Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2024, 11:19

General

  • Target

    da3b94ac9e6dbdbb88c84819a33fc680_JaffaCakes118.exe

  • Size

    263KB

  • MD5

    da3b94ac9e6dbdbb88c84819a33fc680

  • SHA1

    92d611fd217babc9d14831ca637128ba9d177ef9

  • SHA256

    0768c8a7de1114a2f2a87f4ac82f2bf5ff635b0836f252db3e4e742daaa6995d

  • SHA512

    acfceab04ae76d14d319d0ce1a989bf6f4f4bc166bf9eb22b5ed538b578602bb53ab701f3a5da55273d3089e613c5a7ae045dabf19ea8f28a974507e1fccd4ba

  • SSDEEP

    6144:hHw5ZGVhkfpf5w1ihCAEaHTsWGLPN9jOsa0uxii:hGZykBfe1iIAlHIbPjbuxz

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da3b94ac9e6dbdbb88c84819a33fc680_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\da3b94ac9e6dbdbb88c84819a33fc680_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Modifies WinLogon
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\EB7B.tmp

    Filesize

    2B

    MD5

    715900fdef28ea37f92ab726f39177df

    SHA1

    1d7a6e4b74e7aa24d2cd4a101baf22406530bf53

    SHA256

    dba4a40f11ec80d728a1341730bdf0b50b82c2f47e6af8a1c4137eb631d25065

    SHA512

    c60f6a3403be561ab33c2ad1c150c3d6e48754a0167899d1b994ecc0e33abfe11cd09cf20098dc84f0a21f7b61242e423e968b97defc627347fd784bee9136c4

  • C:\Users\Admin\AppData\Local\Temp\EF61.tmp

    Filesize

    11KB

    MD5

    95bc488965ac58ee4de695734faefd40

    SHA1

    37a944adade721a8c1d64538d4700a703f64c75d

    SHA256

    d17a861ffdf3b5b995bc4881fcbd4a46b1679068eb6cd9ac49c27571081c61d3

    SHA512

    ad551cb67e0d92f203fe46dda8dbb764f9778a10509d6641fcd6b4d1ba2cf39462a464b3c048e88d7318d39a89ee1068ed7af87525cc9efae7e16e1f498a8ec3

  • memory/2708-56-0x0000000002B50000-0x0000000002C16000-memory.dmp

    Filesize

    792KB

  • memory/2708-62-0x0000000002B50000-0x0000000002C16000-memory.dmp

    Filesize

    792KB

  • memory/2708-14-0x0000000002990000-0x0000000002A4F000-memory.dmp

    Filesize

    764KB

  • memory/2708-15-0x0000000000400000-0x00000000004E9000-memory.dmp

    Filesize

    932KB

  • memory/2708-10-0x0000000002990000-0x0000000002A4F000-memory.dmp

    Filesize

    764KB

  • memory/2708-8-0x0000000002990000-0x0000000002A4F000-memory.dmp

    Filesize

    764KB

  • memory/2708-6-0x0000000002990000-0x0000000002A4F000-memory.dmp

    Filesize

    764KB

  • memory/2708-4-0x0000000002990000-0x0000000002A4F000-memory.dmp

    Filesize

    764KB

  • memory/2708-16-0x0000000002B50000-0x0000000002C16000-memory.dmp

    Filesize

    792KB

  • memory/2708-22-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/2708-20-0x0000000002B50000-0x0000000002C16000-memory.dmp

    Filesize

    792KB

  • memory/2708-21-0x0000000002B50000-0x0000000002C16000-memory.dmp

    Filesize

    792KB

  • memory/2708-18-0x0000000002B50000-0x0000000002C16000-memory.dmp

    Filesize

    792KB

  • memory/2708-55-0x0000000002B50000-0x0000000002C16000-memory.dmp

    Filesize

    792KB

  • memory/2708-12-0x0000000002990000-0x0000000002A4F000-memory.dmp

    Filesize

    764KB

  • memory/2708-1-0x00000000004F0000-0x0000000000559000-memory.dmp

    Filesize

    420KB

  • memory/2708-64-0x0000000002B50000-0x0000000002C16000-memory.dmp

    Filesize

    792KB

  • memory/2708-59-0x0000000002B50000-0x0000000002C16000-memory.dmp

    Filesize

    792KB

  • memory/2708-60-0x0000000002B50000-0x0000000002C16000-memory.dmp

    Filesize

    792KB

  • memory/2708-61-0x0000000002B50000-0x0000000002C16000-memory.dmp

    Filesize

    792KB

  • memory/2708-57-0x0000000002B50000-0x0000000002C16000-memory.dmp

    Filesize

    792KB

  • memory/2708-63-0x0000000002B50000-0x0000000002C16000-memory.dmp

    Filesize

    792KB

  • memory/2708-58-0x0000000002B50000-0x0000000002C16000-memory.dmp

    Filesize

    792KB

  • memory/2708-65-0x0000000002B50000-0x0000000002C16000-memory.dmp

    Filesize

    792KB

  • memory/2708-67-0x0000000002B50000-0x0000000002C16000-memory.dmp

    Filesize

    792KB

  • memory/2708-66-0x0000000002B50000-0x0000000002C16000-memory.dmp

    Filesize

    792KB

  • memory/2708-2-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2708-0-0x0000000000400000-0x00000000004E9000-memory.dmp

    Filesize

    932KB

  • memory/2708-149-0x00000000004F0000-0x0000000000559000-memory.dmp

    Filesize

    420KB

  • memory/2708-152-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB