Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 11:39

General

  • Target

    d44619f85bd0266f6f10934c63fdf9f0_JaffaCakes118.exe

  • Size

    693KB

  • MD5

    d44619f85bd0266f6f10934c63fdf9f0

  • SHA1

    b12296e0bb7b23a2ca1e4477423612c0f467bc21

  • SHA256

    acc585e40833418570437d353a72e3e39733afee873717d9c05050b51c95cdc3

  • SHA512

    9406d53d229ac3ab5d0fbbb29901ea06c6ba520fe65bdd16520e8c80092fa70d5eff6e3182c14b4c524664385c6009f2fb2e8dbf6229fabe93f1e8a7115490e5

  • SSDEEP

    12288:mAiOHgXaFEngCcWxZVwU5mOsxOtAFhyRD2F3Z4mxxlVr3ESWkogreslk:VHK/VwNOs4+FQF2QmX7LdWXgKsa

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d44619f85bd0266f6f10934c63fdf9f0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d44619f85bd0266f6f10934c63fdf9f0_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2604
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXE
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2656
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Windows\uninstal.bat
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1688
  • C:\Windows\windows\system32\svchost
    C:\Windows\windows\system32\svchost
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
      2⤵
        PID:2920

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\uninstal.bat

      Filesize

      164B

      MD5

      924ea7ae6df752587469376459875c51

      SHA1

      ec5fa69c7e5dcaf5b57eefadc4f25a8e4ae073e1

      SHA256

      46c715ac82d5774479b760757498ddb0b9f75cebc116a3da81f9e438bc9bbb09

      SHA512

      ea7b176a411b82faf5fcd785c67180f88f9ff28f7e24c4f4b49f8e7cdc99fb60e38722b61547a4291bdd2c56b3729045c2e8d4afbecfe03612ab0dd8a7b6ae35

    • \Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXE

      Filesize

      293KB

      MD5

      46f7852d3cb5e4c8a9b04c322ecfee63

      SHA1

      db7455f77826e9f8177f3ea4fbacd082720a7c2b

      SHA256

      ee4798b1ed193a63ac9bbcb29c18a8c986bda8ace0b7e60caff3e2e38e3e5e2d

      SHA512

      2bc21f4c412a735268baae125314edeb02d51dc4919bee2db620a40a0f53cae7315de4a29706912b050b295207c7cc9cd87490e64e6e76627854175dd6c4a813

    • memory/2484-76-0x0000000000400000-0x00000000004C6000-memory.dmp

      Filesize

      792KB

    • memory/2604-9-0x00000000002A0000-0x00000000002A1000-memory.dmp

      Filesize

      4KB

    • memory/2604-8-0x0000000003290000-0x0000000003291000-memory.dmp

      Filesize

      4KB

    • memory/2604-7-0x00000000002B0000-0x00000000002B1000-memory.dmp

      Filesize

      4KB

    • memory/2604-6-0x00000000003A0000-0x00000000003A1000-memory.dmp

      Filesize

      4KB

    • memory/2604-5-0x0000000000250000-0x0000000000251000-memory.dmp

      Filesize

      4KB

    • memory/2604-4-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB

    • memory/2604-3-0x00000000003B0000-0x00000000003B1000-memory.dmp

      Filesize

      4KB

    • memory/2604-2-0x0000000000280000-0x0000000000281000-memory.dmp

      Filesize

      4KB

    • memory/2604-1-0x0000000000340000-0x0000000000394000-memory.dmp

      Filesize

      336KB

    • memory/2604-0-0x0000000001000000-0x0000000001162000-memory.dmp

      Filesize

      1.4MB

    • memory/2604-41-0x0000000000430000-0x0000000000431000-memory.dmp

      Filesize

      4KB

    • memory/2604-40-0x0000000000B30000-0x0000000000B31000-memory.dmp

      Filesize

      4KB

    • memory/2604-39-0x0000000000B40000-0x0000000000B41000-memory.dmp

      Filesize

      4KB

    • memory/2604-38-0x0000000000AD0000-0x0000000000AD1000-memory.dmp

      Filesize

      4KB

    • memory/2604-37-0x0000000000AE0000-0x0000000000AE1000-memory.dmp

      Filesize

      4KB

    • memory/2604-36-0x0000000000B00000-0x0000000000B01000-memory.dmp

      Filesize

      4KB

    • memory/2604-35-0x0000000000B20000-0x0000000000B21000-memory.dmp

      Filesize

      4KB

    • memory/2604-34-0x0000000000400000-0x0000000000401000-memory.dmp

      Filesize

      4KB

    • memory/2604-33-0x0000000000AB0000-0x0000000000AB1000-memory.dmp

      Filesize

      4KB

    • memory/2604-32-0x0000000000440000-0x0000000000441000-memory.dmp

      Filesize

      4KB

    • memory/2604-31-0x0000000000A90000-0x0000000000A91000-memory.dmp

      Filesize

      4KB

    • memory/2604-30-0x00000000003E0000-0x00000000003E1000-memory.dmp

      Filesize

      4KB

    • memory/2604-29-0x00000000003F0000-0x00000000003F1000-memory.dmp

      Filesize

      4KB

    • memory/2604-28-0x0000000000AA0000-0x0000000000AA1000-memory.dmp

      Filesize

      4KB

    • memory/2604-27-0x0000000000410000-0x0000000000411000-memory.dmp

      Filesize

      4KB

    • memory/2604-43-0x0000000003280000-0x0000000003281000-memory.dmp

      Filesize

      4KB

    • memory/2604-42-0x0000000003280000-0x0000000003281000-memory.dmp

      Filesize

      4KB

    • memory/2604-26-0x0000000003280000-0x0000000003281000-memory.dmp

      Filesize

      4KB

    • memory/2604-25-0x0000000003280000-0x0000000003281000-memory.dmp

      Filesize

      4KB

    • memory/2604-24-0x0000000003280000-0x0000000003281000-memory.dmp

      Filesize

      4KB

    • memory/2604-23-0x0000000003280000-0x0000000003281000-memory.dmp

      Filesize

      4KB

    • memory/2604-22-0x0000000003290000-0x0000000003291000-memory.dmp

      Filesize

      4KB

    • memory/2604-21-0x0000000003290000-0x0000000003291000-memory.dmp

      Filesize

      4KB

    • memory/2604-45-0x0000000001000000-0x0000000001162000-memory.dmp

      Filesize

      1.4MB

    • memory/2604-44-0x0000000003280000-0x0000000003281000-memory.dmp

      Filesize

      4KB

    • memory/2604-49-0x0000000003280000-0x0000000003281000-memory.dmp

      Filesize

      4KB

    • memory/2604-48-0x0000000003280000-0x0000000003281000-memory.dmp

      Filesize

      4KB

    • memory/2604-47-0x0000000000340000-0x0000000000394000-memory.dmp

      Filesize

      336KB

    • memory/2604-46-0x0000000003280000-0x0000000003281000-memory.dmp

      Filesize

      4KB

    • memory/2604-20-0x0000000003290000-0x0000000003291000-memory.dmp

      Filesize

      4KB

    • memory/2604-19-0x0000000003290000-0x0000000003291000-memory.dmp

      Filesize

      4KB

    • memory/2604-18-0x0000000003290000-0x0000000003291000-memory.dmp

      Filesize

      4KB

    • memory/2604-17-0x0000000003290000-0x0000000003291000-memory.dmp

      Filesize

      4KB

    • memory/2604-16-0x0000000003290000-0x0000000003291000-memory.dmp

      Filesize

      4KB

    • memory/2604-15-0x0000000003290000-0x0000000003291000-memory.dmp

      Filesize

      4KB

    • memory/2604-14-0x0000000003290000-0x0000000003291000-memory.dmp

      Filesize

      4KB

    • memory/2604-13-0x0000000003290000-0x0000000003291000-memory.dmp

      Filesize

      4KB

    • memory/2604-12-0x0000000003290000-0x0000000003291000-memory.dmp

      Filesize

      4KB

    • memory/2604-11-0x00000000003C0000-0x00000000003C1000-memory.dmp

      Filesize

      4KB

    • memory/2604-10-0x0000000003290000-0x0000000003291000-memory.dmp

      Filesize

      4KB

    • memory/2604-74-0x0000000000340000-0x0000000000394000-memory.dmp

      Filesize

      336KB

    • memory/2604-73-0x0000000001000000-0x0000000001162000-memory.dmp

      Filesize

      1.4MB

    • memory/2656-71-0x0000000000400000-0x00000000004C6000-memory.dmp

      Filesize

      792KB