Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27/09/2024, 10:38

General

  • Target

    fa4092046c87ccbe8b8dcf67dd006b6a_JaffaCakes118.exe

  • Size

    248KB

  • MD5

    fa4092046c87ccbe8b8dcf67dd006b6a

  • SHA1

    25263a5f5acd63a0ddb8c3b54f6b8bdbcf1e6439

  • SHA256

    a8cca8cf2fb062e97ae8fcbb73669e1cf4b89d2f070b262617eab5a69971afa3

  • SHA512

    394cc91dbe6f684d82df5ea2dc3a86418cf8ac27820e6135c5da5598251f3d5bb2cd29ab610596c99291be826e6570ea65a7d9b5e4ff6297d4bfd7e4477dd195

  • SSDEEP

    6144:m2M5CElofkFWQPtnRneqAKnvmb7/D269fgwMty0e6ndv0DyVr:mt5CLkFfnRnWKnvmb7/D26qndv0D+

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa4092046c87ccbe8b8dcf67dd006b6a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fa4092046c87ccbe8b8dcf67dd006b6a_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2508
    • C:\Users\Admin\mkwez.exe
      "C:\Users\Admin\mkwez.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\mkwez.exe

    Filesize

    248KB

    MD5

    0f1871e5cc589cd78fb5f8e30cdda436

    SHA1

    10da0fcff1a912bc7e15218daf70e9c1e07a8c35

    SHA256

    ecd940bf28283bf5731d94f064d277827267b0d721f316648cf7bd3f7ec6ab17

    SHA512

    1e3a1f7237e385a508f5bef499dfbf34762985969bd69844a59e680b65ee89045ded66a88315930532088cf41f1eb791965985783de9c62dd6aab2046ff34727