Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/09/2024, 03:08

General

  • Target

    e196849a49e958079f7ff8608cadd6b3_JaffaCakes118.exe

  • Size

    1.0MB

  • MD5

    e196849a49e958079f7ff8608cadd6b3

  • SHA1

    62cf098f491ce23296ce94e88038d9f4fe709fbc

  • SHA256

    03d84a8f3f0df0ee5c55ac71d0d0947f9cc870ab88673efa195eba021f3012fd

  • SHA512

    ce5fb6b2269714a644a85e541155e95c2f680809ca123986bcd1988714b67c33ce198ff2b4a9871c3bb1701b14d915a141544a1419b740fe7b569248a47a233e

  • SSDEEP

    24576:BcuFhCwUuqDluBMfEhJX3z5mKhwbLeoMC:HhxqDosEL3F/w+C

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 14 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e196849a49e958079f7ff8608cadd6b3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e196849a49e958079f7ff8608cadd6b3_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c "C:\ProgramData\smes\u.bat"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2688
      • C:\ProgramData\smes\smes.exe
        smes.exe -install
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2692
      • C:\ProgramData\smes\smes.exe
        smes.exe -start
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2556
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\temg_tmp.bat"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2944
  • C:\ProgramData\smes\smes.exe
    C:\ProgramData\smes\smes.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2624
    • C:\ProgramData\smes\smes.exe
      C:\ProgramData\smes\smes.exe -run
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\kingsoft\kws\kws.ini

    Filesize

    720B

    MD5

    ffc3088dc68b14616fc334ce25f7c4ec

    SHA1

    83ea5e504ba582fd0db81371888b2d2d36012af8

    SHA256

    f39e009b78bbca138cf7ca72023390afe0e9ab1980eb0e326e637186a1249872

    SHA512

    b3c29e4513ba21d9588661eeffe029bdc5a2317cb3345cbe945f50df9688732d478e614e67a64f87d9cdf2c284eaeb9c497feef69ee71a621f4fc009bf1c09b4

  • C:\ProgramData\smes\KWSSVC.log

    Filesize

    202B

    MD5

    73192c0db2be12097491ff8fccea7b62

    SHA1

    b9662e97a900e1cec98a3d62831bec3c32e2a50f

    SHA256

    3aea2a7acf79c1a434b8bf6cce3efbb3afbca7d5aef5db076307ad83694c1b86

    SHA512

    00bd80f21b8c9ee7c4ea0bfea02a04892a6b49e234b16d81f1b974580d338c29646f151b86d09ea7777f478a900ae8dc9e112f27d1564d5cf2fffaf6be473abe

  • C:\ProgramData\smes\KWSSVC.log

    Filesize

    448B

    MD5

    83e6cf55c9b2921153b20838f26919da

    SHA1

    a0905fa42adbc30ecaec8af69b75cf246abb94db

    SHA256

    ba17c6c3f76e17aff573f2048c23648a9ad0692cbc4452485401e4fab49dd927

    SHA512

    6660a97e24ac18cf1c472cbd0602db73a3d9d57eb4f25a1f7850558ee97807659f29c9e6a7aff6dc64d14b103eac7cef94610a9cf050fd8facc7fc6aa927eb18

  • C:\ProgramData\smes\KWSSVC.log

    Filesize

    546B

    MD5

    557d28ae4b823923e7ed20fe055e8b91

    SHA1

    310a81d9b321a84b42baf8783ba0af98f2b6bf4e

    SHA256

    e6e4ad75cfb12312d853c1274bc2058bc00549a6613de6883fa45db71e124e79

    SHA512

    367a65aee4aca520bbdec162f50593260249b454c03b168d32e891ce0ebc0341e7317ef0a2074399b6da40c5d35abf0791834d3f3036ebb6b8d6487fe55f1e89

  • C:\ProgramData\smes\kwssp.dll

    Filesize

    425KB

    MD5

    bf5dcfd9da0514334d41cbd80d2a9138

    SHA1

    802f9e0b82edca56be08a33b2ba874b34c31f1e3

    SHA256

    f9506cf9a87aa6bfbf07f2124f2785a711b27a70839ebb95bdd4b2cf747fb060

    SHA512

    246796f2e201cde30043eaa2c0ffb4d2b3bea2bae97261a022824c31a42d2b08998b1bdcd436e8392bdd153dd6fadf9ba69361c7316a6bfda5d475678b7aa5cc

  • C:\ProgramData\smes\kwsui.dll

    Filesize

    433KB

    MD5

    45199dab51eeece95728abfe25e18f35

    SHA1

    59ab0fe25aa2adc253adbecba6862e7432df1c39

    SHA256

    a22006861cac6a849346282e2f7729deeb8f68bf29f13c15ae33d20311f77391

    SHA512

    825c6ae1f88cec3d6c469e6a15cad0430845ecc8d436777092f4c5fe8ecd02abbfeb3e2a17b2f4896b9d6e4b2d229a8b83bfdda75a3e025fc32f86610c6eef12

  • C:\ProgramData\smes\smes.exe

    Filesize

    209KB

    MD5

    1fa47f5b173cee5ef9c3ee1bda0c321e

    SHA1

    60ee40236f960affb01d569a32e1b05888bb081a

    SHA256

    b21526716068d2a8550780038e2b5ddb843d77890a07ec82ed9ce9dd0be52c64

    SHA512

    01f39376269a75510347fcf66ff2585b25d5e6e10e26b7feefa3af66e712a5f50c62bff6d40abee733e1ce965d17a2e443664838268eb7c7a2e36fc1c024224d

  • C:\ProgramData\smes\u.bat

    Filesize

    44B

    MD5

    704efba1aee1454561da552dda430498

    SHA1

    d20fb96683f769eb9cef1b0a068bcba70aeab9c2

    SHA256

    80b08d35bd27636e0774ce35ab57306f76edc6a0f7058cb1f93733cdf88bf94c

    SHA512

    7e0c9ede686238703af4893af8842c05c48ab1681ae273b32d8085cf1a17aae946c0c823a0a418787522a551d684367259ff8203ebca6e4ec69b6ded95231bd0

  • C:\Users\Admin\AppData\Local\Temp\temg_tmp.bat

    Filesize

    135B

    MD5

    407a696f787e4b0841047e41b52364e1

    SHA1

    d4ce33da8cc92201c2013c97ecbe5f8b3d09d094

    SHA256

    0bf30d45eaeaf40d9cc32b829ed2d39f83aed1336213146058b249534d685453

    SHA512

    f4eb5037cf7d077ef4f6fa6ffeec03cc78476b2954866261318d0556c4086aaa96ab89bae7a82056003de84ad84a7a711285828b32f5996d2726d6ed4d195be2

  • \ProgramData\smes\kswebshield.dll

    Filesize

    441KB

    MD5

    7851449473178f9782263d51bc5e3bbc

    SHA1

    ad5148ee1bed2348b320c62c025d52fbcbb28799

    SHA256

    c3bc7ec8428f0bb210a0597c9a0cad1be412b7fa46ea006819a3df9ac23118b4

    SHA512

    b01fc37ac84b81df8d7657000295aed7eb50aaf7f13ab2b2be9030c9f83ed1559318c83c78b4a29926d7d30e9eea9538d123ef4a649179be5a5b54ee71ed9b49

  • \Users\Admin\AppData\Local\Temp\nsoF26B.tmp\AccessControl.dll

    Filesize

    10KB

    MD5

    055f4f9260e07fc83f71877cbb7f4fad

    SHA1

    a245131af1a182de99bd74af9ff1fab17977a72f

    SHA256

    4209588362785b690d08d15cd982b8d1c62c348767ca19114234b21d5df74ddc

    SHA512

    a8e82dc4435ed938f090f43df953ddad9b0075f16218c09890c996299420162d64b1dbfbf613af37769ae796717eec78204dc786b757e8b1d13d423d4ee82e26

  • \Users\Admin\AppData\Local\Temp\nsoF26B.tmp\FindProcDLL.dll

    Filesize

    3KB

    MD5

    8614c450637267afacad1645e23ba24a

    SHA1

    e7b7b09b5bbc13e910aa36316d9cc5fc5d4dcdc2

    SHA256

    0fa04f06a6de18d316832086891e9c23ae606d7784d5d5676385839b21ca2758

    SHA512

    af46cd679097584ff9a1d894a729b6397f4b3af17dff3e6f07bef257bc7e48ffa341d82daf298616cd5df1450fc5ab7435cacb70f27302b6db193f01a9f8391b

  • memory/1952-56-0x00000000002E0000-0x0000000000351000-memory.dmp

    Filesize

    452KB

  • memory/2188-5-0x0000000010000000-0x0000000010003000-memory.dmp

    Filesize

    12KB