Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20/08/2024, 16:43

General

  • Target

    b004513a8b32bedc233b4956057be033_JaffaCakes118.exe

  • Size

    291KB

  • MD5

    b004513a8b32bedc233b4956057be033

  • SHA1

    5e35dceabbcd8d543620307ff12ad4133020201f

  • SHA256

    2237681a8e05195486312091795a37839dcdbcfd3aa7ba970d7790243a135e0b

  • SHA512

    0693c2f1e5f8bb92c91bd42f71d99c99cc839b4d543af94d2be259532d4f58362d4db79b91e74ab538b0c2c481a80a3d30b69161821df39c5195c9f6704c96b3

  • SSDEEP

    6144:tFTbEMEvDpB7wY4n74fHyjZRVkcHpy7u/qbWhp+KW:tevvVZu7WoZRVvcu/qqhppW

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\system32\Dwm.exe
    "C:\Windows\system32\Dwm.exe"
    1⤵
      PID:1040
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
        PID:1068
        • C:\Users\Admin\AppData\Local\Temp\b004513a8b32bedc233b4956057be033_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\b004513a8b32bedc233b4956057be033_JaffaCakes118.exe"
          2⤵
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of UnmapMainImage
          • Suspicious use of WriteProcessMemory
          PID:2436
          • C:\Users\Admin\AppData\Roaming\Ytna\mimeda.exe
            "C:\Users\Admin\AppData\Roaming\Ytna\mimeda.exe"
            3⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of UnmapMainImage
            • Suspicious use of WriteProcessMemory
            PID:3024
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp69454fb5.bat"
            3⤵
            • Deletes itself
            • System Location Discovery: System Language Discovery
            PID:1724
      • C:\Windows\system32\taskhost.exe
        "taskhost.exe"
        1⤵
          PID:1092
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:2044

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\tmp69454fb5.bat

            Filesize

            271B

            MD5

            b8daa3a0bedaae0eaef72f23c582d593

            SHA1

            e6be9f2e49e731300aafe3934b92a3438d4035a0

            SHA256

            4ac02550cd60aa39fc236737e5f2542b3c1b93bc135032ccafc72ea1af9fede0

            SHA512

            0d0802c77611f89885c04ebf576769d14b21a50c5a2dd62c8613d045ae1d81314d55fa624385614164c149d93884a9f1b88f9c3623023d763040c36389c76038

          • C:\Users\Admin\AppData\Roaming\Ytna\mimeda.exe

            Filesize

            291KB

            MD5

            26b1a6fc8c667150ebc209f3b6f1da53

            SHA1

            2ea634a3e5409ae248d2878de355cdaee2230215

            SHA256

            18556b821ea0e2ac655324f699b46f2c320e95926c01688d58537c8a67ae86f0

            SHA512

            7fe7cef1ce80b8429d23d584fbb9f0024a605fb11a3e0e23b5915166ae86a1f004d7a7a3c9c50a260efc9963678a14a052d98aff33167c1eaf0329c04e3882a4

          • memory/1040-21-0x0000000001DA0000-0x0000000001DE4000-memory.dmp

            Filesize

            272KB

          • memory/1040-22-0x0000000001DA0000-0x0000000001DE4000-memory.dmp

            Filesize

            272KB

          • memory/1040-18-0x0000000001DA0000-0x0000000001DE4000-memory.dmp

            Filesize

            272KB

          • memory/1040-19-0x0000000001DA0000-0x0000000001DE4000-memory.dmp

            Filesize

            272KB

          • memory/1040-20-0x0000000001DA0000-0x0000000001DE4000-memory.dmp

            Filesize

            272KB

          • memory/1068-26-0x0000000004060000-0x00000000040A4000-memory.dmp

            Filesize

            272KB

          • memory/1068-24-0x0000000004060000-0x00000000040A4000-memory.dmp

            Filesize

            272KB

          • memory/1068-25-0x0000000004060000-0x00000000040A4000-memory.dmp

            Filesize

            272KB

          • memory/1068-27-0x0000000004060000-0x00000000040A4000-memory.dmp

            Filesize

            272KB

          • memory/1092-32-0x00000000021E0000-0x0000000002224000-memory.dmp

            Filesize

            272KB

          • memory/1092-29-0x00000000021E0000-0x0000000002224000-memory.dmp

            Filesize

            272KB

          • memory/1092-30-0x00000000021E0000-0x0000000002224000-memory.dmp

            Filesize

            272KB

          • memory/1092-31-0x00000000021E0000-0x0000000002224000-memory.dmp

            Filesize

            272KB

          • memory/2044-34-0x0000000001C40000-0x0000000001C84000-memory.dmp

            Filesize

            272KB

          • memory/2044-37-0x0000000001C40000-0x0000000001C84000-memory.dmp

            Filesize

            272KB

          • memory/2044-35-0x0000000001C40000-0x0000000001C84000-memory.dmp

            Filesize

            272KB

          • memory/2044-36-0x0000000001C40000-0x0000000001C84000-memory.dmp

            Filesize

            272KB

          • memory/2436-80-0x0000000000340000-0x0000000000341000-memory.dmp

            Filesize

            4KB

          • memory/2436-78-0x0000000000340000-0x0000000000341000-memory.dmp

            Filesize

            4KB

          • memory/2436-60-0x0000000000340000-0x0000000000341000-memory.dmp

            Filesize

            4KB

          • memory/2436-58-0x0000000000340000-0x0000000000341000-memory.dmp

            Filesize

            4KB

          • memory/2436-55-0x0000000000340000-0x0000000000341000-memory.dmp

            Filesize

            4KB

          • memory/2436-53-0x0000000000340000-0x0000000000341000-memory.dmp

            Filesize

            4KB

          • memory/2436-51-0x0000000000340000-0x0000000000341000-memory.dmp

            Filesize

            4KB

          • memory/2436-49-0x0000000000340000-0x0000000000341000-memory.dmp

            Filesize

            4KB

          • memory/2436-46-0x0000000001E80000-0x0000000001EC4000-memory.dmp

            Filesize

            272KB

          • memory/2436-44-0x0000000001E80000-0x0000000001EC4000-memory.dmp

            Filesize

            272KB

          • memory/2436-42-0x0000000001E80000-0x0000000001EC4000-memory.dmp

            Filesize

            272KB

          • memory/2436-40-0x0000000001E80000-0x0000000001EC4000-memory.dmp

            Filesize

            272KB

          • memory/2436-66-0x0000000000340000-0x0000000000341000-memory.dmp

            Filesize

            4KB

          • memory/2436-70-0x0000000000340000-0x0000000000341000-memory.dmp

            Filesize

            4KB

          • memory/2436-72-0x0000000000340000-0x0000000000341000-memory.dmp

            Filesize

            4KB

          • memory/2436-74-0x0000000000340000-0x0000000000341000-memory.dmp

            Filesize

            4KB

          • memory/2436-76-0x0000000000340000-0x0000000000341000-memory.dmp

            Filesize

            4KB

          • memory/2436-62-0x0000000000340000-0x0000000000341000-memory.dmp

            Filesize

            4KB

          • memory/2436-1-0x00000000002E0000-0x000000000032C000-memory.dmp

            Filesize

            304KB

          • memory/2436-68-0x0000000000340000-0x0000000000341000-memory.dmp

            Filesize

            4KB

          • memory/2436-64-0x0000000000340000-0x0000000000341000-memory.dmp

            Filesize

            4KB

          • memory/2436-57-0x0000000077590000-0x0000000077591000-memory.dmp

            Filesize

            4KB

          • memory/2436-48-0x0000000001E80000-0x0000000001EC4000-memory.dmp

            Filesize

            272KB

          • memory/2436-0-0x0000000000290000-0x00000000002D4000-memory.dmp

            Filesize

            272KB

          • memory/2436-4-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/2436-3-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/2436-7-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/2436-157-0x00000000002E0000-0x000000000032C000-memory.dmp

            Filesize

            304KB

          • memory/2436-2-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/2436-134-0x0000000000340000-0x0000000000341000-memory.dmp

            Filesize

            4KB

          • memory/2436-158-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/3024-17-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB

          • memory/3024-15-0x0000000000400000-0x000000000044C000-memory.dmp

            Filesize

            304KB

          • memory/3024-280-0x0000000000400000-0x000000000044C000-memory.dmp

            Filesize

            304KB

          • memory/3024-281-0x0000000000400000-0x0000000000444000-memory.dmp

            Filesize

            272KB