f05fff5c3c482c8eb2432e508abfd312245da1b0345db0d6425f8ae7dd1c39072fcbc25b1c6b152de6b8ee895db29eacac97813e82d

  • C:\Windows\SysWOW64\FHSEXG\AKV.exe

    Filesize

    456KB

    MD5

    a65c554c77c4607a4efdef07b9503fb9

    SHA1

    4faa215bd772deb3223dac1601972fce2f6c05f1

    SHA256

    7d32aa95d682ac91df6efa4efc01e5675f69e72fc9821632006111df44e08d7c

    SHA512

    44be9403aff24e3bdb886a883b7ad8fa06950d969ef1588c4dab43fcc030768d4797fd4ce645ddfe49949d6a97fac5061f2d840ab086b5e43189e5adb441438a

  • C:\Windows\SysWOW64\FHSEXG\CNL.002

    Filesize

    43KB

    MD5

    c04e0de732e8f56b401e409c4417149c

    SHA1

    7b260b3600345fb72af9fd0e4025b4a125c8dd08

    SHA256

    0d359c2c70001f56c14e7e29a12456c82606bb9a46f9db1f8216a9087775dec6

    SHA512

    d9e2bf02bcb144a8c37e05cb2544ca46fe93e1f2b5a4e08832d533ab9348ddb9153b5c36efa4186d625a80af5d546331d740a13f43c5195ccb4829c98eaa69b0

  • C:\Windows\SysWOW64\FHSEXG\CNL.004

    Filesize

    1KB

    MD5

    0bd62bfd704775e87ad02803fa43a08d

    SHA1

    71d1b148f9a02a41ae9fb9509afd8b8c30c659bc

    SHA256

    003705607c52e94082e387bb103c75b59cc523d401408fe28aecc9f82891e14b

    SHA512

    55d8160a75b999c7f0de2c90d0884d5050b22616c26b58a30fa02ae5b97ffd1e9bf0ef969b0b2970111816da6382c5b0328cfe50d8308fa15918f7088521c186

  • \Windows\SysWOW64\FHSEXG\CNL.001

    Filesize

    61KB

    MD5

    86b63726200d9ff6662fd2de00b9fcaa

    SHA1

    f4ecf611b4dca6c60901993a10b44e8c485f9b95

    SHA256

    b203eb072b0e912d402ba0c5652a13f788d3b69abf6ef73ca01d9ad9317b7eaf

    SHA512

    ce116dfb3244fe68b8fb42875fba4e512f4cdc586bec5945428f4a0a539169ac84292cdb3310e4974eb2c4342b6205e8fee32e47a2840b104cf28db9e1750c3a

  • \Windows\SysWOW64\FHSEXG\CNL.exe

    Filesize

    1.5MB

    MD5

    82dc38922620ab6a5850f391584d2657

    SHA1

    ef30f091ff7aa242600f19e87f2b7b0cd7b0764f

    SHA256

    b464e42b8dfef6629030283e19c20bcc69d6d7c1bf9bb7e8df472f762debcea2

    SHA512

    4ec72c1d1599721ee1205f46a74a71fb67801e4d7aa6ca55907c2461a03c41cc3e1333e0b4ed9631b92e2310f45bf27cf865a5cc7ee2507e92f58cdb467023e8

  • memory/1616-27-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/1616-34-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2192-20-0x0000000001F70000-0x0000000002073000-memory.dmp

    Filesize

    1.0MB

  • memory/2192-19-0x0000000001F70000-0x0000000002073000-memory.dmp

    Filesize

    1.0MB

  • memory/2972-21-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB

  • memory/2972-33-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB