Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    21/08/2024, 12:15

General

  • Target

    b36a25a7f0b92dfba3a2d6320938c6b8_JaffaCakes118.exe

  • Size

    1.5MB

  • MD5

    b36a25a7f0b92dfba3a2d6320938c6b8

  • SHA1

    09698030231078824f10e40e475e7d8d9abc4b63

  • SHA256

    c6c4a148fd11dfba881b1e04509b229af378c4bc15c7c4ef8435fb7d23fa8966

  • SHA512

    d076cbf50b8981b8e1155c7de6bab5dc3c780ca0c8514609ed4865d1774df4bcc10cf7374ac5a1fadba6b4db11d22ced0068df83168de73b4c9bb8b582f3f613

  • SSDEEP

    24576:cQbz+mcdH5sY0DOMLiMXSspgE1vIXLYGXmRhzPchYUhER58q06jysYGKY9bCs6vB:J4dH58LLSspgE1v0LpQzPNdD06ofWCeA

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b36a25a7f0b92dfba3a2d6320938c6b8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b36a25a7f0b92dfba3a2d6320938c6b8_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2420
    • C:\Users\Admin\AppData\Local\Temp\b36a25a7f0b92dfba3a2d6320938c6b8_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\b36a25a7f0b92dfba3a2d6320938c6b8_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WRAR38~1.EXE
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WRAR38~1.EXE
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WRAR38~1.EXE

    Filesize

    1.2MB

    MD5

    9ac5a4d6dc9b18c9b580f7c8b0bac5f5

    SHA1

    fe2b35cf87fcadbff5576d817c3741fb4f4a492d

    SHA256

    f2d7c6dabd00eac6ea8f7b82df217faefdeb690f6b8bd6488c89433e1dddbebd

    SHA512

    84b409237f7e0109e4b7f0050e832dda4ed95fdf9178db1fde46f1eaf3a8861236c29b2fbabb688e4bd4f40a604555dab5b690adba484c3b576bd2e656bcf335

  • memory/2140-23-0x0000000000400000-0x000000000041D000-memory.dmp

    Filesize

    116KB

  • memory/3020-0-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/3020-3-0x0000000001000000-0x000000000117B000-memory.dmp

    Filesize

    1.5MB

  • memory/3020-5-0x0000000001000000-0x000000000117B000-memory.dmp

    Filesize

    1.5MB

  • memory/3020-2-0x0000000001000000-0x000000000117B000-memory.dmp

    Filesize

    1.5MB

  • memory/3020-10-0x0000000001000000-0x000000000117B000-memory.dmp

    Filesize

    1.5MB