Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    33s
  • max time network
    39s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 21:44

General

  • Target

    f0abd96a38ed903947b42592d02e38c6_JaffaCakes118.exe

  • Size

    3.1MB

  • MD5

    f0abd96a38ed903947b42592d02e38c6

  • SHA1

    7415e5d1aa64b5b590bae6a9701717273180150e

  • SHA256

    1174d2d36ab86bd52650fc086af7c2f226a55db34bd3d0fd966c0b6c070a4342

  • SHA512

    626aeabd5e2c4f644cc487fd12a171138b8c7dc18b23642da4b03d2013654a0d3cdc8445708dad9738752dd404124337681081fcfff5a1c549a5686f21b21596

  • SSDEEP

    49152:OnIh6OCiyGnhSyhxPw0Pelu8G5UozmzY7KqMFkQDnUt47tS83jVLxwY4sS:On9xJGhSyFPeoVOoHXu/nUt4EAZeYc

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 7 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 29 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f0abd96a38ed903947b42592d02e38c6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f0abd96a38ed903947b42592d02e38c6_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:792
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\8A182603-F15B-E34F-B9B3-322BEC64F0E7\InstSupp.dll",CmdProc --Level --Supp 625 --Ver 190
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:1680
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\8A182603-F15B-E34F-B9B3-322BEC64F0E7\InstSupp.dll",CmdProc --Goo --Proc checkinstall --Supp 625 --Cid D5536BEB-7106-B744-97BE-732EAE44A78B --Tid UA-54395801-1 --Uid A443D2F00F835E40951850B6E356147A
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:1968
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\8A182603-F15B-E34F-B9B3-322BEC64F0E7\InstSupp.dll",CmdProc --Check --Supp 625 --Uid A443D2F00F835E40951850B6E356147A --Ver 190 --Did 1264
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Maps connected drives based on registry
      • System Location Discovery: System Language Discovery
      PID:2948
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\8A182603-F15B-E34F-B9B3-322BEC64F0E7\InstSupp.dll",CmdProc --Res "C:\Users\Admin\AppData\Local\Temp\8A182603-F15B-E34F-B9B3-322BEC64F0E7\nszD77D.tmp" --Ver 190 --Supp 625 --Err 5
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:300

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12

    Filesize

    1KB

    MD5

    7fb5fa1534dcf77f2125b2403b30a0ee

    SHA1

    365d96812a69ac0a4611ea4b70a3f306576cc3ea

    SHA256

    33a39e9ec2133230533a686ec43760026e014a3828c703707acbc150fe40fd6f

    SHA512

    a9279fd60505a1bfeef6fb07834cad0fd5be02fd405573fc1a5f59b991e9f88f5e81c32fe910f69bdc6585e71f02559895149eaf49c25b8ff955459fd60c0d2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8

    Filesize

    436B

    MD5

    971c514f84bba0785f80aa1c23edfd79

    SHA1

    732acea710a87530c6b08ecdf32a110d254a54c8

    SHA256

    f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895

    SHA512

    43dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12

    Filesize

    174B

    MD5

    b20c009a416c5e82feb600539e7a6129

    SHA1

    30b7cb039dae5015406128e3d3d794015c38d41a

    SHA256

    c25d67c37cfc1278550e695287ea333fd6d141689de5ec2a2476f1ab31b8d571

    SHA512

    c3d760afc6767e9a6f6c31ec5287eda9752b2db54e6aa7d20f7984da951b68dfa5f38baf28ab39141b12353b829a9562931a656c3feaf39ae09c72cf67a12bb5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    32061d339efd6c09ffac950c36ec35a9

    SHA1

    1c425163b96ed96870e72deeee18f41ea106067f

    SHA256

    bba1deaca6828e3c00af1630d0ec0f5bbd4be646b0ce4b342ededefb6d5da572

    SHA512

    8f9b8ebb5037714814c4fe3bfb1f0f0e6efbf51b7767dcf012e23129b25f6e76f5e3bb6cd3032826b1d0a60f052063a8df65ed6b17a65f6a06e53149384b2083

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8

    Filesize

    170B

    MD5

    bc76c51d9917a41e75acade2984d8535

    SHA1

    829384f483539bd33cab1a1fba1a0406f4d4af47

    SHA256

    e42ce93d57c9ffe24af13dabe97fd29fc2c30a37215e02e0fa2c80982753811c

    SHA512

    804a1252afbdc34fce2463ff53a28174de2c86c58756a3b53ecb567329d64e64cc1904fc36f10537d88c05c818ec1bf12183600604fe53865c243b432a142635

  • C:\Users\Admin\AppData\Local\Temp\8A182603-F15B-E34F-B9B3-322BEC64F0E7\InstSupp.dll

    Filesize

    542KB

    MD5

    d48d051c91c34ea903e7d5d830e4d24e

    SHA1

    987d80c643660efcf09198f158796196464acc94

    SHA256

    e81da2bc2b1eab8dbf092481765840f3d6bb4e2f6af07c147fd8d428b1c0d494

    SHA512

    33833da4592a108d7cd15c2f4e35ce19b2123b7aa6b6da076ecab3b68517f261b7864dfa4fc09744b14f25b8b8df18b891a2c4d9a817dba79856b67f1b8cb0ae

  • C:\Users\Admin\AppData\Local\Temp\8A182603-F15B-E34F-B9B3-322BEC64F0E7\nszD77D.tmp

    Filesize

    1KB

    MD5

    4de1b1ce976202ac171102da74ee8a5e

    SHA1

    851626dcad7d84ddbc5c0383d599fbbc426daa04

    SHA256

    cd90205c8acf333ab49ead5766fb9db5390f44ba56be07de8926951fb5c1fa74

    SHA512

    014afc055a2bfe6143a73c2eda07a81caa98828070137d2b178e3bad90b98c2bbdefed5e1388da13541188dab9df527f7b1f933b17fdf056d317992d40a97a6e

  • C:\Users\Admin\AppData\Local\Temp\8A182603-F15B-E34F-B9B3-322BEC64F0E7\nszD77D.tmp

    Filesize

    515B

    MD5

    139fbe8c0870b1c23897b86aa1388a69

    SHA1

    e40e2aec87fc95029a164456d201eb68921637bc

    SHA256

    618894926f9f4588a98ebeb6c3e50fa1949d4f077ab63073190491831340bb92

    SHA512

    fe69b89344e5ad1ff6626830f4c3fd301e9b2c76bdf9a6da327976ac194959705bfa03cf6b4b232ee56872509ad244d3eda06c84638fb5ebdc7b09ca9b298ec5

  • C:\Users\Admin\AppData\Local\Temp\8A182603-F15B-E34F-B9B3-322BEC64F0E7\nszD77D.tmp

    Filesize

    851B

    MD5

    fdd47d81b6e9addbb7f59194ff00c14a

    SHA1

    9e0e132f3b9abf4b2b57246313b462860fb09a57

    SHA256

    b1eef67d4aba41126302376f5be091ebace5423708d6f06865dabfb5b64b48d9

    SHA512

    d3f2081b9d5ea3075531d12b20d29977512d04b41eb7369cd210739c00cbd569e61ade0ca2e24112881d00de5720bf340cae82a3dd0bc34bd55d06bb5de23b73

  • C:\Users\Admin\AppData\Local\Temp\CabE070.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • \Users\Admin\AppData\Local\Temp\nsoCF03.tmp\System.dll

    Filesize

    11KB

    MD5

    3e6bf00b3ac976122f982ae2aadb1c51

    SHA1

    caab188f7fdc84d3fdcb2922edeeb5ed576bd31d

    SHA256

    4ff9b2678d698677c5d9732678f9cf53f17290e09d053691aac4cc6e6f595cbe

    SHA512

    1286f05e6a7e6b691f6e479638e7179897598e171b52eb3a3dc0e830415251069d29416b6d1ffc6d7dce8da5625e1479be06db9b7179e7776659c5c1ad6aa706

  • \Users\Admin\AppData\Local\Temp\nsoCF03.tmp\md5dll.dll

    Filesize

    6KB

    MD5

    7059f133ea2316b9e7e39094a52a8c34

    SHA1

    ee9f1487c8152d8c42fecf2efb8ed1db68395802

    SHA256

    32c3d36f38e7e8a8bafd4a53663203ef24a10431bda16af9e353c7d5d108610f

    SHA512

    9115986754a74d3084dd18018e757d3b281a2c2fde48c73b71dba882e13bd9b2ded0e6e7f45dc5b019e6d53d086090ccb06e18e6efeec091f655a128510cbe51

  • memory/792-110-0x0000000000540000-0x000000000054A000-memory.dmp

    Filesize

    40KB

  • memory/792-111-0x0000000000540000-0x000000000054A000-memory.dmp

    Filesize

    40KB

  • memory/792-112-0x0000000000540000-0x000000000054A000-memory.dmp

    Filesize

    40KB

  • memory/792-113-0x0000000000540000-0x000000000054A000-memory.dmp

    Filesize

    40KB

  • memory/792-114-0x0000000000540000-0x000000000054A000-memory.dmp

    Filesize

    40KB