Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 10:18

General

  • Target

    c085a92187e2c7d5fcdc82ed4668134f_JaffaCakes118.exe

  • Size

    576KB

  • MD5

    c085a92187e2c7d5fcdc82ed4668134f

  • SHA1

    38aa9c6fde946645d57c6a4d48f7de005711e8c7

  • SHA256

    1a7ff8b17d703d84698d653da808832d3d81b946c5ed606f0e3d4676c1bd99d6

  • SHA512

    cbcfd3038838d4d63568873f6a6750ef27683a4f9271621a86f66b5feb86c725051dbacff2bdcb00ff664338b0a4165f519f011ef0d71a4302c5ffd222290276

  • SSDEEP

    12288:CCy5tfAtuLEl0EccdMpwq6Fp/V2GjsxuNYtXoXHdbHRZ6U+SLfwyM5:YtotuLERcWMpBk/V2GoIOoXdbxZbfwJ5

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c085a92187e2c7d5fcdc82ed4668134f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c085a92187e2c7d5fcdc82ed4668134f_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:1356
    • C:\Users\Admin\AppData\Local\Temp\CloudTool.exe
      "C:\Users\Admin\AppData\Local\Temp\CloudTool.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:3048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsdA823.tmp\ioSpecial.ini

    Filesize

    522B

    MD5

    f5b943919d8dd43e84fcf1b1e0d1a511

    SHA1

    bcd05aa5d91bbdaa9f8ec97ef047d501134474ff

    SHA256

    45cda9270b3702639472395a832c8c227caf2bfeb5bfb4f9bf4c1a3e2017eeef

    SHA512

    803f8247b02406cbde9f268d03588d4516e24fe1f621338bf6928ccb295dddfce7988ac3431b532e591239476c01dcc2cb3007916066ddd6e8ecfcce72327453

  • \Users\Admin\AppData\Local\Temp\CloudTool.exe

    Filesize

    36KB

    MD5

    a40faf9512cdbded5be40e9954a58ad1

    SHA1

    94e24873d2e1d9f33e159fb867bbf318540998dc

    SHA256

    fb4b443998ccf4c9a16770b8259185e1f587e96227391a2e0526615cf90b9d2f

    SHA512

    b84625080250cde14f3b3b7519ffbfdb1a13065d0a12685f192be9e391ac279d699e4c8584f7d36d30e2cabdff280f66e2cc5e112f49b04f1dcde46a9b0d44fe

  • \Users\Admin\AppData\Local\Temp\nsdA823.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    107737e3282fefd85684f2fa3df6d1c3

    SHA1

    3befbcae116a644ae28cebdc1d7dfe6be5c8ca5f

    SHA256

    21042be362d4073053bffcc90511b3ecf77902243525b56bb159581b5ece43a0

    SHA512

    439ac2f3066902e08d63dc3061f55063089857e765feb29fe47ba5819a9bebdff3fe2fe55fc8bfcfddb729d340f006ee95b5aa4422d712f9dcc07cc02ec410b4