Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 08:55

General

  • Target

    ae9811f3c231cf718783e2593c6b5182_JaffaCakes118.exe

  • Size

    32KB

  • MD5

    ae9811f3c231cf718783e2593c6b5182

  • SHA1

    b439b8652b47aff81bcfc7ae1b84064d35fb9857

  • SHA256

    1330c7c0fb50c155dc57cc2ae786f9c73007b1b3ef1ab54fd49a32f2871aff67

  • SHA512

    0091deb909b8f3bde16aa8d46bb072587acf4dab2b946f824f33f2a8f63b21100ea19a9e9ec89a0bbb469adcfc4a7ae0083f1a5d5b7fe5fb1c3277cef1e16362

  • SSDEEP

    384:f98xUHQl/sT5ayOny4/q8zLeiEerLkWYga/lIhDtrzt/nOGTEi7pg:WwvInBqopHxYxIhDtrztvO0g

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: RenamesItself 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae9811f3c231cf718783e2593c6b5182_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ae9811f3c231cf718783e2593c6b5182_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:624
    • C:\Windows\SysWOW64\regedit.exe
      regedit.exe /s C:\Users\Admin\AppData\Local\Temp\~dfds3.reg
      2⤵
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Runs .reg file with regedit
      PID:2616
    • C:\Windows\SysWOW64\svchost.exe
      svchost.exe
      2⤵
        PID:2112

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\IPBusEnum.exe

      Filesize

      32KB

      MD5

      df5dfd422c0697572b172eec3131edee

      SHA1

      559853577dde2217589b631cc7fa9340e05c18ce

      SHA256

      df17861cad6b935f76f3c9ea6e0cb7aa485dec1cad01483d00c4f4b80c36f9dc

      SHA512

      3f35dd896c4d2861fe90eddf78c8a2f1b38c8689bf19774d2b5c4bdb9ebe76933279394b31e385924bcbab4f2759f5e3836a8cc5409be2924073b26c5fb36415

    • C:\Users\Admin\AppData\Local\Temp\~dfds3.reg

      Filesize

      170B

      MD5

      d2402036cac7981cbaea7f79de3e9113

      SHA1

      75306c2055e3b4bf2fed14ab487e4b5474d1cb3e

      SHA256

      c299d752f19ceff83e583771640bb352d8be4f1a7d47558900c68770eb754a9f

      SHA512

      b94634f255d678ebf1853584079306e2afefb2a681c2c28ca4b976e6f351313f5774ed67ee811c4fcdc72651b2310d5b4d2bfb6472a4386645519e30557a7ab3

    • memory/624-0-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/624-2-0x0000000000020000-0x0000000000028000-memory.dmp

      Filesize

      32KB

    • memory/624-1-0x0000000000020000-0x0000000000028000-memory.dmp

      Filesize

      32KB

    • memory/624-18-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/2112-5-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2112-9-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/2112-7-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB