Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2024, 12:42

General

  • Target

    be9ceb2dac61c202526045be51ac037b_JaffaCakes118.exe

  • Size

    48KB

  • MD5

    be9ceb2dac61c202526045be51ac037b

  • SHA1

    5126c0368dc9f3b9bc0eae496639f18144496b0b

  • SHA256

    96da703b37824b95fcb27d76207aaa1ce0b4f284cec9e46c6428c85abd51eca1

  • SHA512

    803cea81c50fe0e310b4d9c22a97c2227571e320dc1147677a199cf2d37112d6adf1922d7a3b1472d96bda894b4d515d83bc00d763ed7289181ec321962f4687

  • SSDEEP

    768:jv8IRRdsxq1DjJcqOVBLUvTd2wmDkuBgs5vY2HJvqRTkoCmq1UrHI3Gr:DxRTsxq1DjCBBLUrGaeva1CmRrHI3i

Malware Config

Signatures

  • Detects MyDoom family 9 IoCs
  • MyDoom

    MyDoom is a Worm that is written in C++.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 30 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be9ceb2dac61c202526045be51ac037b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\be9ceb2dac61c202526045be51ac037b_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2388

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    907832f0ee50a06a1f0043c66a21558e

    SHA1

    0f3683c6bc1c5682b3a39be7cf15030dfe5e92b1

    SHA256

    93b5ea03b71cb3ae2b5273d9384f82ad09611a7f3ec33e7a14feaa2464810f79

    SHA512

    a8bab02b508b4d7e0d10e9b323be8cccae6fd5ecd5ed2ef754544ba9de63adcbd9e132fbc6c2c305e0ac8a7aa6d2f4731df266f201362df498c936cd5267a3b7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    83a417ea75928eb9d44f55917806acfa

    SHA1

    5ef6439a33fd51debb06403dafebf47a4c72091d

    SHA256

    8222fab6761fe3d0efabb371c125c4cb3b231986cea6497ad01a6a5acf0b9a6a

    SHA512

    78d63fc03135e2e4acec637eb648b5891976704117d05e7cf69dca2af267c65184b14cc1ad636d54a106cc1acc8cee867ba2f8d7f52830c3b2931ec7c6736e9c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SPRIFH8L\search[1].htm

    Filesize

    25B

    MD5

    8ba61a16b71609a08bfa35bc213fce49

    SHA1

    8374dddcc6b2ede14b0ea00a5870a11b57ced33f

    SHA256

    6aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1

    SHA512

    5855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1

  • C:\Users\Admin\AppData\Local\Temp\CabCF4C.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Gfarw.log

    Filesize

    1KB

    MD5

    3de1a754f5433f0f14d65c8b2018adec

    SHA1

    13772b88f9688bd984bf3b19fa53bf0417916e64

    SHA256

    d14b4ab1899463a9cd6e19d9ed40cf301a19be7a763216abade36f19eb8951d2

    SHA512

    3c3726377d588f2f826ae652a05e8f866a9be6fa4a4d387758488635fa934889cb55837cc9abbfc7d2437993bb8ce934f9e5fa66eace5c2c7b5b9750fcad1dcc

  • C:\Users\Admin\AppData\Local\Temp\TarCFBC.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\tmpD00D.tmp

    Filesize

    48KB

    MD5

    f48c1def27860c72f170cedac5504ac8

    SHA1

    ad978e821c57a5e0bcae00faa2fb97d4d0dd3ae7

    SHA256

    04790bc8ef87d0f7f03dec92a0a8efc5d0885efca6603bf60db2ef0ef06399e6

    SHA512

    4a08e39953cb4c1e12393cf09e77e1c7cdc1bdd0d0358386c3080b7d87820fc22eec386d817f806fd4262b4c2c2b66234fe671a2687154eab0e37d5d47f5646d

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    1KB

    MD5

    45547d663b7df074f67a4329017a01de

    SHA1

    c0a893d9bade822087fbf5235fe10055adf12255

    SHA256

    5dc90951c6bc6450ca8fef98fdff8e2fa01d4287f605869caf4b494c10755008

    SHA512

    d0513b79d8b1dd104ae05e927f0b9ea594f801317f5e7e6c8249017ca8adbbc946cd825306149781bfddc30b4300c77ffe5d5d23dca5b23020a61eae03b5bd50

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    1KB

    MD5

    12c58ff7ebd78543a9b84f9f8c1527b8

    SHA1

    c0c5ead646413de4600bb3b9333b0dac337df36a

    SHA256

    a37e253923a0eb5d3f6c1a9e8fbd2d936a30cdc2eaf21cf12df84e4d4809bca0

    SHA512

    1014f3ae6eb9ccb085ca2eca5d7208d321aeb694e8a4e23359cbb304fddbabfa03feb6f29890dd0f9422ad6b90c3615176646a6068c5b9ee519c72f98334825d

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/2016-17-0x0000000000500000-0x0000000000515000-memory.dmp

    Filesize

    84KB

  • memory/2016-0-0x0000000000500000-0x0000000000515000-memory.dmp

    Filesize

    84KB

  • memory/2016-18-0x00000000002A0000-0x00000000002A8000-memory.dmp

    Filesize

    32KB

  • memory/2016-42-0x0000000000500000-0x0000000000515000-memory.dmp

    Filesize

    84KB

  • memory/2016-72-0x0000000000500000-0x0000000000515000-memory.dmp

    Filesize

    84KB

  • memory/2016-44-0x0000000000500000-0x0000000000515000-memory.dmp

    Filesize

    84KB

  • memory/2016-8-0x00000000002A0000-0x00000000002A8000-memory.dmp

    Filesize

    32KB

  • memory/2016-82-0x0000000000500000-0x0000000000515000-memory.dmp

    Filesize

    84KB

  • memory/2016-247-0x0000000000500000-0x0000000000515000-memory.dmp

    Filesize

    84KB

  • memory/2016-4-0x00000000002A0000-0x00000000002A8000-memory.dmp

    Filesize

    32KB

  • memory/2016-65-0x0000000000500000-0x0000000000515000-memory.dmp

    Filesize

    84KB

  • memory/2016-77-0x0000000000500000-0x0000000000515000-memory.dmp

    Filesize

    84KB

  • memory/2016-70-0x0000000000500000-0x0000000000515000-memory.dmp

    Filesize

    84KB

  • memory/2388-26-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2388-71-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2388-73-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2388-66-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2388-78-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2388-54-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2388-83-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2388-85-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2388-43-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2388-38-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2388-33-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2388-31-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2388-21-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2388-20-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2388-11-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2388-248-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB