Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2024, 12:25

General

  • Target

    da5815229e3549e953f618290ffc6101_JaffaCakes118.exe

  • Size

    780KB

  • MD5

    da5815229e3549e953f618290ffc6101

  • SHA1

    91c3e33569519ecd784e638a136648b8a9b8202d

  • SHA256

    d193b4b87cfab1cef8c1c6fc1c31be3a2446c864576d70fdc43c5e07d12e8822

  • SHA512

    ac0c50b60716300a4a51878ef4d32767cc692221580b5401d9a0f3cd43d258cc6c29fd675d4a206ce6c580801858b27d32a3a2f4124851caa013de6bb96fdb48

  • SSDEEP

    12288:HPFdPZdPzPFdPGPFdPZdPzPFdPbPFdPZdPzPFdPkSDyTFtj:oDyTFtj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 12 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da5815229e3549e953f618290ffc6101_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\da5815229e3549e953f618290ffc6101_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\Users\Admin\AppData\Local\Temp\tmp259431004.exe
      C:\Users\Admin\AppData\Local\Temp\tmp259431004.exe
      2⤵
      • Executes dropped EXE
      PID:2532
    • C:\Users\Admin\AppData\Local\Temp\tmp259431019.exe
      C:\Users\Admin\AppData\Local\Temp\tmp259431019.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2112
      • C:\Users\Admin\AppData\Local\Temp\tmp259431051.exe
        C:\Users\Admin\AppData\Local\Temp\tmp259431051.exe
        3⤵
        • Executes dropped EXE
        PID:2800
      • C:\Users\Admin\AppData\Local\Temp\tmp259431066.exe
        C:\Users\Admin\AppData\Local\Temp\tmp259431066.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2260
        • C:\Users\Admin\AppData\Local\Temp\tmp259431129.exe
          C:\Users\Admin\AppData\Local\Temp\tmp259431129.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:2820
        • C:\Users\Admin\AppData\Local\Temp\tmp259431144.exe
          C:\Users\Admin\AppData\Local\Temp\tmp259431144.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp259431019.exe

    Filesize

    542KB

    MD5

    2dbada53290f4b28419f0198679e5f22

    SHA1

    4942592f23d8501caa8563c28ac70aca59b3f835

    SHA256

    3dbefebc77457a0c1f321e3832102d9cf7db8ddf96786202adc2b0e5ca9c2d64

    SHA512

    cc466f14d34821b0371c4acd599805a19eb4f09760b868a03bd282cdf14c114e4555293579bf41880cf528380111e2da4d8b0ee6f423a0718060fc68da67c60b

  • C:\Users\Admin\AppData\Local\Temp\tmp259431066.exe

    Filesize

    305KB

    MD5

    237eaebde2ea814dcfd996a9c5bd3ff6

    SHA1

    1e74545e9fefb614faba180324d98eeda1b8f4bf

    SHA256

    8ae1cf58e310b4429746c1c2b05f78e5abab08f80abc2cecae870fe5a74757b0

    SHA512

    82db6064b357cef2188b983966928045e7c1ac2e185d49c4ed0d50c693a45c6e05986f4727898b7b07893ae65eaa0c060d1e9104f5cefd43133c124e9e994d37

  • C:\Users\Admin\AppData\Local\Temp\tmp259431144.exe

    Filesize

    67KB

    MD5

    5e28284f9b5f9097640d58a73d38ad4c

    SHA1

    7a90f8b051bc82cc9cadbcc9ba345ced02891a6c

    SHA256

    865f34fe7ba81e9622ddbdfc511547d190367bbf3dad21ceb6da3eec621044f5

    SHA512

    cb7218cfea8813ae8c7acf6f7511aecbeb9d697986e0eb8538065bf9e3e9c6ced9c29270eb677f5acf08d2e94b21018d8c4a376aa646fa73ce831fc87d448934

  • \Users\Admin\AppData\Local\Temp\tmp259431004.exe

    Filesize

    226KB

    MD5

    85890e41c7606fbabd135bb6774c1018

    SHA1

    b711248f4ebfd81eb5910a06c256d59a50b28d8b

    SHA256

    e6651d21b6f63c9f46cdfc5edbc1a40e00ef864d0ba73a18be495af5c1a2118b

    SHA512

    83684c3e738707beec9ac5e712b863af3392c0e35d16e5ab4f9af79401343bd10b557c8ebfa52c412cd3755eb41cf027bc48a5e3c21a916f9cd5f6844961dcae

  • memory/2112-22-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2112-41-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2260-42-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2260-61-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2384-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2384-20-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2532-62-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2800-63-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2820-77-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB