Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    25/09/2024, 17:24

General

  • Target

    f67fb6e8560fbd1130f21cb4726c3d8b_JaffaCakes118.exe

  • Size

    157KB

  • MD5

    f67fb6e8560fbd1130f21cb4726c3d8b

  • SHA1

    bdf8f804a26b6470c0026d2617a92195f6cea4f8

  • SHA256

    45379b2a4ab8f51a5c3317273dbe29a159f70f6d84739b5a3d8dc27c25a02d18

  • SHA512

    28eea5780818a4abb967e95b6b6c56003122d549f2ed4ba2804c0f47bcd99cd9e4f10110e4026deba2c0cd8407ccd19a66ae2a6b837be040af4b764cee3c1fbe

  • SSDEEP

    3072:6j9mD4Pa78AgZUUeXUbsCDUOBYJwyrN/sVywaEj1UszBt:6jYD4PawAJ1U4CDU3nh9wv1UABt

Malware Config

Signatures

  • Modifies WinLogon 2 TTPs 8 IoCs
  • Drops file in System32 directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f67fb6e8560fbd1130f21cb4726c3d8b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f67fb6e8560fbd1130f21cb4726c3d8b_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:2124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\lcss.exe

    Filesize

    147KB

    MD5

    be22c6a27f23ff31c1b16d52e985e0f3

    SHA1

    b8ba9442355587c14872e63fce37c5b5042b1be8

    SHA256

    56daa815f36ca461c63eb94506b0f4637700cea89443d270fb80882b72f71b69

    SHA512

    78d4b0408e1bdbb9ae5057d29243a9d90fbe8fc84b3662825e622e400110ffa39de215110cedb6398e4fd0181b444b610b3dde0c02c43c8e920f0be102e0ef01

  • C:\Windows\SysWOW64\net.cpl

    Filesize

    114KB

    MD5

    de9590cffe66df2c6e427885a48ee426

    SHA1

    e9d26b391ea40bb77dd9dc59e8dec2a38b320657

    SHA256

    f3378466828ddd35c0a2005e43b3d5155d56dd4d0a646843ad0842e55d5df6ba

    SHA512

    debbe33822f91ca64b12a3377316b438e61beebe67abc81a29424d98db1eb30150ac99896fd4bd85fe5a0081df0c7764ae638c2cdf39a7f1c02e7ccd8e130bc6

  • memory/2124-24-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB