Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21/08/2024, 09:23

General

  • Target

    b2eb9a3c4dd1fadea698e76e1e09a953_JaffaCakes118.exe

  • Size

    160KB

  • MD5

    b2eb9a3c4dd1fadea698e76e1e09a953

  • SHA1

    afcfb2f05110918731cc22d63b35393e7f2e3bc7

  • SHA256

    f1325abbdb61113bf471f04fa51c023c736787be734d5f85ce14fcf083d3f41a

  • SHA512

    7778dff6270ca126ca23d71eeb32dc54d20f7f8f8da31904bb7bb038908e69558e0cdce94fd63ffd3bd363a4035bf42bf90755f306cbb241ee25bf174c7f09e5

  • SSDEEP

    3072:R0ACXtCQzFG1jcFjM6WQHwbJLDmQavl0O:R0AUCs4F6WJtLDmnv/

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies registry class 53 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2eb9a3c4dd1fadea698e76e1e09a953_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b2eb9a3c4dd1fadea698e76e1e09a953_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Users\Admin\AppData\Local\Temp\b2eb9a3c4dd1fadea698e76e1e09a953_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\b2eb9a3c4dd1fadea698e76e1e09a953_JaffaCakes118.exe
      2⤵
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      PID:2664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.url

    Filesize

    150B

    MD5

    148c92a00abd25802c675276428ff65b

    SHA1

    12741785cb5e89893f1b336b507c57afc2760fc9

    SHA256

    a912e8a74de7f8a512352246d53f53f79e0a21f6a2db29fd73085d6b32aa8ec4

    SHA512

    9c0bceb52e330719ee3ac1a295ff4ee89cc31d068a230f486a19fb6f01c196c43001c09b5172fc6ab7a94aa2ba83c6364557a0ea12ecefed5ab9683af2f1b536

  • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\ÌÔ±¦ÌØÂô.url

    Filesize

    142B

    MD5

    6e5ce573b139dbb50ae88f535db40dde

    SHA1

    10e3fd19ccb17f71b4b2c437fe43e0767fd827f3

    SHA256

    2711ebd3495907ad0767f3c175668bbc6da2b4e852aa2726b35790a29931ed63

    SHA512

    e26b4ed390b13cd5225f86864ac406048309a1157292d4905b0b150667e96ddc9cef55ae59fff3b75aa4841ab444b1e71485c7f53b944eb3c027e95441a7ab63

  • memory/2664-16-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2664-17-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3044-0-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3044-18-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB