Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 06:30

General

  • Target

    ae2c7961273a686a02f1e27977cd58af_JaffaCakes118.exe

  • Size

    527KB

  • MD5

    ae2c7961273a686a02f1e27977cd58af

  • SHA1

    a5cef4a1ecdabfe1e9353c97521fe41fa71b098f

  • SHA256

    c0279b5804d9ffd8b92cbdb734715cd34e80bb758dfe7de5094987612ec78d51

  • SHA512

    5ef2c2f9e3ba349b7a6bd669991583a788cb7e045e08e77806d14689078f6d02e55358af0e7c0d068627180b8b3ae48d956a09c5762cb66cf6c8f7248793ceab

  • SSDEEP

    12288:M+v5DjZSncJYrLBhmmzejLhRRTpnGL90m:Mq5DjZSc+rLB76jLhRjYx

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae2c7961273a686a02f1e27977cd58af_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ae2c7961273a686a02f1e27977cd58af_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2280
    • C:\Users\Admin\AppData\Local\Temp\ae2c7961273a686a02f1e27977cd58af_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\ae2c7961273a686a02f1e27977cd58af_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2268

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    304B

    MD5

    f02f2192e028c847664cea80d8f2c15b

    SHA1

    6be4d350d29fe197a68c6082e6ec92dd12ce8ce8

    SHA256

    7cd1986df368a24e1d2c322f5dd4da8c23d3d8399049ab45a9902686af7fd8ec

    SHA512

    006f06604cdb1533163779037f02a68470f45fd6a40956abf9a86246c791ee9f8cb7b698915c9898ccc2606c7f4fdee6b522ab87c1c79f3b37a74e01005205ef

  • C:\Users\Admin\AppData\Local\Temp\CabFAB6.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarFAC8.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\ae2c7961273a686a02f1e27977cd58af_JaffaCakes118.exe

    Filesize

    527KB

    MD5

    f36fb8faed1ba34e70a09c00fa251e23

    SHA1

    915c27f871c1090fec4fbfb3b6b4ff0b05121668

    SHA256

    d682f44fbe27c203a7961f93f18b9a6157fb6c6bf013d2fb341923115ed3ad89

    SHA512

    bfdf4c11b5293c84a47cb6c8728f1b4ae0a808115af96f1bdb606d2948ae3d5101e68286ab624743eb0f1d3568a66ffe029ac310939e111183508e8da89f6ea0

  • memory/2268-18-0x0000000000200000-0x0000000000231000-memory.dmp

    Filesize

    196KB

  • memory/2268-105-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/2280-0-0x0000000000400000-0x00000000004E0000-memory.dmp

    Filesize

    896KB

  • memory/2280-1-0x0000000000160000-0x0000000000191000-memory.dmp

    Filesize

    196KB

  • memory/2280-2-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2280-13-0x0000000022F00000-0x0000000022FE0000-memory.dmp

    Filesize

    896KB

  • memory/2280-17-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB