Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2024, 23:04

General

  • Target

    ee9a3f216d02117e0e5a13bac187a6d7_JaffaCakes118.exe

  • Size

    105KB

  • MD5

    ee9a3f216d02117e0e5a13bac187a6d7

  • SHA1

    5aef391069c557df0e985e7e7ce3e3834d1a69dc

  • SHA256

    9bac3c48258cdeeca5a5c67b241ebe2a498133da6eee1b7e3fa55f3bbb758bd9

  • SHA512

    6fd5a7596bd2f2a1823b005db5d7ffa4d1cc8c833ed7b219fd733764f63ba72c997fc8523b4e2cefea54a0939f116211707c872ad6c83b053e93dbefe2404227

  • SSDEEP

    1536:njcKXqDDW8SJhGCiPALSGHm9+nWTqADchnOtt/2GmLhnD9d/XRiA+Vc4OT2lQ:jcwH+P/8Et4qN9mrd/Xn+Vc4OT2lQ

Malware Config

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

127.5.0.1:5552

Mutex

Windows Update

Attributes
  • reg_key

    Windows Update

  • splitter

    |'|'|

Signatures

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee9a3f216d02117e0e5a13bac187a6d7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ee9a3f216d02117e0e5a13bac187a6d7_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1724
    • C:\Users\Admin\AppData\Local\Temp\611.exe
      C:\Users\Admin\AppData\Local\Temp\611.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:592
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Roaming\patsh
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1424
        • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
          "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Roaming\patsh"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          PID:3020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\611.exe

    Filesize

    33KB

    MD5

    dfe7a9e6769176c36f6f89293199732b

    SHA1

    1191af31154f51ac43f6a09b39013ea6bf89546d

    SHA256

    f66adacf4155c865a319e330f3b9e00d5729458a87ed4937e4ec95a662176fdc

    SHA512

    b3c6fe2eb0a694197995c34870e7ffd2e70be56dbbfa5e75ae7993e3eb0b0141c201b03f9b2a8702015e666e43e0f5a0a25bcf3c53d4baa79d69a63966725aaa

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    65f3024c1fd5930ec0ca803620b91e2c

    SHA1

    c4a2557950c19cad79dfcf0338e1d7665628c18c

    SHA256

    8cf8366ba0dfa8c62ac0d4a7e0f01f8a9a973e65accdc60897f0e76e26bebc4c

    SHA512

    5f837c8971f8a2243c7e2c5cdec43f8f5a2383e7b201b6d888384e32f3a043d4b1e04d8efa8aebd5d1f0a7b50bb7d4fe5464e4583ada89adda4301a4542b54cf

  • memory/592-10-0x00000000003F0000-0x0000000000406000-memory.dmp

    Filesize

    88KB

  • memory/592-11-0x000007FEF5FA0000-0x000007FEF693D000-memory.dmp

    Filesize

    9.6MB

  • memory/592-12-0x000007FEF5FA0000-0x000007FEF693D000-memory.dmp

    Filesize

    9.6MB

  • memory/592-16-0x000007FEF5FA0000-0x000007FEF693D000-memory.dmp

    Filesize

    9.6MB

  • memory/1724-0-0x000007FEF625E000-0x000007FEF625F000-memory.dmp

    Filesize

    4KB

  • memory/1724-1-0x0000000000370000-0x0000000000384000-memory.dmp

    Filesize

    80KB

  • memory/1724-8-0x000007FEF5FA0000-0x000007FEF693D000-memory.dmp

    Filesize

    9.6MB

  • memory/1724-9-0x000007FEF5FA0000-0x000007FEF693D000-memory.dmp

    Filesize

    9.6MB

  • memory/1724-15-0x000007FEF5FA0000-0x000007FEF693D000-memory.dmp

    Filesize

    9.6MB