Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/09/2024, 12:20

General

  • Target

    e2782725ff19b07aff77868dbdc744da_JaffaCakes118.exe

  • Size

    28KB

  • MD5

    e2782725ff19b07aff77868dbdc744da

  • SHA1

    e95a23354ea5dcef1e548bda4bf698f0e263ddd7

  • SHA256

    9db116ab607dd6c2774018c2fc200fcabb53c1ee1f07b9be7ea6be56f2efe00d

  • SHA512

    d642d6797cdfc8d4db4f264799c6fb95ca7dcc28fddde8d838b4929f0963bc02537ac4019fe905eedb70308ba124e9dc9517be7f6fbf26dc8f30ca2627c26de5

  • SSDEEP

    384:1vxBbK26lj5Id8SpHx9jLhsznnVxA1WmP5w7GGCJlqqwMyNzdpN:Dv8IRRdsxq1DjJcqfSdpN

Malware Config

Signatures

  • Detects MyDoom family 9 IoCs
  • MyDoom

    MyDoom is a Worm that is written in C++.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 29 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e2782725ff19b07aff77868dbdc744da_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e2782725ff19b07aff77868dbdc744da_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:1980

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6fea44fac121d4c69913e3cd1e08e3ef

    SHA1

    14a8bf988bd6b914035f51b58b3cd6211c7550bc

    SHA256

    82c48a447758574f0292954ca2a65f9774f8e54d49119ed7f46c9a15c600bbbf

    SHA512

    23f1c233e68fdd06c0fe05fb59c36b9823ec9dd83f0d28df03b2082210cf083c1dfaaeb8033433a9f3477f9746982dd13df731db9227c76850d81e40a137a228

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    62b30ba7440f4c71686d72c3b45c2364

    SHA1

    57fbab8954df8110cd2b0ba7eb0a238810af661a

    SHA256

    bcebb5ccc8399c75c7ba61fe31e14ad7f517d1e5b66deacfee95ae3cd837e779

    SHA512

    a05fbabc81d2d16b96658f954a6bb6b527ec0974e2e5df0e4cdd84d4454810abf6e241c483146cae9e2c2352ed01c63ef2262505a624060b93c9fd008c9da745

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PLSLTMYI\search[3].htm

    Filesize

    25B

    MD5

    8ba61a16b71609a08bfa35bc213fce49

    SHA1

    8374dddcc6b2ede14b0ea00a5870a11b57ced33f

    SHA256

    6aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1

    SHA512

    5855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1

  • C:\Users\Admin\AppData\Local\Temp\CabBC75.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarBCE8.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\tmpB54D.tmp

    Filesize

    28KB

    MD5

    c7748995e168e9b98e71e72a5efb17ed

    SHA1

    dde35552d331537abb0d39b1295efe734c50a443

    SHA256

    aa10ab81f31ef815ef40b477800e609416b2c093387f8f5676e118d9069f5c5e

    SHA512

    3c0e61c83cd281e9d5394e7ebf48290abd4f226ac2a69e13f701ac22388bdd464f25ec19dccd505381a4a550fb394ff82789e49be4741019307270f7b26909c9

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    1KB

    MD5

    97f00a99f3864e94136bd7df3fb4c469

    SHA1

    37d1ca6efdb15c30b6eaa39dfe15fdcd60976bb6

    SHA256

    e99d351d543c27836dc65edb761f12f25bccd705b3b0fb7855407ed478e1a1a1

    SHA512

    b0865276184787b5eb2de90f0d43a5e4208b9c207bcea172d6277b30a506852528ba95ed500e019eea81550c8da7c106e55e491b4455236d8618c367abb2dd3a

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    1KB

    MD5

    075502bc4dfe27b1ca3eb27e821acae4

    SHA1

    7cdcd1a89c56ccb097ad97f8aa25361e0ffcf8ea

    SHA256

    0aaf812ad5d90acea9050b1d566f64e47edac60e078c7c261b6a73a3e3e361af

    SHA512

    850ed9f52c535f79cc12deb9948b54aec926c8dec18fb215dd30c87dded9e02b5a54cd1a14de5dc18b415637e2fc16f34f9c142767ad93bd96eacb7662d98337

  • C:\Users\Admin\AppData\Local\Temp\zjg9emFVcj.log

    Filesize

    1KB

    MD5

    63ffea87c59b2beaf9f5e4552cdd3863

    SHA1

    67aa952326b2250f0e644e97216e37e96509f486

    SHA256

    358d62d5b6d2f9e299c24f868af7ee03a2b39bd8ff3579bbf6f9c5b6f70f9916

    SHA512

    5bdb8e725775342cf9c846d4baf7c5413ce7ca44c2deb85b691880cd39f95b4d1765b5282029bf8b0c970ca548965fa00828b3e90b5b1ac00274ae694f39553e

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/1980-63-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1980-22-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1980-34-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1980-39-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1980-243-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1980-44-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1980-27-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1980-79-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1980-32-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1980-11-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1980-21-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1980-86-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1980-67-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1980-84-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1980-72-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1980-74-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2412-62-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2412-78-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2412-83-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2412-71-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2412-85-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2412-66-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2412-19-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB

  • memory/2412-18-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB

  • memory/2412-17-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2412-0-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2412-8-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB

  • memory/2412-9-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB

  • memory/2412-242-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB

  • memory/2412-43-0x0000000000500000-0x0000000000510000-memory.dmp

    Filesize

    64KB