Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2024, 01:43 UTC

General

  • Target

    ec979706809d317ea490b0abc9409a20_JaffaCakes118.exe

  • Size

    713KB

  • MD5

    ec979706809d317ea490b0abc9409a20

  • SHA1

    06cf2ee722da1726b799da60efcc99c54f6c549a

  • SHA256

    8134e9aaeee2160899ff6995b0d97a1742eda48124ff8cebaa4b2f65b2e8b153

  • SHA512

    22c7c6305f5c8e313d6740bbb0a2da2de8ba557f93fcd2ce9a3388794c38b709a5f12d917f8870f1556fe896f4ec8cf5013c1e27cc9786e5611b480422aaa005

  • SSDEEP

    12288:XcFUncJ54irus265GoqlDX1YH0COI+w7Ror6PpGg+l2K3RYUOcCtlMBcK0IF9Px:dnYnuRcBIoGblBh3yRKrF9p

Malware Config

Extracted

Family

azorult

C2

http://ciuj.ir/angel/index.php

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec979706809d317ea490b0abc9409a20_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ec979706809d317ea490b0abc9409a20_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\Users\Admin\AppData\Local\Temp\ec979706809d317ea490b0abc9409a20_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\ec979706809d317ea490b0abc9409a20_JaffaCakes118.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2084

Network

  • flag-us
    DNS
    ciuj.ir
    ec979706809d317ea490b0abc9409a20_JaffaCakes118.exe
    Remote address:
    8.8.8.8:53
    Request
    ciuj.ir
    IN A
    Response
  • flag-us
    DNS
    ciuj.ir
    ec979706809d317ea490b0abc9409a20_JaffaCakes118.exe
    Remote address:
    8.8.8.8:53
    Request
    ciuj.ir
    IN A
    Response
No results found
  • 8.8.8.8:53
    ciuj.ir
    dns
    ec979706809d317ea490b0abc9409a20_JaffaCakes118.exe
    53 B
    53 B
    1
    1

    DNS Request

    ciuj.ir

  • 8.8.8.8:53
    ciuj.ir
    dns
    ec979706809d317ea490b0abc9409a20_JaffaCakes118.exe
    53 B
    53 B
    1
    1

    DNS Request

    ciuj.ir

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2084-8-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2084-6-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2084-5-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2084-10-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2124-0-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2124-2-0x00000000002A0000-0x00000000002B0000-memory.dmp

    Filesize

    64KB

  • memory/2124-3-0x00000000003C0000-0x00000000003C1000-memory.dmp

    Filesize

    4KB

  • memory/2124-1-0x00000000002A0000-0x00000000002B0000-memory.dmp

    Filesize

    64KB

  • memory/2124-7-0x0000000000400000-0x00000000004B9000-memory.dmp

    Filesize

    740KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.