Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    139s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10/09/2024, 06:30

General

  • Target

    d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe

  • Size

    330KB

  • MD5

    d7b7879e0c28036feeb864c103a95a72

  • SHA1

    d69e28e3786eb960eea26ffaee46f67ec5f978cb

  • SHA256

    557f14fbb46192d0d95134d84963c70f22f81757f41200c2dc9cafcbaa7435fe

  • SHA512

    573b1eeee8fd2d03fe9f6ccab4868f9941a537cb3d09fe588106f7daf3d839aa38160f6314bf99071bac288795f4e1d6831118c0ea8e31d6e9cd4612096188b7

  • SSDEEP

    6144:NNXIq0JjQba44/qmsuBS1UURwdBPUVw3ejO+gGrRnOs6:rXzxbjmJBS1oPJOS+gGr2

Malware Config

Extracted

Family

emotet

Botnet

Epoch2

C2

173.91.11.142:80

47.6.15.79:80

47.6.15.79:443

37.59.24.177:8080

66.34.201.20:7080

108.179.206.219:8080

45.56.88.91:443

101.187.134.207:443

1.33.230.137:80

110.143.57.109:80

108.191.2.72:80

47.156.70.145:80

167.71.10.37:8080

190.226.44.20:21

74.105.102.97:8080

190.147.215.53:22

24.45.193.161:7080

70.175.171.251:80

138.59.177.106:443

12.176.19.218:80

rsa_pubkey.plain

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 21 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Users\Admin\AppData\Local\Temp\d7b7879e0c28036feeb864c103a95a72_JaffaCakes118.exe
      --8484646f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of SetWindowsHookEx
      PID:2604
  • C:\Windows\SysWOW64\deploytexas.exe
    "C:\Windows\SysWOW64\deploytexas.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2052
    • C:\Windows\SysWOW64\deploytexas.exe
      --5405648
      2⤵
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2604-7-0x0000000000260000-0x0000000000277000-memory.dmp

    Filesize

    92KB

  • memory/2604-16-0x0000000000400000-0x0000000000459000-memory.dmp

    Filesize

    356KB

  • memory/2888-18-0x0000000000370000-0x0000000000387000-memory.dmp

    Filesize

    92KB

  • memory/3056-0-0x00000000004E0000-0x00000000004F7000-memory.dmp

    Filesize

    92KB

  • memory/3056-5-0x0000000000260000-0x0000000000271000-memory.dmp

    Filesize

    68KB