Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    28/08/2024, 18:56 UTC

General

  • Target

    c77382d72cfc3f7f5a839c236824ac1a_JaffaCakes118.exe

  • Size

    548KB

  • MD5

    c77382d72cfc3f7f5a839c236824ac1a

  • SHA1

    a6d2b411fc355e40c702f338690caf56ffac238c

  • SHA256

    49e4127a3b79e7f02d77610a0c69e72c8477b33b8cb1950285f6ad0b6b1b74fa

  • SHA512

    3f89d4dfef5466fbd2978f41d4dd0b33a3dce7144231ca763a43815e783e30511e94e2a56050547b6ec321753751e3cf372a05e2be084b1e7aaf75677ae85a1f

  • SSDEEP

    6144:qGY+Ja4T9/NOmfBI0Rfnpf0M970Kh6JfQpN4vI:qGY+8W9/I0JZSK70F1QP4A

Malware Config

Extracted

Family

azorult

C2

http://worldatdoor.in/linkguy/32/index.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c77382d72cfc3f7f5a839c236824ac1a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c77382d72cfc3f7f5a839c236824ac1a_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:3052
    • C:\Users\Admin\AppData\Local\Temp\c77382d72cfc3f7f5a839c236824ac1a_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\c77382d72cfc3f7f5a839c236824ac1a_JaffaCakes118.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2564

Network

  • flag-us
    DNS
    worldatdoor.in
    c77382d72cfc3f7f5a839c236824ac1a_JaffaCakes118.exe
    Remote address:
    8.8.8.8:53
    Request
    worldatdoor.in
    IN A
    Response
  • flag-us
    DNS
    worldatdoor.in
    c77382d72cfc3f7f5a839c236824ac1a_JaffaCakes118.exe
    Remote address:
    8.8.8.8:53
    Request
    worldatdoor.in
    IN A
    Response
  • flag-us
    DNS
    worldatdoor.in
    c77382d72cfc3f7f5a839c236824ac1a_JaffaCakes118.exe
    Remote address:
    8.8.8.8:53
    Request
    worldatdoor.in
    IN A
    Response
  • flag-us
    DNS
    worldatdoor.in
    c77382d72cfc3f7f5a839c236824ac1a_JaffaCakes118.exe
    Remote address:
    8.8.8.8:53
    Request
    worldatdoor.in
    IN A
    Response
  • flag-us
    DNS
    worldatdoor.in
    c77382d72cfc3f7f5a839c236824ac1a_JaffaCakes118.exe
    Remote address:
    8.8.8.8:53
    Request
    worldatdoor.in
    IN A
    Response
  • flag-us
    DNS
    worldatdoor.in
    c77382d72cfc3f7f5a839c236824ac1a_JaffaCakes118.exe
    Remote address:
    8.8.8.8:53
    Request
    worldatdoor.in
    IN A
    Response
No results found
  • 8.8.8.8:53
    worldatdoor.in
    dns
    c77382d72cfc3f7f5a839c236824ac1a_JaffaCakes118.exe
    180 B
    180 B
    3
    3

    DNS Request

    worldatdoor.in

    DNS Request

    worldatdoor.in

    DNS Request

    worldatdoor.in

  • 8.8.8.8:53
    worldatdoor.in
    dns
    c77382d72cfc3f7f5a839c236824ac1a_JaffaCakes118.exe
    180 B
    180 B
    3
    3

    DNS Request

    worldatdoor.in

    DNS Request

    worldatdoor.in

    DNS Request

    worldatdoor.in

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2564-24-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2564-25-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/3052-12-0x0000000000330000-0x0000000000331000-memory.dmp

    Filesize

    4KB

  • memory/3052-16-0x0000000000330000-0x0000000000331000-memory.dmp

    Filesize

    4KB

  • memory/3052-20-0x0000000000330000-0x0000000000331000-memory.dmp

    Filesize

    4KB

  • memory/3052-19-0x0000000000330000-0x0000000000331000-memory.dmp

    Filesize

    4KB

  • memory/3052-18-0x0000000000330000-0x0000000000331000-memory.dmp

    Filesize

    4KB

  • memory/3052-17-0x0000000000330000-0x0000000000331000-memory.dmp

    Filesize

    4KB

  • memory/3052-11-0x0000000000330000-0x0000000000331000-memory.dmp

    Filesize

    4KB

  • memory/3052-15-0x0000000000330000-0x0000000000331000-memory.dmp

    Filesize

    4KB

  • memory/3052-14-0x0000000000330000-0x0000000000331000-memory.dmp

    Filesize

    4KB

  • memory/3052-13-0x0000000000330000-0x0000000000331000-memory.dmp

    Filesize

    4KB

  • memory/3052-21-0x0000000000330000-0x0000000000331000-memory.dmp

    Filesize

    4KB

  • memory/3052-0-0x00000000001E0000-0x00000000001E5000-memory.dmp

    Filesize

    20KB

  • memory/3052-6-0x0000000000330000-0x0000000000331000-memory.dmp

    Filesize

    4KB

  • memory/3052-9-0x0000000000330000-0x0000000000331000-memory.dmp

    Filesize

    4KB

  • memory/3052-8-0x0000000000330000-0x0000000000331000-memory.dmp

    Filesize

    4KB

  • memory/3052-7-0x0000000000330000-0x0000000000331000-memory.dmp

    Filesize

    4KB

  • memory/3052-10-0x0000000000330000-0x0000000000331000-memory.dmp

    Filesize

    4KB

  • memory/3052-5-0x0000000000330000-0x0000000000331000-memory.dmp

    Filesize

    4KB

  • memory/3052-4-0x0000000000330000-0x0000000000331000-memory.dmp

    Filesize

    4KB

  • memory/3052-3-0x0000000000330000-0x0000000000331000-memory.dmp

    Filesize

    4KB

  • memory/3052-2-0x0000000000330000-0x0000000000331000-memory.dmp

    Filesize

    4KB

  • memory/3052-1-0x0000000000330000-0x0000000000331000-memory.dmp

    Filesize

    4KB

  • memory/3052-22-0x00000000004C0000-0x00000000004C1000-memory.dmp

    Filesize

    4KB

  • memory/3052-23-0x00000000004C0000-0x00000000004C1000-memory.dmp

    Filesize

    4KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.