Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    27/09/2024, 13:06

General

  • Target

    fa75201150e65da4c9ca4b2918fda8c0_JaffaCakes118.exe

  • Size

    634KB

  • MD5

    fa75201150e65da4c9ca4b2918fda8c0

  • SHA1

    21134f1d7070d5523f7a5ac111f5c58065e49706

  • SHA256

    0ab1285578f78e68b432e02381b9657be60207ffeb7608a7f810ec4d58ce00fb

  • SHA512

    97180f7214485449cd1c16a6350b10644002447f210d9b30e4a26885a206c0820c01a9605dde8127874cb4122fd717a72b24a568cf23ebfb7b800fe44b5ffc28

  • SSDEEP

    12288:QwwSUjd9p3KRRLPI5ES7HcPhoF3Z4mxxmDqVTVOC6e:vaFwS78PmQmXFVTzT

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa75201150e65da4c9ca4b2918fda8c0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fa75201150e65da4c9ca4b2918fda8c0_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1988
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\uninstal.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2916
  • C:\Windows\Hacker.com.cn.exe
    C:\Windows\Hacker.com.cn.exe
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Hacker.com.cn.exe

    Filesize

    634KB

    MD5

    fa75201150e65da4c9ca4b2918fda8c0

    SHA1

    21134f1d7070d5523f7a5ac111f5c58065e49706

    SHA256

    0ab1285578f78e68b432e02381b9657be60207ffeb7608a7f810ec4d58ce00fb

    SHA512

    97180f7214485449cd1c16a6350b10644002447f210d9b30e4a26885a206c0820c01a9605dde8127874cb4122fd717a72b24a568cf23ebfb7b800fe44b5ffc28

  • C:\Windows\uninstal.bat

    Filesize

    218B

    MD5

    c411046316e4218f4f196e685d6ef047

    SHA1

    afc26ffcc646587c1f3aba082899444e79c196a0

    SHA256

    35b629c856ca7a0a244ae63b1cd2e2e53733f1bb55c13912ecbdc8366479cccb

    SHA512

    d10507200e4b86c941f89932f52eecdd9667cf7516e7dc1ef1fae3396328e0365498efe21d095c211bc05d912bc6c7153e1ffee8a3e64a9d0259131f15ae1aa8

  • memory/1988-6-0x0000000001E20000-0x0000000001E21000-memory.dmp

    Filesize

    4KB

  • memory/1988-34-0x0000000000590000-0x00000000005E4000-memory.dmp

    Filesize

    336KB

  • memory/1988-16-0x00000000032B0000-0x00000000032B1000-memory.dmp

    Filesize

    4KB

  • memory/1988-15-0x00000000032C0000-0x00000000032C1000-memory.dmp

    Filesize

    4KB

  • memory/1988-14-0x0000000000200000-0x0000000000201000-memory.dmp

    Filesize

    4KB

  • memory/1988-13-0x00000000001F0000-0x00000000001F1000-memory.dmp

    Filesize

    4KB

  • memory/1988-12-0x0000000003380000-0x0000000003381000-memory.dmp

    Filesize

    4KB

  • memory/1988-11-0x0000000003280000-0x0000000003283000-memory.dmp

    Filesize

    12KB

  • memory/1988-10-0x0000000003290000-0x0000000003291000-memory.dmp

    Filesize

    4KB

  • memory/1988-9-0x0000000001D80000-0x0000000001D81000-memory.dmp

    Filesize

    4KB

  • memory/1988-8-0x0000000002330000-0x0000000002331000-memory.dmp

    Filesize

    4KB

  • memory/1988-7-0x0000000001E10000-0x0000000001E11000-memory.dmp

    Filesize

    4KB

  • memory/1988-17-0x00000000032A0000-0x00000000032A1000-memory.dmp

    Filesize

    4KB

  • memory/1988-0-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/1988-18-0x0000000001DF0000-0x0000000001DF1000-memory.dmp

    Filesize

    4KB

  • memory/1988-3-0x0000000002320000-0x0000000002321000-memory.dmp

    Filesize

    4KB

  • memory/1988-2-0x0000000001D90000-0x0000000001D91000-memory.dmp

    Filesize

    4KB

  • memory/1988-1-0x0000000000590000-0x00000000005E4000-memory.dmp

    Filesize

    336KB

  • memory/1988-4-0x0000000001D70000-0x0000000001D71000-memory.dmp

    Filesize

    4KB

  • memory/1988-33-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/1988-5-0x0000000001D60000-0x0000000001D61000-memory.dmp

    Filesize

    4KB

  • memory/1988-19-0x0000000001D50000-0x0000000001D51000-memory.dmp

    Filesize

    4KB

  • memory/2816-24-0x0000000000580000-0x00000000005D4000-memory.dmp

    Filesize

    336KB

  • memory/2816-23-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/2816-36-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/2816-37-0x0000000000580000-0x00000000005D4000-memory.dmp

    Filesize

    336KB