Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 17:25

General

  • Target

    ebd5d2e9b6d427c0a1486b1e0451d163_JaffaCakes118.exe

  • Size

    640KB

  • MD5

    ebd5d2e9b6d427c0a1486b1e0451d163

  • SHA1

    724226def939963715766f62b81e0b78d99a068d

  • SHA256

    7c7e02b9796d58e2f856b67f51a5f8bdac59e26dce62b57f70f3e70c62fd8d04

  • SHA512

    49158fada4a4178de25e69354cb9751599f114b03822716b82ddddd3d2e511745029acb335577b1fdfd9f7c247cae91c7c4562fd2bdd6ab185580580199c1a55

  • SSDEEP

    12288:JO5hD60H3gk2KKYaFywyQVZeJVQwF3Z4mxxD/YkHtc16EEhhpVyF:Y5hD60LO/VZbwQmXD/YkHS14DLyF

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ebd5d2e9b6d427c0a1486b1e0451d163_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ebd5d2e9b6d427c0a1486b1e0451d163_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\uninstal.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2692
  • C:\Windows\msagent\agenter.exe
    C:\Windows\msagent\agenter.exe
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
      2⤵
        PID:2864

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\msagent\agenter.exe

      Filesize

      640KB

      MD5

      ebd5d2e9b6d427c0a1486b1e0451d163

      SHA1

      724226def939963715766f62b81e0b78d99a068d

      SHA256

      7c7e02b9796d58e2f856b67f51a5f8bdac59e26dce62b57f70f3e70c62fd8d04

      SHA512

      49158fada4a4178de25e69354cb9751599f114b03822716b82ddddd3d2e511745029acb335577b1fdfd9f7c247cae91c7c4562fd2bdd6ab185580580199c1a55

    • C:\Windows\uninstal.bat

      Filesize

      218B

      MD5

      a2c7385e55db633d4f2b69ab4ce51385

      SHA1

      94729b88188922a108e8324e9ef6d14c838cbfcc

      SHA256

      c4fb9c4f2fd8f50e1a26326da7b24922fc22ce41dd2601c6ccf4c8c3b714e0e6

      SHA512

      20898ff60b9dcdeee9d3438346a5d5c49dcfba8322f5346de62195cd4190809f67ff84fa83b937c52e9c6e4fa8224f23b61d7c69dbcebc0f192d1b0f3caf0aab

    • memory/1984-0-0x0000000000400000-0x0000000000527000-memory.dmp

      Filesize

      1.2MB

    • memory/1984-34-0x0000000003290000-0x0000000003293000-memory.dmp

      Filesize

      12KB

    • memory/1984-33-0x0000000003290000-0x0000000003291000-memory.dmp

      Filesize

      4KB

    • memory/1984-32-0x0000000003290000-0x0000000003291000-memory.dmp

      Filesize

      4KB

    • memory/1984-31-0x0000000003290000-0x0000000003291000-memory.dmp

      Filesize

      4KB

    • memory/1984-30-0x0000000003290000-0x0000000003291000-memory.dmp

      Filesize

      4KB

    • memory/1984-29-0x0000000003290000-0x0000000003291000-memory.dmp

      Filesize

      4KB

    • memory/1984-28-0x0000000003290000-0x0000000003291000-memory.dmp

      Filesize

      4KB

    • memory/1984-27-0x0000000003290000-0x0000000003291000-memory.dmp

      Filesize

      4KB

    • memory/1984-26-0x0000000003290000-0x0000000003291000-memory.dmp

      Filesize

      4KB

    • memory/1984-25-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/1984-24-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/1984-23-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/1984-22-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/1984-21-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/1984-20-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/1984-19-0x0000000003290000-0x0000000003291000-memory.dmp

      Filesize

      4KB

    • memory/1984-18-0x00000000032A0000-0x00000000032A1000-memory.dmp

      Filesize

      4KB

    • memory/1984-17-0x00000000032A0000-0x00000000032A1000-memory.dmp

      Filesize

      4KB

    • memory/1984-16-0x00000000032A0000-0x00000000032A1000-memory.dmp

      Filesize

      4KB

    • memory/1984-15-0x00000000032A0000-0x00000000032A1000-memory.dmp

      Filesize

      4KB

    • memory/1984-14-0x00000000032A0000-0x00000000032A1000-memory.dmp

      Filesize

      4KB

    • memory/1984-13-0x00000000032A0000-0x00000000032A1000-memory.dmp

      Filesize

      4KB

    • memory/1984-12-0x00000000032A0000-0x00000000032A1000-memory.dmp

      Filesize

      4KB

    • memory/1984-11-0x00000000032A0000-0x00000000032A1000-memory.dmp

      Filesize

      4KB

    • memory/1984-10-0x00000000006C0000-0x00000000006C1000-memory.dmp

      Filesize

      4KB

    • memory/1984-9-0x0000000000940000-0x0000000000941000-memory.dmp

      Filesize

      4KB

    • memory/1984-8-0x0000000000700000-0x0000000000701000-memory.dmp

      Filesize

      4KB

    • memory/1984-7-0x0000000000920000-0x0000000000921000-memory.dmp

      Filesize

      4KB

    • memory/1984-6-0x00000000003A0000-0x00000000003A1000-memory.dmp

      Filesize

      4KB

    • memory/1984-5-0x00000000003B0000-0x00000000003B1000-memory.dmp

      Filesize

      4KB

    • memory/1984-4-0x0000000000930000-0x0000000000931000-memory.dmp

      Filesize

      4KB

    • memory/1984-3-0x00000000006D0000-0x00000000006D1000-memory.dmp

      Filesize

      4KB

    • memory/1984-2-0x00000000006F0000-0x00000000006F1000-memory.dmp

      Filesize

      4KB

    • memory/1984-1-0x0000000000310000-0x0000000000364000-memory.dmp

      Filesize

      336KB

    • memory/1984-37-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB

    • memory/1984-43-0x00000000032A0000-0x00000000032A1000-memory.dmp

      Filesize

      4KB

    • memory/1984-42-0x0000000000390000-0x0000000000391000-memory.dmp

      Filesize

      4KB

    • memory/1984-41-0x00000000032B0000-0x00000000032B1000-memory.dmp

      Filesize

      4KB

    • memory/1984-40-0x00000000032C0000-0x00000000032C1000-memory.dmp

      Filesize

      4KB

    • memory/1984-39-0x00000000032D0000-0x00000000032D1000-memory.dmp

      Filesize

      4KB

    • memory/1984-38-0x0000000000270000-0x0000000000271000-memory.dmp

      Filesize

      4KB

    • memory/1984-56-0x0000000000400000-0x0000000000527000-memory.dmp

      Filesize

      1.2MB

    • memory/1984-57-0x0000000000310000-0x0000000000364000-memory.dmp

      Filesize

      336KB

    • memory/2412-45-0x0000000000400000-0x0000000000527000-memory.dmp

      Filesize

      1.2MB

    • memory/2412-46-0x0000000000640000-0x0000000000694000-memory.dmp

      Filesize

      336KB

    • memory/2412-59-0x0000000000400000-0x0000000000527000-memory.dmp

      Filesize

      1.2MB

    • memory/2412-60-0x0000000000640000-0x0000000000694000-memory.dmp

      Filesize

      336KB