Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2024, 04:34

General

  • Target

    bde69fbf18a454e9846c6486cba2e846_JaffaCakes118.exe

  • Size

    4.3MB

  • MD5

    bde69fbf18a454e9846c6486cba2e846

  • SHA1

    7566fdf824763b23ad93ae3bf24e50765beeb7bd

  • SHA256

    0c06eb473a2930ab33be5f89461bdc2b0f9488f23b440534d0371c5149e8746d

  • SHA512

    5323d4ba1e79a0e996661045bf843b03ab3e0818b8b3abb1135099de97a7b8ea977e93999fbafd45c83c9bcd300df76caa10547004650689e33b1085f30b1d7f

  • SSDEEP

    98304:B6aLOAGB/g4dQIrhcQX9rTxX+hL2jrCcB3mYuoPwVRgZr54JTddQmYa:Bu3lgr5sxdON0u6066Td2

Malware Config

Signatures

  • Ardamax

    A keylogger first seen in 2013.

  • Ardamax main executable 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 13 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bde69fbf18a454e9846c6486cba2e846_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bde69fbf18a454e9846c6486cba2e846_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Windows\SysWOW64\IGUVAU\KSF.exe
      "C:\Windows\system32\IGUVAU\KSF.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2392
    • C:\Users\Admin\AppData\Local\Temp\TeamViewer_Setup_pt.exe
      "C:\Users\Admin\AppData\Local\Temp\TeamViewer_Setup_pt.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2160
      • C:\Users\Admin\AppData\Local\Temp\TeamViewer\Version6\TeamViewer_.exe
        "C:\Users\Admin\AppData\Local\Temp\TeamViewer\Version6\TeamViewer_.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        PID:2764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TeamViewer\Version6\TeamViewer_.exe

    Filesize

    3.1MB

    MD5

    fcb565d1e8c1bbea580011538112a0ef

    SHA1

    29dfdd3bee6ab04bc989a847d014a9ca19f75ff6

    SHA256

    b32c5f6539ad5641612ba90f3c458d10ed9bc4273d74b159d1bce46eff24d0a9

    SHA512

    957a40943403ed7cb60eb4bcb42d1388f2580ba59ffc6079b6d6ea70d4f7de9e26fd2d2369de0c51591b8b2dc4e145495092ed248a333ed890ad111d256d12f3

  • C:\Users\Admin\AppData\Local\Temp\nsdCA43.tmp\start.ini

    Filesize

    1KB

    MD5

    a5506ffdd13c6b10e1770cf9cb30a847

    SHA1

    79dbce22647cb645316dfdaac665656578b18e93

    SHA256

    a549e25a25abbc5312ba8e87c20e50abdfa4263fd52108fb871bde81c7a7989a

    SHA512

    945a5831128d57a8ff7721bb4479effa391be1e754b903ce50531227d7d40d8db90046556096c98be00e5f00e53b37602c079f4f37a3e2c47ff22d61351d3787

  • C:\Users\Admin\AppData\Local\Temp\nsdCA43.tmp\start.ini

    Filesize

    1KB

    MD5

    9c5649eaf449d83a8c86b2dedff8b509

    SHA1

    03a0bb207a7e49e75fa63f39089ac805d1db9545

    SHA256

    d46df60812933eb7554a9edd62797534f91c03da6c7a69fbcce00ebb645f23a3

    SHA512

    987d223a2d5888245356560adf639ea45fb08f47da88278217e24b59003a6ce6251d474c1cae407356dcec4b74b974386cdb11be2491e2ffdfbc5d66bf9928bb

  • C:\Users\Admin\AppData\Local\Temp\nsyC987.tmp\TvGetVersion.dll

    Filesize

    50KB

    MD5

    17d8612a11c6dcedd2ca87c84b3d2440

    SHA1

    abc884524a5690a49f675611d608e3e4f9d70261

    SHA256

    30c6882ce650a89405d498df78aea079ca19a59bfb60c26b5b9bd3c488310270

    SHA512

    156c583740ff1816b100fb160b10a4d63c62fcda2719291ed06b710077b45344190da884092696f18a92e8b10b852f678efa1168e85ed85b156e17448551c736

  • C:\Windows\SysWOW64\IGUVAU\AKV.exe

    Filesize

    456KB

    MD5

    75d98eaf4dcf8817de2bab93707817f6

    SHA1

    0d4d579f7f52c47b774f5574e32d2b6a73ab114c

    SHA256

    ce1234296f3a44c27a4a845cce8b87dc281c98f4da881c52b578e53528124378

    SHA512

    c350d143205765123594a0e865c2afd5e0cfb1298a047aeae06a21fea27881e21a97f11a512e5d0446a6096ebc2212e37212d43653a0a5e784215eafa1991192

  • C:\Windows\SysWOW64\IGUVAU\KSF.001

    Filesize

    61KB

    MD5

    d58c0346fc2f9065f9b3765ec43690a5

    SHA1

    123d91c4362a18ac081a3214d5a60c4541c98e9d

    SHA256

    23bf9315cf724ae5c7974b75370ee32f7a64deffaf49622943cac0bab964897b

    SHA512

    60a3d77fb9f94b057886a5c2237e12d5628a1932365fa25afa393e0c0dbf24309a7b2fc683c7f90bdc79419ab199b00a6cd6b7af5d8cd2d11c90ad4c4b67f06c

  • C:\Windows\SysWOW64\IGUVAU\KSF.002

    Filesize

    43KB

    MD5

    93df156c4bd9d7341f4c4a4847616a69

    SHA1

    c7663b32c3c8e247bc16b51aff87b45484652dc1

    SHA256

    e55b6eabf0f99b90bd4cf3777c25813bded7b6fc5c9955188c8aa5224d299c3e

    SHA512

    ed2e98c5fd1f0d49e5bac8baa515d489c89f8d42772ae05e4b7a32da8f06d511adad27867034ca0865beae9f78223e95c7d0f826154fc663f2fab9bd61e36e35

  • C:\Windows\SysWOW64\IGUVAU\KSF.004

    Filesize

    1KB

    MD5

    0f3a17be469b158d8e0a9de77bc6c1d6

    SHA1

    9314faed967130bbc3ab11952ce132fc449889f5

    SHA256

    15ae2ab148acf38f9bc54b9c2435cea15c4c46b9e635da9b3aae6eb3dd6cce8d

    SHA512

    008643b7028966a4c651009d981f608cd02a01b7bca6a2947b42c58def712857385cd6d734320ecc5fc4a34e405ecea6a470c998777a7d6234623f18a7ce043e

  • \Users\Admin\AppData\Local\Temp\TeamViewer_Setup_pt.exe

    Filesize

    3.1MB

    MD5

    621c81e0808d1318b0a76eceaa07af5f

    SHA1

    519c86407f3957343faecd926184e2039ed18a00

    SHA256

    6d865a2c3c2bbb689eaed36b8320426c423076ae9f813dfaf187c9a2ec5fb84a

    SHA512

    3645eb7bfdf31b96d08b7adbbf71259fd0c30b1aa4cec27703e7be2729cf6cb6abbf3753d94fa8d202523a4a6af759cb700cc706ec58d853e0810a09df252ea4

  • \Users\Admin\AppData\Local\Temp\nsdCA43.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    0dc0cc7a6d9db685bf05a7e5f3ea4781

    SHA1

    5d8b6268eeec9d8d904bc9d988a4b588b392213f

    SHA256

    8e287326f1cdd5ef2dcd7a72537c68cbe4299ceb1f820707c5820f3aa6d8206c

    SHA512

    814dd17ebb434f4a3356f716c783ab7f569f9ee34ce5274fa50392526925f044798f8006198ac7afe3d1c2ca83a2ca8c472ca53fec5f12bbfbbe0707abacd6b0

  • \Users\Admin\AppData\Local\Temp\nsdCA43.tmp\System.dll

    Filesize

    11KB

    MD5

    00a0194c20ee912257df53bfe258ee4a

    SHA1

    d7b4e319bc5119024690dc8230b9cc919b1b86b2

    SHA256

    dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

    SHA512

    3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

  • \Users\Admin\AppData\Local\Temp\nsdCA43.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    1e8e11f465afdabe97f529705786b368

    SHA1

    ea42bed65df6618c5f5648567d81f3935e70a2a0

    SHA256

    7d099352c82612ab27ddfd7310c1aa049b58128fb04ea6ea55816a40a6f6487b

    SHA512

    16566a8c1738e26962139aae893629098dc759e4ac87df3e8eb9819df4e0e422421836bb1e4240377e00fb2f4408ce40f40eee413d0f6dd2f3a4e27a52d49a0b

  • \Windows\SysWOW64\IGUVAU\KSF.exe

    Filesize

    1.7MB

    MD5

    3cd29c0df98a7aeb69a9692843ca3edb

    SHA1

    7c86aea093f1979d18901bd1b89a2b02a60ac3e2

    SHA256

    5a37cd66508fa3fc85ae547de3498e709bd45167cb57f5e9b271dc3a1cb71a32

    SHA512

    e78f3206b1878e8db1766d4038a375bbebcbcdb8d1b0a0cb9b0dc72c54881392b9c27e2864ad9118702da58f203f13e0ad5d230980ad1ef2370391a2c4acffc9

  • memory/2160-44-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2160-18-0x0000000000400000-0x000000000043E000-memory.dmp

    Filesize

    248KB

  • memory/2368-16-0x0000000000700000-0x000000000073E000-memory.dmp

    Filesize

    248KB

  • memory/2368-281-0x0000000000700000-0x000000000073E000-memory.dmp

    Filesize

    248KB

  • memory/2392-24-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/2392-282-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/2764-47-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB

  • memory/2764-53-0x00000000003D0000-0x00000000003E2000-memory.dmp

    Filesize

    72KB

  • memory/2764-283-0x0000000000400000-0x0000000000451000-memory.dmp

    Filesize

    324KB