Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/09/2024, 23:13

General

  • Target

    dd377aa5d7374984340c6aa9a0aecd76_JaffaCakes118.exe

  • Size

    276KB

  • MD5

    dd377aa5d7374984340c6aa9a0aecd76

  • SHA1

    e37989553653cc84c94eeb9203959a474212ded1

  • SHA256

    6bb4263a4ad3144c3a3651af3f276c88428ad4a012879e801d984227ffeb2ec1

  • SHA512

    908dff49e1794021596485767b1236f89bc86dee63af9a918557077bb250652ac2b76e89fcf33c92ee15ea413e9b9cf690392b743f13e7238f54f033fbffb690

  • SSDEEP

    3072:AjYIDFHF9gQfOdH0hHyRukFepQUxyHxbV856uXYa6qUegv7A9GuJ9kzcfr5RXOJk:BIxAdH8ylUExJk6ujKUDJ9Lcl

Malware Config

Signatures

  • Drops file in Drivers directory 14 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 30 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dd377aa5d7374984340c6aa9a0aecd76_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dd377aa5d7374984340c6aa9a0aecd76_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Adds Run key to start application
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:3068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\S8GI6B9B\js3[1].js

    Filesize

    1KB

    MD5

    a66b149a7ebc798955373415d683f32a

    SHA1

    15ceaba8cfae8368600620ae97aa26ae7331d626

    SHA256

    036c94653e84e6078c087abeb3ac8804491d27b27938839ae3df42b31e2238d9

    SHA512

    286add411911651ed9217ab94b286d4e3fb546f4bf39c451eff86df0b6daab412d2fd97e0e34c4b71322e862eddf8bc1efdb9d7e1e3c53c15bb420f609966443