Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    21/08/2024, 14:17

General

  • Target

    b3cc763a76402e48178b277e21feb079_JaffaCakes118.exe

  • Size

    10.0MB

  • MD5

    b3cc763a76402e48178b277e21feb079

  • SHA1

    e203fe02a0962b83f73895a1c03cbdac4a4953f8

  • SHA256

    76557b0f1da2b21272c8a141ead19e15851bc8ab104c59f50e6651ebebfcf379

  • SHA512

    4d448a4ead0e042d06d8b45a9c4c8c42522df6fb4b752e22b8b0876ac9c0eac924e30f9eb309422cdf81df5ffdfe18448f82da9f7bc97d2d863a7a8051f38a0c

  • SSDEEP

    196608:UqvYPMj6hAXhmhSwkeUpuz3//Y1NvTdWBV36ZdtR6+fdnE7imhieu:paMjmYmhSbetIjTOK91nE7Rvu

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b3cc763a76402e48178b277e21feb079_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b3cc763a76402e48178b277e21feb079_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Users\Admin\AppData\Local\Temp\nstC6AA.tmp\firefox_plus.exe
      C:\Users\Admin\AppData\Local\Temp\nstC6AA.tmp\firefox_plus.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2520

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsoCD3F.tmp\ioSpecial.ini

    Filesize

    617B

    MD5

    ecef3ae11796f59ea840f53ac7cbe22c

    SHA1

    ab20a4fc2a9edcef9cba9e125103ea6fda425faf

    SHA256

    f22a9d6a89a83a038a324fd36d972b817d2e7a54667b9511b6caed9b68ad51d1

    SHA512

    a49779de96f667edcb0b1c26d05783b1eb3e29ab4e577536d10173dc5c94f359fec2db6337174eea30e23fcf95cbd29df7950bd3ea1818fe556f4583ca00a686

  • \Users\Admin\AppData\Local\Temp\Firefox\firefox_inst.dll

    Filesize

    44KB

    MD5

    30c96ef06b2d89ce7f32a0ab7e85017c

    SHA1

    5736361779aee705764d1b0bb8eb8a2f4c45da33

    SHA256

    e8513c2d35e821298b91e3226089ac66ab75e44c4c5afd436bac6f290e3fe843

    SHA512

    188aab49635e99831a99933dd55654dde107d7751b5612f9e27e7f2246aeedd6de0d6d8b0968fabdb253d9fb2a1745858e796bf6ac2091a6b0fd4df0142cefe1

  • \Users\Admin\AppData\Local\Temp\nsoCD3F.tmp\InstallOptions.dll

    Filesize

    12KB

    MD5

    08c82a46416a5e2b471d457968f53816

    SHA1

    3e3897c20b9e89b279b4764a633f67955bf8f09a

    SHA256

    435baf3b7282c9110697a4916834ef9371dd29fae6b4cb8e19c19eb126562dc9

    SHA512

    91e2055b91d04b2348a923cb298ac6ba3637de5038dc4f849c4d2f1665d17de9cd6eb6a97d42d0f894d65348c8fd8e79cd61b667ea5a78e8960347e8cc8db81d

  • \Users\Admin\AppData\Local\Temp\nsoCD3F.tmp\System.dll

    Filesize

    10KB

    MD5

    61151aff8c92ca17b3fab51ce1ca7156

    SHA1

    68a02015863c2877a20c27da45704028dbaa7eff

    SHA256

    af15ef6479e5ac5752d139d1c477ec02def9077df897dadc8297005b3fc4999d

    SHA512

    4f5c943b7058910dc635bdcfadfea1d369c3d645239d1a52b030c21f43aac8e76549e52fd28e38ba5341d32aefe3c090dd8377d9e105ad77f71ab8870d8e326e

  • \Users\Admin\AppData\Local\Temp\nstC6AA.tmp\firefox_plus.exe

    Filesize

    9.8MB

    MD5

    ba26cdeb3fd7f690ee82e9845c93fc40

    SHA1

    e68398de276f5e9af6df407c016a847543597405

    SHA256

    79d9047bb441a2880849d8e62410d463911dac4bad88393f004f2fa01715250d

    SHA512

    6041eb3576df60d633d91f4e10798cb4e96cb8a98172af52cdb32ab126f354a79414dfbe744102d948d467ce695eae5aeb84336ba562f66b5e62c1be94a0ec54

  • memory/2520-16-0x0000000000450000-0x000000000045C000-memory.dmp

    Filesize

    48KB