Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 18:27

General

  • Target

    bcb41b5c44ae429a861d41c953abda8d_JaffaCakes118.exe

  • Size

    167KB

  • MD5

    bcb41b5c44ae429a861d41c953abda8d

  • SHA1

    0e81e9208f3a1062da733cd68ed56a4241868fc7

  • SHA256

    3efb61211a9fdfc34a6951337bb9cc735914e2d80f81d0f768e09d646a7bccc0

  • SHA512

    f202e2f813ef902d5a7a5e1d9d86bb6f3a613ff1b343114caa5e1a22bf388b1c01d7dc15e27e12f13105e14608f3027e53972d3f4d467de9e5ad20416b075778

  • SSDEEP

    3072:0l856uXS5CH6BDsmXYm+uJJTd4ISvyRbGLoQM71a1DzSLTjMrpKYqonqm:NSDbH7Td4zaRqLhM71rL/MtfqoT

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1064
      • C:\Users\Admin\AppData\Local\Temp\bcb41b5c44ae429a861d41c953abda8d_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\bcb41b5c44ae429a861d41c953abda8d_JaffaCakes118.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2384
        • C:\Users\Admin\AppData\Local\Temp\bcb41b5c44ae429a861d41c953abda8d_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\bcb41b5c44ae429a861d41c953abda8d_JaffaCakes118.exe"
          3⤵
          • Maps connected drives based on registry
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2400
          • C:\Users\Admin\AppData\Local\Temp\bcb41b5c44ae429a861d41c953abda8d_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\bcb41b5c44ae429a861d41c953abda8d_JaffaCakes118.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:316

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\DJl1i8I1GmG.txt

      Filesize

      2KB

      MD5

      dd189be8f4e64c244da018a3f75c1c66

      SHA1

      92c38bbe6ae235b536fc02b50932a655d2cc5ef2

      SHA256

      dd62d67229540479e5ea6a95de426723538e1982f8ae1410c2115cee16bff88f

      SHA512

      65ad44d99699720cec8e79d9bdedfbf4b0d9613c4bd6bf798e294deb57763e91fb8cc0a6828894a34ca10c913a45a5069877671ed96196caf0c68c73ee0b5bd5

    • memory/316-47-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/316-38-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/316-53-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/316-34-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/316-36-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/316-42-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/316-51-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/316-32-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/316-50-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/2400-13-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/2400-15-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/2400-5-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/2400-17-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/2400-48-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/2400-7-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/2400-9-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/2400-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB