Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 06:18

General

  • Target

    d144276564e42a5f6e5659c239c44084_JaffaCakes118.exe

  • Size

    494KB

  • MD5

    d144276564e42a5f6e5659c239c44084

  • SHA1

    d9c984a7e14fb1a0286f60f9a48edd27c1b637b8

  • SHA256

    bbd6ab9b45768fc524009df808635974bead3e79d887de6fd73fc84ac9c7dac6

  • SHA512

    05a6e17c56d95cba81e44e8c93448e1f2c60db82213092f443a157a34bbc5528b0b75618544278b28886727cd81d4aadfacf2a9d88d273822f39ae7b3762f0d3

  • SSDEEP

    6144:wWt1qBqBc0Agdj4Xz3c1OsOIZmwtweGUfT3w8M7pvi0hTaKohdS7b6l+RGY12Ak7:nt1qBKd24XdZmowMNCvi0TeXS71ZUAk7

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d144276564e42a5f6e5659c239c44084_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d144276564e42a5f6e5659c239c44084_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:876
    • C:\Users\Admin\AppData\Local\Temp\BiffBot2a.exe
      "C:\Users\Admin\AppData\Local\Temp\\BiffBot2a.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2096
      • C:\Windows\temp\TibiaBoT.exe
        "C:\Windows\temp\TibiaBoT.exe"
        3⤵
        • Executes dropped EXE
        PID:2640
      • C:\Windows\temp\BiffBot.exe
        "C:\Windows\temp\BiffBot.exe"
        3⤵
        • Executes dropped EXE
        PID:2252

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\BiffBot2a.exe

    Filesize

    321KB

    MD5

    8c7600127b2584dba97050fddc3cd1f1

    SHA1

    9fec0af2af8290c486395e065e3be8e385ebd3f4

    SHA256

    5d034b4e3eacd41bd7155498ff6a8cb0ac355b9bf2c7fc85870182da00dbac76

    SHA512

    80b56aace544503267f7cafc3da41b0b52c23f80e4555be92c66de0f743d1b6900df055c7f3d3abbe059c3094d9bae0c85db4391c8ac813a016127b727754495

  • \Windows\Temp\BiffBot.exe

    Filesize

    485KB

    MD5

    10dff69269aa2fdda505d37e93f2e190

    SHA1

    a8bba23298384539cdba3851178473dde14599cf

    SHA256

    dfbef6e1f4d8d04731bc3b5ac10fd75ee21240dd1328a7aa4c88f4188f62d109

    SHA512

    ce3e0eddf03be16816951569a9beb0bfefc6762ea66c9f57db6002042016d3b24e258f62a037ce4461808a7dbeafe6aade3fb7291c3ca74a037d4b64703dfe19

  • \Windows\Temp\TibiaBoT.exe

    Filesize

    208KB

    MD5

    548820d1a0f4aa38c43893cd41f15eea

    SHA1

    12c7bac058f67096ca12beb277603e13315b2ae5

    SHA256

    8e08c5b42d51af4e62a4b8cee5cb40766403e9daed8d92c42aa83a891268c813

    SHA512

    a996fec0cb5f44f57876beff582b35bb796b16f2a8d9b776b7ef9645f41c64e8a077646a8cf9142b9f165399e1af479a0d1605c6cf111c68d80fe77e222e2bfe

  • memory/2096-33-0x0000000000400000-0x0000000000457000-memory.dmp

    Filesize

    348KB

  • memory/2252-35-0x0000000000400000-0x0000000000481000-memory.dmp

    Filesize

    516KB