Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    06/09/2024, 03:00

General

  • Target

    ce7ddf1676912f754b28a1b37fc4d487_JaffaCakes118.exe

  • Size

    651KB

  • MD5

    ce7ddf1676912f754b28a1b37fc4d487

  • SHA1

    1d232aaaf31ebcd159e0c9c1962786e44acd0730

  • SHA256

    e3903965449a046c8a1393923b52ec44f4a16806ed2e38b45749132ec2435ea3

  • SHA512

    d8147df81bae01925519a6750587c61f8019c239bc900901d260e37bd91f3088334cbfff272a623560311f4e681b79b1a6a8d4267491d49c45d6e89a0f5dae4b

  • SSDEEP

    12288:jdqxpICKDAor0R9cdc9X7XhA/jF3Z4mxx7sevT25iQp/x:kIZfYcdc9X7x6jQmXpe

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce7ddf1676912f754b28a1b37fc4d487_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ce7ddf1676912f754b28a1b37fc4d487_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:2972
  • C:\Windows\dfwfd
    C:\Windows\dfwfd
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\dfwfd

    Filesize

    651KB

    MD5

    ce7ddf1676912f754b28a1b37fc4d487

    SHA1

    1d232aaaf31ebcd159e0c9c1962786e44acd0730

    SHA256

    e3903965449a046c8a1393923b52ec44f4a16806ed2e38b45749132ec2435ea3

    SHA512

    d8147df81bae01925519a6750587c61f8019c239bc900901d260e37bd91f3088334cbfff272a623560311f4e681b79b1a6a8d4267491d49c45d6e89a0f5dae4b

  • memory/2936-30-0x0000000000400000-0x0000000000524000-memory.dmp

    Filesize

    1.1MB

  • memory/2936-26-0x0000000000400000-0x0000000000524000-memory.dmp

    Filesize

    1.1MB

  • memory/2936-25-0x0000000000400000-0x0000000000524000-memory.dmp

    Filesize

    1.1MB

  • memory/2936-21-0x0000000000400000-0x0000000000524000-memory.dmp

    Filesize

    1.1MB

  • memory/2972-14-0x00000000032E0000-0x00000000032E1000-memory.dmp

    Filesize

    4KB

  • memory/2972-5-0x0000000001D90000-0x0000000001D91000-memory.dmp

    Filesize

    4KB

  • memory/2972-12-0x0000000003290000-0x0000000003293000-memory.dmp

    Filesize

    12KB

  • memory/2972-11-0x00000000032A0000-0x00000000032A1000-memory.dmp

    Filesize

    4KB

  • memory/2972-10-0x0000000001DA0000-0x0000000001DA1000-memory.dmp

    Filesize

    4KB

  • memory/2972-9-0x0000000001E10000-0x0000000001E11000-memory.dmp

    Filesize

    4KB

  • memory/2972-8-0x0000000001DE0000-0x0000000001DE1000-memory.dmp

    Filesize

    4KB

  • memory/2972-7-0x0000000001DF0000-0x0000000001DF1000-memory.dmp

    Filesize

    4KB

  • memory/2972-6-0x0000000001D80000-0x0000000001D81000-memory.dmp

    Filesize

    4KB

  • memory/2972-0-0x0000000000400000-0x0000000000524000-memory.dmp

    Filesize

    1.1MB

  • memory/2972-4-0x0000000001E00000-0x0000000001E01000-memory.dmp

    Filesize

    4KB

  • memory/2972-3-0x0000000001DB0000-0x0000000001DB1000-memory.dmp

    Filesize

    4KB

  • memory/2972-2-0x0000000001DD0000-0x0000000001DD1000-memory.dmp

    Filesize

    4KB

  • memory/2972-15-0x00000000003E0000-0x00000000003E1000-memory.dmp

    Filesize

    4KB

  • memory/2972-16-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/2972-22-0x0000000000400000-0x0000000000524000-memory.dmp

    Filesize

    1.1MB

  • memory/2972-23-0x0000000001CC0000-0x0000000001D14000-memory.dmp

    Filesize

    336KB

  • memory/2972-17-0x00000000032B0000-0x00000000032B1000-memory.dmp

    Filesize

    4KB

  • memory/2972-13-0x0000000003390000-0x0000000003391000-memory.dmp

    Filesize

    4KB

  • memory/2972-1-0x0000000001CC0000-0x0000000001D14000-memory.dmp

    Filesize

    336KB