Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/09/2024, 01:41

General

  • Target

    f4e56e9d5dc66cc15930abbdca5c8c8b_JaffaCakes118.exe

  • Size

    795KB

  • MD5

    f4e56e9d5dc66cc15930abbdca5c8c8b

  • SHA1

    aa00952206545af5bd8d0890bf0c7802c08c830a

  • SHA256

    a424ecaea26cb2393afaafe05ca451ed818806de04fcd398ea99037a5de85bcd

  • SHA512

    8f6c245daae860262d2326c37b8ff524faecf8330bcd784fc55e9af06be5151504dfb52510e3e71054acc008b819f9107a0f124609a74726c77bbefeacb66530

  • SSDEEP

    24576:9Mw6ce/U26Cb5KaXKseD0nye08WIcshV/8+v:BI/U26CNZX9ektDhK+v

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f4e56e9d5dc66cc15930abbdca5c8c8b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f4e56e9d5dc66cc15930abbdca5c8c8b_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2092
    • C:\Users\Public\Downloads\Norton\{NIS19113-SHPD-FSD21017}\f4e56e9d5dc66cc15930abbdca5c8c8b_JaffaCakes118.exe
      C:\Users\Public\Downloads\Norton\{NIS19113-SHPD-FSD21017}\f4e56e9d5dc66cc15930abbdca5c8c8b_JaffaCakes118.exe /r
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Norton\FSDErMgt\ErrMgmt\SQCLIENT.dat

    Filesize

    2KB

    MD5

    ff303f12f10741efaf7bb364a08abdc2

    SHA1

    b17e3760635ccba8d515bd80e48bc594d4c5b538

    SHA256

    7cd6dad7195f35bd2cbc1a0a303a50913bbbef626bcb954017d15ccc40e1e4e2

    SHA512

    4f763ec17d7d247d0358f36bbe736a3d2a78b73b63a08a8aae5fe397a1efd3b688d4d2e9df82e2b158de6188ddd8a9988bb06b0bff6357f71ae5f2de44f49f19

  • C:\ProgramData\Norton\FSDUI-2024-09-25-01h41m55s.log

    Filesize

    1KB

    MD5

    0f9248f27d7185f965658d0488f0b36b

    SHA1

    0790f7f0c6c2c3ee7c3e385e1743fbad9373ba64

    SHA256

    65903b9568b175ebb0d01a66cf5bd204f92b1f1f53e2b213fb255001cabbff50

    SHA512

    4fcd747369b3aac1f7e00b2848f2a0042230cc6f57678aed4f42a3a9bcf95c04c0ff9a591c9f9a3ae2f01975b5cea33adc439ad83d5190150673ef54c33f4194

  • C:\ProgramData\Norton\{086A63F0-6B13-4F29-9695-134E7A01E963}\LC.INI

    Filesize

    157B

    MD5

    d4d20ff047f8c30e33639087e6eb6e59

    SHA1

    60cd8c86841100dbb458c8264294fcde821c18da

    SHA256

    3e86bf4df9585a7e8d64bb50bf22e26e319fd0fec56eed65f8a8da442b4c4b48

    SHA512

    bcc7f9cd48f1ec32ac4c693a79f85bced68acc153e8d700d30b28785245044677209d18e20fd2cf22723a28aa8a20b258b07908c7d8b464442d6ed98a9d9fbc5

  • C:\Users\Admin\AppData\Local\Temp\Cab7207.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1846800975-3917212583-2893086201-1000\4bd07e1ba952c6aa9bf83a8d98c08949_f9da27c9-c625-43c3-9b3a-b1344b01e128

    Filesize

    54B

    MD5

    9499c2f308410e48386f58ca7afccd2e

    SHA1

    e2ef9dec757aec938d801dd720fddc0c387da7af

    SHA256

    87e4fc1f82d5a89c7f10ca58cf5de66d184cc3ce02954a13ade3100414a3bc97

    SHA512

    ff68637e2b3b62cf6ca812bf4d067606edacb353825628048396c45e9be8ca7725c93787b8bcf82e610cf795f69a52b20d4ac48ade5405b114643af6515cf457

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Norton\Norton Download Manager.lnk

    Filesize

    1KB

    MD5

    506047201ff93a586b82f64cebb554d4

    SHA1

    3a1eec32e2990a545e874218b023f41bf5e27486

    SHA256

    36412d04a431e056e3f2ac061e426cbd656c25d6de4afabe9bab8140a8ccc4f4

    SHA512

    f673bb6bcd244a06ca11c30b7afd336beb321ac6530e5cea36051e440bbc99e728fa89b5d7ac522fb39439ebcf0dca867bc8582d58197baff03504012120d8c1

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Norton\Norton Installation Files.lnk

    Filesize

    1KB

    MD5

    d0e044fa81b462c0b35f5351ef21c2b9

    SHA1

    c091216f17d5cbeb2d2bfae58f3334cf731c97de

    SHA256

    30387e46cf993f23c569c3f5004a357cfd82baf6e44f6e508e0f7e91fd9307c4

    SHA512

    c49d40949efabb10b2a03cfa9b103c0f7b60ebbc25504b8ad6453dbc557ba0fd2da8178a0fd30b96490d7acb99953c93915ddb53046eabdb5da12351955947a7

  • C:\Users\Public\Downloads\Norton\{NIS19113-SHPD-FSD21017}\f4e56e9d5dc66cc15930abbdca5c8c8b_JaffaCakes118.exe

    Filesize

    795KB

    MD5

    f4e56e9d5dc66cc15930abbdca5c8c8b

    SHA1

    aa00952206545af5bd8d0890bf0c7802c08c830a

    SHA256

    a424ecaea26cb2393afaafe05ca451ed818806de04fcd398ea99037a5de85bcd

    SHA512

    8f6c245daae860262d2326c37b8ff524faecf8330bcd784fc55e9af06be5151504dfb52510e3e71054acc008b819f9107a0f124609a74726c77bbefeacb66530

  • memory/1892-60-0x0000000000400000-0x000000000067B000-memory.dmp

    Filesize

    2.5MB

  • memory/1892-28-0x0000000000400000-0x000000000067B000-memory.dmp

    Filesize

    2.5MB

  • memory/1892-38-0x0000000000760000-0x0000000000770000-memory.dmp

    Filesize

    64KB

  • memory/1892-93-0x0000000000400000-0x000000000067B000-memory.dmp

    Filesize

    2.5MB

  • memory/1892-48-0x0000000000760000-0x0000000000770000-memory.dmp

    Filesize

    64KB

  • memory/1892-69-0x0000000000760000-0x0000000000770000-memory.dmp

    Filesize

    64KB

  • memory/1892-61-0x0000000000400000-0x000000000067B000-memory.dmp

    Filesize

    2.5MB

  • memory/1892-29-0x0000000000230000-0x0000000000232000-memory.dmp

    Filesize

    8KB

  • memory/1892-59-0x0000000000230000-0x0000000000232000-memory.dmp

    Filesize

    8KB

  • memory/2092-21-0x0000000001FD0000-0x0000000001FE0000-memory.dmp

    Filesize

    64KB

  • memory/2092-1-0x00000000003B0000-0x00000000003B2000-memory.dmp

    Filesize

    8KB

  • memory/2092-32-0x0000000000400000-0x000000000067B000-memory.dmp

    Filesize

    2.5MB

  • memory/2092-0-0x0000000000400000-0x000000000067B000-memory.dmp

    Filesize

    2.5MB

  • memory/2092-25-0x0000000001FD0000-0x0000000001FE0000-memory.dmp

    Filesize

    64KB