Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    12/09/2024, 13:07

General

  • Target

    dc554d6343a952e5f269ab6fe983447d_JaffaCakes118.exe

  • Size

    356KB

  • MD5

    dc554d6343a952e5f269ab6fe983447d

  • SHA1

    fa765406fe4e041de54f9414936875151c1f35f7

  • SHA256

    6fe72dc7e0a3ec67205bf8ec520724bd99411d0c1122d6fb1ae94706a162d0cd

  • SHA512

    b997ad381856897d7e31a82c3a781a20307c998ae66cc38cee30999c3460173175f13107fe9304fbfe2b1d9122ca522a41b07f55fd423b88780cdc058992c0fa

  • SSDEEP

    6144:7vbx8gUHPq+m6d002UoNlGxSSrJGUOcUURynzqiIKpe:7dUHyj6WjblASeBOyRynt0

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dc554d6343a952e5f269ab6fe983447d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dc554d6343a952e5f269ab6fe983447d_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1864
    • C:\Users\Admin\AppData\Local\Temp\dc554d6343a952e5f269ab6fe983447d_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\dc554d6343a952e5f269ab6fe983447d_JaffaCakes118.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:772
      • C:\ProgramData\PRwr03Vz4MK8ck\ihxlPo07kW.exe
        "C:\ProgramData\PRwr03Vz4MK8ck\ihxlPo07kW.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2964
        • C:\ProgramData\PRwr03Vz4MK8ck\ihxlPo07kW.exe
          "C:\ProgramData\PRwr03Vz4MK8ck\ihxlPo07kW.exe"
          4⤵
          • Deletes itself
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2716
          • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe
            "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AdobeCollabSync.exe" /i:2716
            5⤵
              PID:2752

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\PRwr03Vz4MK8ck\RCXBEDC.tmp

      Filesize

      356KB

      MD5

      dd0bfb4c6f393c9319c226f86452bb5b

      SHA1

      220f8f3fbf6047c4cc63e81242c5ad1968cc70b7

      SHA256

      18d05c4484d1fd80e630d35376bcaca26cc35f992cb6f5660b031f3068340937

      SHA512

      27045e56df6d93150c7ecf34eeccd763ea879216e41fc6b9480b8c0e56e71737239aff6c2937fb815a0a6b3255bcf9332e5ef3e54f0e609b2569691984e0ff31

    • \ProgramData\PRwr03Vz4MK8ck\ihxlPo07kW.exe

      Filesize

      356KB

      MD5

      dc554d6343a952e5f269ab6fe983447d

      SHA1

      fa765406fe4e041de54f9414936875151c1f35f7

      SHA256

      6fe72dc7e0a3ec67205bf8ec520724bd99411d0c1122d6fb1ae94706a162d0cd

      SHA512

      b997ad381856897d7e31a82c3a781a20307c998ae66cc38cee30999c3460173175f13107fe9304fbfe2b1d9122ca522a41b07f55fd423b88780cdc058992c0fa

    • memory/772-24-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/772-27-0x0000000077230000-0x0000000077340000-memory.dmp

      Filesize

      1.1MB

    • memory/772-7-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/772-5-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/772-3-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/772-8-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/772-10-0x0000000077230000-0x0000000077340000-memory.dmp

      Filesize

      1.1MB

    • memory/772-2-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/1864-0-0x0000000077241000-0x0000000077242000-memory.dmp

      Filesize

      4KB

    • memory/1864-6-0x0000000000400000-0x0000000000464000-memory.dmp

      Filesize

      400KB

    • memory/2716-42-0x0000000077230000-0x0000000077340000-memory.dmp

      Filesize

      1.1MB

    • memory/2716-53-0x0000000000400000-0x000000000045E000-memory.dmp

      Filesize

      376KB

    • memory/2716-55-0x0000000077230000-0x0000000077340000-memory.dmp

      Filesize

      1.1MB

    • memory/2752-47-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2752-52-0x0000000077230000-0x0000000077340000-memory.dmp

      Filesize

      1.1MB

    • memory/2964-31-0x0000000077230000-0x0000000077340000-memory.dmp

      Filesize

      1.1MB

    • memory/2964-40-0x0000000077230000-0x0000000077340000-memory.dmp

      Filesize

      1.1MB

    • memory/2964-37-0x0000000000400000-0x0000000000464000-memory.dmp

      Filesize

      400KB