Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    139s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2024, 06:27

General

  • Target

    ef3aed7254adf356e4930b868de4fe74_JaffaCakes118.exe

  • Size

    184KB

  • MD5

    ef3aed7254adf356e4930b868de4fe74

  • SHA1

    c93a7d2976c3eeece7be37aca195faa7a8caaab0

  • SHA256

    706ab4d535399fd77557b4cf003c7de1d4f47ddbebf573f65faeba047fec8e75

  • SHA512

    19f19082ce976b7e2755d2886d99f9d0648e2c4d459d190e338c6e7992a2814a79182771c60650e1f5d05bd0c7a1af530944ecf26cf960b2675096a58e48d471

  • SSDEEP

    3072:Rz5LdqPwuFKcnnhVvKPNLY7jpJJSi7IfK7yfK/csqGwyHnCd/HGoafby4:d5JQbbnn/6Y/bJSqwvGwyid/Bafu

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\csrss.exe
    %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
    1⤵
    • Executes dropped EXE
    • Drops desktop.ini file(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:336
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:864
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1152
      • C:\Users\Admin\AppData\Local\Temp\ef3aed7254adf356e4930b868de4fe74_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\ef3aed7254adf356e4930b868de4fe74_JaffaCakes118.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1580
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe"
          3⤵
          • Deletes itself
          • System Location Discovery: System Language Discovery
          PID:2132
    • C:\Windows\system32\wbem\wmiprvse.exe
      C:\Windows\system32\wbem\wmiprvse.exe -Embedding
      1⤵
        PID:960

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\system32\consrv.dll

        Filesize

        52KB

        MD5

        6bf2039986af96d98e08824ac6c383fd

        SHA1

        0bb6384656a96943cb427baa92446f987219a02e

        SHA256

        a3e03454ff636f4cdd0a95b856ea9e7857cd3ce0fd2bc6d528ab45781349103f

        SHA512

        fae378badcd6b45d69705d11fe5feb2d9f93fa444249c13aff9b150359ffdbcfe2b160731e193d3e19b6eef18d2ef01de41549a1c2bbdf59501f901511f9068e

      • \??\globalroot\systemroot\assembly\temp\@

        Filesize

        2KB

        MD5

        18413ee361605f46c5c440d5ebc206e5

        SHA1

        04a1e375b93e9550ff6f590f6147c8821e87f023

        SHA256

        09e37a25aa38827592d003f26a33aaed29f5d2156d015dc4786bf082ec807eb4

        SHA512

        dc527fe797d16c1025d98dc0e8500a9da608a893ae5632c5fe538e3b95d307204ffdf6e7efc34a2626d095ccd54371300bc2c99d6d794f42409c1c9583d5fc09

      • memory/336-28-0x0000000000C10000-0x0000000000C21000-memory.dmp

        Filesize

        68KB

      • memory/336-22-0x0000000000C10000-0x0000000000C21000-memory.dmp

        Filesize

        68KB

      • memory/336-19-0x00000000004C0000-0x00000000004C1000-memory.dmp

        Filesize

        4KB

      • memory/336-21-0x0000000000C10000-0x0000000000C21000-memory.dmp

        Filesize

        68KB

      • memory/864-169-0x0000000000C60000-0x0000000000C6B000-memory.dmp

        Filesize

        44KB

      • memory/864-30-0x0000000000C50000-0x0000000000C5B000-memory.dmp

        Filesize

        44KB

      • memory/864-31-0x0000000000C40000-0x0000000000C48000-memory.dmp

        Filesize

        32KB

      • memory/864-35-0x0000000000C50000-0x0000000000C5B000-memory.dmp

        Filesize

        44KB

      • memory/864-40-0x0000000000C60000-0x0000000000C6B000-memory.dmp

        Filesize

        44KB

      • memory/864-39-0x0000000000C50000-0x0000000000C5B000-memory.dmp

        Filesize

        44KB

      • memory/1152-14-0x00000000025E0000-0x00000000025E6000-memory.dmp

        Filesize

        24KB

      • memory/1152-10-0x00000000025E0000-0x00000000025E6000-memory.dmp

        Filesize

        24KB

      • memory/1152-6-0x00000000025E0000-0x00000000025E6000-memory.dmp

        Filesize

        24KB

      • memory/1152-5-0x00000000025D0000-0x00000000025D2000-memory.dmp

        Filesize

        8KB

      • memory/1580-27-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/1580-26-0x0000000000220000-0x0000000000246000-memory.dmp

        Filesize

        152KB

      • memory/1580-0-0x0000000000220000-0x0000000000246000-memory.dmp

        Filesize

        152KB

      • memory/1580-3-0x0000000000401000-0x0000000000402000-memory.dmp

        Filesize

        4KB

      • memory/1580-2-0x0000000000280000-0x0000000000281000-memory.dmp

        Filesize

        4KB

      • memory/1580-1-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/1580-4-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB