Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    91s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    25/09/2024, 11:03

General

  • Target

    f5ddfbc690027ada4818d3e6a69aa7e3_JaffaCakes118.exe

  • Size

    146KB

  • MD5

    f5ddfbc690027ada4818d3e6a69aa7e3

  • SHA1

    ea760f631a0b20fe9daf11b33f47e2d043f57404

  • SHA256

    3bf845ed70deb54e190a228e6aaf434f6bdd80d67542ebd5066b44212ce8cf2f

  • SHA512

    630dadef348b160d5d7544c46867c732b710e17e8b2eb32117f52f57486be9b64b757ad198b4524d6f1aaaf610b95c046f17af61ea4ab365391393e5c6dae98b

  • SSDEEP

    3072:wWm8HS0aGO6gfQtAZgB5TNgrJc3WE7I7gx:FG/QtA8IJcmwI7m

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f5ddfbc690027ada4818d3e6a69aa7e3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f5ddfbc690027ada4818d3e6a69aa7e3_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2636
    • C:\Users\Admin\AppData\Local\Temp\br1ddgv4bvg.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
      C:\Users\Admin\AppData\Local\Temp\br1ddgv4bvg.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2684
      • C:\Users\Admin\AppData\Local\Temp\nhys1o4pgjf.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
        C:\Users\Admin\AppData\Local\Temp\nhys1o4pgjf.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2160
        • C:\Windows\apocalyps32.exe
          -bs
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3040
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
              PID:2532

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\br1ddgv4bvg.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

      Filesize

      123KB

      MD5

      7aa244f62e806e0486d0b0606893dab3

      SHA1

      54c7814f1ec1a8b138dee4bdf0ccac19e36f462e

      SHA256

      fd0f8cc3cc7b482d53d825916d47fc8a8d2d538856b105026ab735b2e26d643b

      SHA512

      904aac24b6a8d4fa5223fe0700ca50958dc29a8a81be8783ef47674b2d1c7e0aa76cd38cb6c4dcf492cee612ee1ff026835690539353eb29b1f45a62103e6bd4

    • C:\Users\Admin\AppData\Local\Temp\nhys1o4pgjf.$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

      Filesize

      106KB

      MD5

      7af4ec08a58cc1e024c0eb7c368cfbd1

      SHA1

      0691d44f5a8c9441878bc9decf65f7d22b124a40

      SHA256

      56e54796089c9dc3d020405e4d9081b831a6aeb3360c3e1cbba4fdbee8619481

      SHA512

      50b0956b62d3b3be124806cf4d5aea2b12375eeb2daef1857c5fb8be850ebdf776aafc6de87cbacd8b715b3e3d4a1b6e4b2a37f9602d28b729f012a1413a4d7d

    • memory/2160-25-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB

    • memory/2160-17-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB

    • memory/2636-3-0x000007FEF3FE0000-0x000007FEF497D000-memory.dmp

      Filesize

      9.6MB

    • memory/2636-9-0x000007FEF3FE0000-0x000007FEF497D000-memory.dmp

      Filesize

      9.6MB

    • memory/2636-0-0x000007FEF429E000-0x000007FEF429F000-memory.dmp

      Filesize

      4KB

    • memory/2636-2-0x000007FEF3FE0000-0x000007FEF497D000-memory.dmp

      Filesize

      9.6MB

    • memory/2636-1-0x000007FEF3FE0000-0x000007FEF497D000-memory.dmp

      Filesize

      9.6MB

    • memory/2684-10-0x000007FEF3FE0000-0x000007FEF497D000-memory.dmp

      Filesize

      9.6MB

    • memory/2684-8-0x000007FEF3FE0000-0x000007FEF497D000-memory.dmp

      Filesize

      9.6MB

    • memory/2684-34-0x000007FEF3FE0000-0x000007FEF497D000-memory.dmp

      Filesize

      9.6MB

    • memory/3040-35-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB

    • memory/3040-30-0x0000000040010000-0x000000004004C000-memory.dmp

      Filesize

      240KB

    • memory/3040-27-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB