Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 06:13

General

  • Target

    c01f45b388120587360157238d37012c_JaffaCakes118.exe

  • Size

    48KB

  • MD5

    c01f45b388120587360157238d37012c

  • SHA1

    0e310081cc01beb28d853b0effa3fc2223016125

  • SHA256

    a842fa90e33d822cc543524b4ec673f209cb47d0867bff3e7f55798c3b7d950a

  • SHA512

    53246acc4f300f19a1c2f2264477fe07674daf5c9f17dbeb03c1fcaf77ec1d9700a6bad2fee8b5c18dc4b2b960a9f2ec864a115cf012da98b1d85a036e9f4b9a

  • SSDEEP

    768:MuQgGxPAYfGEQ66wFboTJ2bsVt3WiymY1PumaqGH:MP/e76/bg/Gi0m

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 5 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 4 IoCs
  • Modifies registry class 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c01f45b388120587360157238d37012c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c01f45b388120587360157238d37012c_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2676
    • C:\Windows\SysWOW64\w8673492.exe
      w8673492.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      PID:1932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\w8673492.exe

    Filesize

    8KB

    MD5

    1610130ae01504d8af5528306b664720

    SHA1

    77921754e3341e75dfe6b7d6b5b7895b9844d53e

    SHA256

    18d2c5c9f8d8b64a03ec2f9bf26e134b06f1922d300dc024909d269734c614e0

    SHA512

    d83afd61a82c6c8920335c10749f73a240d3f2bfe6870a2eef07ad63628f4e9e5d1cbd4ca73196d9a67cd6f7635bb1d9f0a564604694d421cc198ce691661dbd

  • memory/1932-10-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2676-3-0x0000000000230000-0x0000000000238000-memory.dmp

    Filesize

    32KB

  • memory/2676-17-0x0000000000230000-0x0000000000238000-memory.dmp

    Filesize

    32KB

  • memory/2676-18-0x0000000000230000-0x0000000000238000-memory.dmp

    Filesize

    32KB