Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/09/2024, 12:28

General

  • Target

    e27ac279696dc6b4309fd3efb516d8d6_JaffaCakes118.exe

  • Size

    995KB

  • MD5

    e27ac279696dc6b4309fd3efb516d8d6

  • SHA1

    84abf4924c5e5ae5fb571dc7b3c90ae890ebfa0d

  • SHA256

    364dd59b9d54d3dba476dfae0db524ef2e2a46bca22003b1bfc33f3ab2a3e261

  • SHA512

    8dc43cf5b811993b2f3062731dda5e68b5056c95b828acb8ef0e1d423407b22fd0a46e5247f8da6298c21f0a66eebba5fc763e6d777bab41d1132509455a889a

  • SSDEEP

    24576:Oj0oe78w/dp3lydjvE6d9LfYr8ucU0B24qJ7l/:Oj0T8w/dpIdj86d1Yr85UW27l/

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 8 IoCs
  • UPX packed file 23 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers system information 1 TTPs 5 IoCs

    Runs systeminfo.exe.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e27ac279696dc6b4309fd3efb516d8d6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e27ac279696dc6b4309fd3efb516d8d6_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2264
    • C:\Users\Admin\AppData\Local\Temp\setup69.exe
      C:\Users\Admin\AppData\Local\Temp\setup69.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2696
      • C:\Windows\SysWOW64\CMD.exe
        CMD /C SYSTEMINFO && SYSTEMINFO && SYSTEMINFO && SYSTEMINFO && SYSTEMINFO && DEL "C:\Users\Admin\AppData\Local\Temp\setup69.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2676
        • C:\Windows\SysWOW64\systeminfo.exe
          SYSTEMINFO
          4⤵
          • System Location Discovery: System Language Discovery
          • Gathers system information
          PID:3060
        • C:\Windows\SysWOW64\systeminfo.exe
          SYSTEMINFO
          4⤵
          • System Location Discovery: System Language Discovery
          • Gathers system information
          PID:792
        • C:\Windows\SysWOW64\systeminfo.exe
          SYSTEMINFO
          4⤵
          • System Location Discovery: System Language Discovery
          • Gathers system information
          PID:1072
        • C:\Windows\SysWOW64\systeminfo.exe
          SYSTEMINFO
          4⤵
          • System Location Discovery: System Language Discovery
          • Gathers system information
          PID:1600
        • C:\Windows\SysWOW64\systeminfo.exe
          SYSTEMINFO
          4⤵
          • System Location Discovery: System Language Discovery
          • Gathers system information
          PID:1416
    • C:\Users\Admin\AppData\Local\Temp\install36.exe
      C:\Users\Admin\AppData\Local\Temp\install36.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\install36.exe

    Filesize

    237KB

    MD5

    413d0b81dd8b82c3dde4e5ba487c2ba1

    SHA1

    e295bbcbd497ba08b8e33658a1d8dc48a146252f

    SHA256

    17f2b50de7960d913e8b573d5ecc4ade8a7dfe44cbac09384dc2a721725e3ba3

    SHA512

    2eaba5c7213fad7bbb50753c971d150abb313ff66fb10d78d38cf21555c9bdb65e3afa20f41847120e4ee7919716ca70b511d2e67574e7acf6ffe75f5039e0e7

  • \Users\Admin\AppData\Local\Temp\setup69.exe

    Filesize

    730KB

    MD5

    f424e134bc3ffd7bdd5bf9aa8ec1b83f

    SHA1

    800fadf2f2669dfeecbc9c8c1b72c4c52831883f

    SHA256

    21aff37c2a7b05de8daf26e3ec3cecaf6215665800831dea0fbceb2a570774fc

    SHA512

    56cd6da933febaa89019ff3118b7f77ccd3ea1921ea80f002aa8a37c424e33e568add062722e0db1c75607b3a4ce1b21a5927b07ec02f86e8db6d93b0ec77a9b

  • memory/2264-24-0x0000000000AA0000-0x0000000000B60000-memory.dmp

    Filesize

    768KB

  • memory/2264-32-0x00000000028D0000-0x0000000002A54000-memory.dmp

    Filesize

    1.5MB

  • memory/2264-4-0x00000000028D0000-0x0000000002A54000-memory.dmp

    Filesize

    1.5MB

  • memory/2264-34-0x0000000000AA0000-0x0000000000B60000-memory.dmp

    Filesize

    768KB

  • memory/2696-14-0x0000000002AF0000-0x0000000002BCC000-memory.dmp

    Filesize

    880KB

  • memory/2696-15-0x0000000002CC0000-0x0000000002DA8000-memory.dmp

    Filesize

    928KB

  • memory/2696-18-0x0000000000280000-0x0000000000297000-memory.dmp

    Filesize

    92KB

  • memory/2696-17-0x0000000000400000-0x0000000000584000-memory.dmp

    Filesize

    1.5MB

  • memory/2696-12-0x0000000000330000-0x00000000003AF000-memory.dmp

    Filesize

    508KB

  • memory/2696-13-0x0000000000280000-0x0000000000297000-memory.dmp

    Filesize

    92KB

  • memory/2696-6-0x0000000000400000-0x0000000000584000-memory.dmp

    Filesize

    1.5MB

  • memory/2696-11-0x0000000000CD0000-0x0000000000E54000-memory.dmp

    Filesize

    1.5MB

  • memory/2732-33-0x0000000000230000-0x00000000002F0000-memory.dmp

    Filesize

    768KB

  • memory/2732-40-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/2732-31-0x0000000000230000-0x00000000002F0000-memory.dmp

    Filesize

    768KB

  • memory/2732-27-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/2732-35-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/2732-36-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/2732-37-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/2732-38-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/2732-39-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/2732-30-0x0000000000230000-0x00000000002F0000-memory.dmp

    Filesize

    768KB

  • memory/2732-41-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/2732-42-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/2732-43-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/2732-44-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/2732-45-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/2732-46-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/2732-47-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/2732-48-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/2732-49-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB