Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 01:47

General

  • Target

    eed7798904fbbe0f10b9223717cafb5c_JaffaCakes118.exe

  • Size

    13KB

  • MD5

    eed7798904fbbe0f10b9223717cafb5c

  • SHA1

    31d089d550247b0d0eb35cae03c3f555a1d0b1d3

  • SHA256

    c1b9b1498e94a595398cae77c2e50bf8023e9ea02f3b3803899a9fb4aeabce75

  • SHA512

    d048d5365be15352afb203f21f09dc2f93a3daae53f3f39c416f593a190956e1950d8771f27731fa6a075743e0eec753f2c0c78e4f6918b434b7f31c432c24d2

  • SSDEEP

    384:ZGllOAPM0JVfZvTAesNcmZvg4VMTv2pkHRLOk:gHl0qFZKcmZg4VaMgRSk

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eed7798904fbbe0f10b9223717cafb5c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eed7798904fbbe0f10b9223717cafb5c_JaffaCakes118.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\1748.tmp.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\1748.tmp.bat

    Filesize

    207B

    MD5

    cad0370ee3feed36f167a063a9552d8c

    SHA1

    03a354566ca477af3c247a038f401408835affde

    SHA256

    b32ba1bdcd5c377a2c4d8fcbdb8f5e2c704f5e09bc34aa058228aac78cc334ff

    SHA512

    81f519ab87b4b2e54a9358de61b549cfe885a48d1111279d9b99097084bd8c560421983b2ca8d54b2b749ce4a7936e5797f49ba088759fab475c7294a877fd00

  • \Windows\SysWOW64\tozaiqal.dll

    Filesize

    2.5MB

    MD5

    a84a08da55a5b0ed93dfa1bb06d14839

    SHA1

    4720e747c1ab1ac42182a0a42df57769919400ea

    SHA256

    31945bbe0bfd57cf0c5890fb16b3f7dae7f0565d2c3bf060a6dd3c2d19a5049b

    SHA512

    d772a3bd0247851ebcebad7c730f2cf067c21cdb590e98fd7a2bcfbc91a43220e8a9981b19ac9c3a141cb361ec8965dd674ee52e983292abf5182d6867bf10b8

  • memory/2372-12-0x0000000010000000-0x0000000010008000-memory.dmp

    Filesize

    32KB

  • memory/2372-21-0x0000000010000000-0x0000000010008000-memory.dmp

    Filesize

    32KB