Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10/09/2024, 08:48 UTC

General

  • Target

    d7eabb8fb469e0e8b053853b252f427c_JaffaCakes118.exe

  • Size

    668KB

  • MD5

    d7eabb8fb469e0e8b053853b252f427c

  • SHA1

    2b2148eff462328b07cde2b264beadb20474c5c1

  • SHA256

    6848c4f81ae702a78cce5e189e44df165d2e88acb1dc0d1378d6486fdab3041e

  • SHA512

    e675c1049975be884ae718b23c8137a7c63863211f25e252d2cac4cbe7fd4833d8fac3b02f4a23d14c4d606fe17e502d7d73b1476c80ad9ef20f039c35a97cc8

  • SSDEEP

    6144:gdiE4zqXVY7PfBHnzA0F3JhJx4eS5rNMTy5fkLaMiLgLWL7SqaaYo5wzPLNQOIeG:gdw7hHnzAe3oe6rZ6zEPaexL62

Malware Config

Extracted

Family

emotet

Botnet

Epoch1

C2

202.22.141.45:80

37.187.161.206:8080

202.29.239.162:443

80.87.201.221:7080

82.76.111.249:443

216.47.196.104:80

192.241.143.52:8080

192.81.38.31:80

87.106.253.248:8080

64.201.88.132:80

192.241.146.84:8080

12.162.84.2:8080

1.226.84.243:8080

177.129.17.170:443

202.134.4.210:7080

70.169.17.134:80

152.169.22.67:80

5.196.35.138:7080

138.97.60.141:7080

203.205.28.68:80

rsa_pubkey.plain
1
-----BEGIN PUBLIC KEY-----
2
MHwwDQYJKoZIhvcNAQEBBQADawAwaAJhAOZ9fLJ8UrI0OZURpPsR3eijAyfPj3z6
3
uS75f2igmYFW2aWgNcFIzsAYQleKzD0nlCFHOo7Zf8/4wY2UW0CJ4dJEHnE/PHlz
4
6uNk3pxjm7o4eCDyiJbzf+k0Azjl0q54FQIDAQAB
5
-----END PUBLIC KEY-----

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Emotet payload 5 IoCs

    Detects Emotet payload in memory.

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d7eabb8fb469e0e8b053853b252f427c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d7eabb8fb469e0e8b053853b252f427c_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Windows\SysWOW64\ocsetapi\NAPSTAT.exe
      "C:\Windows\SysWOW64\ocsetapi\NAPSTAT.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2456

Network

    No results found
  • 202.22.141.45:80
    NAPSTAT.exe
    152 B
    3
  • 202.22.141.45:80
    NAPSTAT.exe
    152 B
    3
  • 37.187.161.206:8080
    NAPSTAT.exe
    152 B
    3
  • 37.187.161.206:8080
    NAPSTAT.exe
    152 B
    3
  • 202.29.239.162:443
    NAPSTAT.exe
    152 B
    3
  • 202.29.239.162:443
    NAPSTAT.exe
    152 B
    3
  • 80.87.201.221:7080
    NAPSTAT.exe
    104 B
    2
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ocsetapi\NAPSTAT.exe

    Filesize

    668KB

    MD5

    d7eabb8fb469e0e8b053853b252f427c

    SHA1

    2b2148eff462328b07cde2b264beadb20474c5c1

    SHA256

    6848c4f81ae702a78cce5e189e44df165d2e88acb1dc0d1378d6486fdab3041e

    SHA512

    e675c1049975be884ae718b23c8137a7c63863211f25e252d2cac4cbe7fd4833d8fac3b02f4a23d14c4d606fe17e502d7d73b1476c80ad9ef20f039c35a97cc8

  • memory/2456-14-0x0000000000320000-0x0000000000330000-memory.dmp

    Filesize

    64KB

  • memory/2456-10-0x0000000000300000-0x0000000000312000-memory.dmp

    Filesize

    72KB

  • memory/2792-7-0x00000000002E0000-0x00000000002EF000-memory.dmp

    Filesize

    60KB

  • memory/2792-4-0x0000000000310000-0x0000000000320000-memory.dmp

    Filesize

    64KB

  • memory/2792-0-0x00000000002F0000-0x0000000000302000-memory.dmp

    Filesize

    72KB

  • memory/2792-9-0x0000000000400000-0x00000000004AB000-memory.dmp

    Filesize

    684KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.