Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 19:23

General

  • Target

    bcde94ed4e934d908c4a493dfc156479_JaffaCakes118.exe

  • Size

    100KB

  • MD5

    bcde94ed4e934d908c4a493dfc156479

  • SHA1

    6ca1d92439c34c4d2379b580a62bb42aba1aad4c

  • SHA256

    bfdf9f9ad699fe7fbc729805c2599c248a9a4dadd88456685426bfd78b824bf8

  • SHA512

    ea0b27b73ca0b6d8fc834e1be430210965835381c29d599f54a23f6c257dc8b251897ab0fed11074857ca6034914cae9ef4330a5aa32a4f6bfebab968166e5e3

  • SSDEEP

    1536:Fts8iAuismywsbUgLw0wF9MGM9K/oKtNgCMbA1bL3N+NM5UfpNIjnZzb:gQg/KLOM5iCnBb

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bcde94ed4e934d908c4a493dfc156479_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bcde94ed4e934d908c4a493dfc156479_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1916
    • C:\Users\Admin\yoebeo.exe
      "C:\Users\Admin\yoebeo.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\yoebeo.exe

    Filesize

    100KB

    MD5

    06b84f52b8263ea9ce79b6c6eb813bae

    SHA1

    356b20d394e7c36d3ee04bc670c9151990c3f7e8

    SHA256

    953cd5138fad18d2a23c2639c69d81dffca62c1a6d487fc9e18ec208b8ba04eb

    SHA512

    e915bdd0a051330e2589bf426e650653a96b2022e8b24f00ba17d45d9467949e121f130e41f7505f7186338cab9bbe4eb24a39caef9c2b8d712d74918506d282