Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 17:12

General

  • Target

    bc9a77d80952b0995f5bc02673433978_JaffaCakes118.exe

  • Size

    628KB

  • MD5

    bc9a77d80952b0995f5bc02673433978

  • SHA1

    5db41fe7fedc852ae5e1f0351adc436adad74c2e

  • SHA256

    29ba639812ea8badb9ce8ca672c54840e57d2877519de438e87fbf32441df4ee

  • SHA512

    1de87a96b29de3c5785a9b45c816d35220ecbe65ccad799ec90d69faad81cc5d8d4bd82599ed360883f7d5f9123e4896de96db5aad4baed2d40afde7abe58488

  • SSDEEP

    6144:QsHsthcdRsISwBVz9E/TLvx8TYawAzUaZO2viDfnGU0xYXhHHMMOSMAbJJ9g0xYj:Ie/Swjz9E7o/SavsoYXhnYAyoYXhnYA

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc9a77d80952b0995f5bc02673433978_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bc9a77d80952b0995f5bc02673433978_JaffaCakes118.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2580
    • C:\Users\Admin\AppData\Local\Temp\OrganizerOpenSave.vshost.exe.exe
      "C:\Users\Admin\AppData\Local\Temp\OrganizerOpenSave.vshost.exe.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2708
      • C:\Users\Admin\AppData\Local\Temp\64bitProxy.exe.exe
        "C:\Users\Admin\AppData\Local\Temp\64bitProxy.exe.exe"
        3⤵
        • Executes dropped EXE
        PID:2756
    • C:\windows\system32\m6dw6b.exe
      C:\windows\system32\m6dw6b.exe
      2⤵
        PID:1304

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\OrganizerOpenSave.vshost.exe.exe

      Filesize

      471KB

      MD5

      1774725ffdbc158eb05e3b30bb93b2cb

      SHA1

      40a9a7f0b343a1f9f7e5fb6816913a0228096b86

      SHA256

      156d9af3e7b6cf238eff0175bda52611f62ca12c093c766bfd4da145a52146bf

      SHA512

      a2e38bb96825bce55e160f7e1cbe592f5f85396552c1224fc770b4d0738513ad23a6399de394f23d8d2986b257a49635632492cf01dc82f50683f4464072d7b1

    • \Users\Admin\AppData\Local\Temp\64bitProxy.exe.exe

      Filesize

      314KB

      MD5

      7b5d5b1b96a3429c8eb646894d2d8934

      SHA1

      c090f183d8e2f845ec08a4662d9354ec475d371f

      SHA256

      fcb0df1d3ea3e1bcccb278c94d3dd2b5d735d04066429868ba5c3b6cfb36b794

      SHA512

      78dbbd9e709acadb2c41a5a44bb5fa41ae32b7ab2720cf61893013c993e1f5f380651b98d6e25e3ba6fa01691fbe0f7a37f29de3a913463f4150709c49dcf133

    • memory/2580-23-0x000007FEF6360000-0x000007FEF6D4C000-memory.dmp

      Filesize

      9.9MB

    • memory/2580-1-0x00000000010F0000-0x0000000001194000-memory.dmp

      Filesize

      656KB

    • memory/2580-3-0x0000000000440000-0x000000000046A000-memory.dmp

      Filesize

      168KB

    • memory/2580-4-0x0000000000A60000-0x0000000000A68000-memory.dmp

      Filesize

      32KB

    • memory/2580-28-0x000007FEF6360000-0x000007FEF6D4C000-memory.dmp

      Filesize

      9.9MB

    • memory/2580-10-0x000007FEF6360000-0x000007FEF6D4C000-memory.dmp

      Filesize

      9.9MB

    • memory/2580-26-0x000000001D190000-0x000000001D91E000-memory.dmp

      Filesize

      7.6MB

    • memory/2580-0-0x000007FEF6363000-0x000007FEF6364000-memory.dmp

      Filesize

      4KB

    • memory/2580-22-0x000007FEF6363000-0x000007FEF6364000-memory.dmp

      Filesize

      4KB

    • memory/2708-12-0x000007FEF6360000-0x000007FEF6D4C000-memory.dmp

      Filesize

      9.9MB

    • memory/2708-24-0x000007FEF6360000-0x000007FEF6D4C000-memory.dmp

      Filesize

      9.9MB

    • memory/2708-25-0x000007FEF6360000-0x000007FEF6D4C000-memory.dmp

      Filesize

      9.9MB

    • memory/2708-11-0x000007FEF6360000-0x000007FEF6D4C000-memory.dmp

      Filesize

      9.9MB

    • memory/2708-9-0x0000000000D80000-0x0000000000DFC000-memory.dmp

      Filesize

      496KB