Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    06/09/2024, 17:42

General

  • Target

    d01a7969e442f29a4f677c1a2fd702af_JaffaCakes118.exe

  • Size

    22KB

  • MD5

    d01a7969e442f29a4f677c1a2fd702af

  • SHA1

    070d960205816a261001fa0aed84dd3884e28099

  • SHA256

    c837308f5d10f2aca13d49e27a415967bdf3c082cab5989ff2d668733a060713

  • SHA512

    13232ab08f3394234b9d30878c1048c852e35e7b354671cd4cbdf316664bceb69ad3d4ab666ed32c41c1c5822309bee9d6a1ec6e3b3cf11e8d79552e82f2057f

  • SSDEEP

    384:JbCEXMMADQIrUeNFwx9E5xtT6fkCMst8AdxIiv4dK8y8KG8szTO4Am7UnwtzwGqy:R1NAUsbxtT6sFst/3IrdlLUw2QLnbcuS

Score
7/10

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 44 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 50 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d01a7969e442f29a4f677c1a2fd702af_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d01a7969e442f29a4f677c1a2fd702af_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\2A0.tmp\KingPatchByBazuka.bat""
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of WriteProcessMemory
      PID:2176
      • C:\Windows\SysWOW64\notepad.exe
        notepad.exe
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2064
      • C:\Windows\SysWOW64\write.exe
        write.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2688
        • C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe
          "C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2664
          • C:\Windows\splwow64.exe
            C:\Windows\splwow64.exe 12288
            5⤵
              PID:2200
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2572
        • C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE
          "C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2288
        • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
          "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"
          3⤵
          • System Location Discovery: System Language Discovery
          • Enumerates system info in registry
          • Suspicious use of SetWindowsHookEx
          PID:2068
        • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
          "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"
          3⤵
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious use of SetWindowsHookEx
          PID:2788
        • C:\Windows\SysWOW64\notepad.exe
          notepad.exe
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1688
        • C:\Windows\SysWOW64\write.exe
          write.exe
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2044
          • C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe
            "C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:1304
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1300
        • C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE
          "C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          PID:1708
        • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
          "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"
          3⤵
          • System Location Discovery: System Language Discovery
          • Enumerates system info in registry
          • Suspicious use of SetWindowsHookEx
          PID:2104
        • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
          "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2512
        • C:\Windows\SysWOW64\notepad.exe
          notepad.exe
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2772
        • C:\Windows\SysWOW64\write.exe
          write.exe
          3⤵
          • System Location Discovery: System Language Discovery
          PID:3000
          • C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe
            "C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2848
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1732
        • C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE
          "C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1572
        • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
          "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"
          3⤵
          • System Location Discovery: System Language Discovery
          • Enumerates system info in registry
          • Suspicious use of SetWindowsHookEx
          PID:1824
        • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
          "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:676
        • C:\Windows\SysWOW64\notepad.exe
          notepad.exe
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2500
        • C:\Windows\SysWOW64\write.exe
          write.exe
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2096
          • C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe
            "C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:1588
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1876
        • C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE
          "C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2316
        • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
          "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"
          3⤵
          • System Location Discovery: System Language Discovery
          • Enumerates system info in registry
          • Suspicious use of SetWindowsHookEx
          PID:1776
        • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
          "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2992
        • C:\Windows\SysWOW64\notepad.exe
          notepad.exe
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1472
        • C:\Windows\SysWOW64\write.exe
          write.exe
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2660
          • C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe
            "C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2892
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2228
        • C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE
          "C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2148
        • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
          "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"
          3⤵
          • System Location Discovery: System Language Discovery
          • Enumerates system info in registry
          • Suspicious use of SetWindowsHookEx
          PID:3036
        • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
          "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2240
        • C:\Windows\SysWOW64\notepad.exe
          notepad.exe
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2236
        • C:\Windows\SysWOW64\write.exe
          write.exe
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2224
          • C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe
            "C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2432
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2328
        • C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE
          "C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:1660
        • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
          "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"
          3⤵
          • System Location Discovery: System Language Discovery
          • Enumerates system info in registry
          • Suspicious use of SetWindowsHookEx
          PID:1112
        • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
          "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:860

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\2A0.tmp\KingPatchByBazuka.bat

      Filesize

      202B

      MD5

      32579218473666d775e9bf7bccd4674c

      SHA1

      e58a8922cc7541b5fec246a665839e4801ae3dd4

      SHA256

      2944fba0434f1157cf80071cd18d3519a2885bc648e82de0a43a80c37c6ba0a6

      SHA512

      c1fa40990be97c3c37ac6fcdf790bbab58cba9c2abe404751b8c89f8f22a5b36c96bb3c5f573e633d693275d727c3f0bb7306e74d5bd052ca61cc1538862790d

    • C:\Users\Admin\AppData\Local\Temp\624C968.tmp

      Filesize

      40B

      MD5

      a27bb50a192efc0d703c4fb08dabec41

      SHA1

      5e20f3412143302969a6acb8ae3a1a0172ce183c

      SHA256

      187eface3bb704f41dcb5d11d76311ea833eb319f0bd6bb275e084d636e446d6

      SHA512

      c62d4ebc951b1ee86116050961b1af2fcd3eced630b752b93e27c669205f6abfec35ba102e518fe98105788d07c381ce716d15fd138d771bfa73c02dcd2ea6eb

    • memory/2180-0-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/2180-23-0x0000000000400000-0x0000000000410000-memory.dmp

      Filesize

      64KB

    • memory/2288-103-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2788-86-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB