Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18/09/2024, 23:53

General

  • Target

    ea34a3e7fb370f4c4bcb4539982ae713_JaffaCakes118.exe

  • Size

    297KB

  • MD5

    ea34a3e7fb370f4c4bcb4539982ae713

  • SHA1

    9cae4792136ada03784574df0829bf122aef4cc2

  • SHA256

    6ecef56615129397fa44f3a34eef8afc0b80bef6cec76ac371890000e540d012

  • SHA512

    f931aef71bc5bd96d277eb160a6cccbe90cb82a98c76e15909eb27da56e40354becfdfcb990a8c70ead97fe3b392baa064de0bf0985966e0608ee2d8c1284f09

  • SSDEEP

    6144:cPzHT72Y0S4zinYKTY1SQshfRPVQe1MZkIYSccr7wbstOKPECYeixlYGicn:c7z7SSrYsY1UMqMZJYSN7wbstOK8fve4

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
      PID:1112
    • C:\Windows\system32\Dwm.exe
      "C:\Windows\system32\Dwm.exe"
      1⤵
        PID:1176
      • C:\Windows\Explorer.EXE
        C:\Windows\Explorer.EXE
        1⤵
          PID:1244
          • C:\Users\Admin\AppData\Local\Temp\ea34a3e7fb370f4c4bcb4539982ae713_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\ea34a3e7fb370f4c4bcb4539982ae713_JaffaCakes118.exe"
            2⤵
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1968
            • C:\Users\Admin\AppData\Roaming\Exece\voeqw.exe
              "C:\Users\Admin\AppData\Roaming\Exece\voeqw.exe"
              3⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:2060
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
          1⤵
            PID:1324

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • \Users\Admin\AppData\Roaming\Exece\voeqw.exe

            Filesize

            297KB

            MD5

            011e506c8a6e7ad1209d996a47d8cbee

            SHA1

            ba8ac40ab3a42c95e67c4820c1bfa47d38e0ebae

            SHA256

            c22ea718d2dd1210a4cb77a4e37c272721d3994a6d6cf33d52a6caa1986273c3

            SHA512

            edd00bd9a0338c7e073435f6d8cebf896325065341ea592bcbb26ebd574e92ce1c5dedea593190357c231d20363a4b5d95b1de94e3112c02e336e9666ee07c95

          • memory/1112-15-0x0000000002240000-0x0000000002284000-memory.dmp

            Filesize

            272KB

          • memory/1112-21-0x0000000002240000-0x0000000002284000-memory.dmp

            Filesize

            272KB

          • memory/1112-23-0x0000000002240000-0x0000000002284000-memory.dmp

            Filesize

            272KB

          • memory/1112-19-0x0000000002240000-0x0000000002284000-memory.dmp

            Filesize

            272KB

          • memory/1112-17-0x0000000002240000-0x0000000002284000-memory.dmp

            Filesize

            272KB

          • memory/1176-26-0x0000000000130000-0x0000000000174000-memory.dmp

            Filesize

            272KB

          • memory/1176-28-0x0000000000130000-0x0000000000174000-memory.dmp

            Filesize

            272KB

          • memory/1176-30-0x0000000000130000-0x0000000000174000-memory.dmp

            Filesize

            272KB

          • memory/1244-35-0x0000000002A60000-0x0000000002AA4000-memory.dmp

            Filesize

            272KB

          • memory/1244-38-0x0000000002A60000-0x0000000002AA4000-memory.dmp

            Filesize

            272KB

          • memory/1244-36-0x0000000002A60000-0x0000000002AA4000-memory.dmp

            Filesize

            272KB

          • memory/1244-37-0x0000000002A60000-0x0000000002AA4000-memory.dmp

            Filesize

            272KB

          • memory/1324-42-0x0000000000430000-0x0000000000474000-memory.dmp

            Filesize

            272KB

          • memory/1324-41-0x0000000000430000-0x0000000000474000-memory.dmp

            Filesize

            272KB

          • memory/1324-43-0x0000000000430000-0x0000000000474000-memory.dmp

            Filesize

            272KB

          • memory/1324-40-0x0000000000430000-0x0000000000474000-memory.dmp

            Filesize

            272KB

          • memory/1968-49-0x0000000000290000-0x00000000002D4000-memory.dmp

            Filesize

            272KB

          • memory/1968-58-0x000000007EF60000-0x000000007EFA4000-memory.dmp

            Filesize

            272KB

          • memory/1968-47-0x0000000000290000-0x00000000002D4000-memory.dmp

            Filesize

            272KB

          • memory/1968-53-0x0000000000290000-0x00000000002D4000-memory.dmp

            Filesize

            272KB

          • memory/1968-51-0x0000000000290000-0x00000000002D4000-memory.dmp

            Filesize

            272KB

          • memory/1968-56-0x00000000009B0000-0x00000000009FF000-memory.dmp

            Filesize

            316KB

          • memory/1968-0-0x00000000009B0000-0x00000000009FF000-memory.dmp

            Filesize

            316KB

          • memory/1968-2-0x000000007EF60000-0x000000007EFA4000-memory.dmp

            Filesize

            272KB

          • memory/1968-3-0x000000007EF60000-0x000000007EFA4000-memory.dmp

            Filesize

            272KB

          • memory/1968-9-0x0000000000290000-0x00000000002DF000-memory.dmp

            Filesize

            316KB

          • memory/1968-4-0x000000007EF60000-0x000000007EFA4000-memory.dmp

            Filesize

            272KB

          • memory/1968-1-0x000000007EF60000-0x000000007EFA4000-memory.dmp

            Filesize

            272KB

          • memory/1968-45-0x0000000000290000-0x00000000002D4000-memory.dmp

            Filesize

            272KB

          • memory/2060-12-0x0000000000B40000-0x0000000000B8F000-memory.dmp

            Filesize

            316KB

          • memory/2060-57-0x000000007EF60000-0x000000007EFA4000-memory.dmp

            Filesize

            272KB

          • memory/2060-13-0x000000007EF60000-0x000000007EFA4000-memory.dmp

            Filesize

            272KB

          • memory/2060-64-0x0000000000B40000-0x0000000000B8F000-memory.dmp

            Filesize

            316KB

          • memory/2060-65-0x000000007EF60000-0x000000007EFA4000-memory.dmp

            Filesize

            272KB