Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2024, 19:40

General

  • Target

    db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe

  • Size

    504KB

  • MD5

    db1798f61901861b25cc245b186cdbb4

  • SHA1

    2696aa22d06cd50cae69f6ef8081fb1311dee467

  • SHA256

    584e1f14fd8ce790f4656d6265bd560313cb8e5358572cf65abb7dbcfdc55f43

  • SHA512

    89d34195f7277094d005a46e881f377900b2a0d69a2d206a25405cf3e0b78494a7f0ffb13de5dbb7b8e0e3f30bdb594177accc63cfb94de1069f1af5f91d0c49

  • SSDEEP

    12288:GOwQmZiqb/i5t+V9iTCSvEMseLPcRnKb:GOdeIe9ih8Ms+PU

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 14 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Users\Admin\y26f0s.exe
      C:\Users\Admin\y26f0s.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2360
      • C:\Users\Admin\japek.exe
        "C:\Users\Admin\japek.exe"
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2900
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c tasklist&&del y26f0s.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2748
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          4⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:2816
    • C:\Users\Admin\apod.exe
      C:\Users\Admin\apod.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2820
      • C:\Users\Admin\apod.exe
        "C:\Users\Admin\apod.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:2744
    • C:\Users\Admin\dpod.exe
      C:\Users\Admin\dpod.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2660
    • C:\Users\Admin\epod.exe
      C:\Users\Admin\epod.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:592
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 592 -s 36
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2020
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c tasklist&&del db1798f61901861b25cc245b186cdbb4_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2572
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\apod.exe

    Filesize

    76KB

    MD5

    423c4a08989b956f40a58ac76d4b06ef

    SHA1

    e5f926bda675c1682a12df0033eacbcea1ed8b8c

    SHA256

    b2c621f8ca9704489c90a2fe87c7e5eb9ef247cef06a9b18708c8cd7a1b4e6c7

    SHA512

    b089470923a03f773749047688c9c315401da8590485f76d41589fcb3fbf045732e5f54e1297bdd6545575bb72c4cc4ba2d2ac2d7e64c4baab6a064f30a92b43

  • \Users\Admin\dpod.exe

    Filesize

    36KB

    MD5

    3f33e061a2ed4b19f8b837cc9798ba4b

    SHA1

    5e3a078de37dc896a657cb0a09f13394f5bd2715

    SHA256

    82b7ebb533cebb3bb671625ba65e41755ecad1c8e7b6ec7f9a8f4a549aac1a79

    SHA512

    2ef0c88aa69b8015db4773eaf5332a16464d6c502376c3edb88fa2c3b81aa135e42581f5384ecadd5964cf12abbc263af5841ba2322f8cb9d5f10e92fd0f52e5

  • \Users\Admin\epod.exe

    Filesize

    38.2MB

    MD5

    8cfe12dd15348f83ebb0dda02d58c62b

    SHA1

    f1b48f88d9c914194db33c6ea981d19065995b77

    SHA256

    7804c3ee7c1b9715b8fc2e968f0be985a4803a4b3c6c30d823c28f9454809527

    SHA512

    af1aec5eab02daa7836304e264b73ae4df1859de92c4e26045a9095e1578e0d7dcf65aaf92072ea399e4e7f47154ee8b3b0945e8fe9385731af9eea14feca8ba

  • \Users\Admin\japek.exe

    Filesize

    340KB

    MD5

    0f25e6b1a8b4bac518ba119befac7dbe

    SHA1

    dce30251eb3b2e6d18403fc02e13bb64739411a3

    SHA256

    987602a3fb5432ebdb26a8b37c4a970f93abc07ad8c8105f29475ac443d36f30

    SHA512

    764815fa05e582a969ebe43c95bbdc523b9d05342360c7a096b1d9a5063ae4c99a4af204febbfaeda0c81fbdd640966de82b228aa61a07c8d9f40b4ab1cf3537

  • \Users\Admin\y26f0s.exe

    Filesize

    340KB

    MD5

    cd821a611d07ae0237546cd00fa6752f

    SHA1

    9cf66009462749c884320a43261af67e44688380

    SHA256

    977facc689d0653837ba70a93147f6fb512031d25c4e8991b93672d57289c01a

    SHA512

    f0a2328b2bd3f61593cbfc76cea146bcf7fa9eb69e192dd5cfbaaa40bab2632c3222af0ebf410567020c4a05748192a766d78f460ec90db96d04ac4a43bae719

  • memory/2360-28-0x0000000003710000-0x00000000041CA000-memory.dmp

    Filesize

    10.7MB

  • memory/2744-43-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2744-41-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2744-39-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2744-51-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2744-50-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2744-49-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2744-45-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2744-46-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB