Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27/09/2024, 14:27

General

  • Target

    fa92e9531f6e0b5a12e112536d578eda_JaffaCakes118.exe

  • Size

    380KB

  • MD5

    fa92e9531f6e0b5a12e112536d578eda

  • SHA1

    243e9d74da1438ab6a184ab5bd51384016ea191e

  • SHA256

    64ec94dd241c5e47783b051dbdfc66308da8e41b25fb5740d4d3738e24171152

  • SHA512

    9b0f9f9b2def1c5fd745db27fd02de540cd6a2d2f349214dedd8bbe85d148e75af7b606724762acceeda03a5ee5daa0d268af17c8e7b2466601dadd9c0e4f507

  • SSDEEP

    6144:ScOGgBrKnU1zXixxtSFYcApt5UReHGvWLuL+YCCn+HRPKQZoMN0HF1L/mUd5x9S1:CtB/ExXRssU+YCUiJZ5N0l1L/mUdUKC6

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa92e9531f6e0b5a12e112536d578eda_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fa92e9531f6e0b5a12e112536d578eda_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2688
    • C:\ProgramData\iCfPaLn01803\iCfPaLn01803.exe
      "C:\ProgramData\iCfPaLn01803\iCfPaLn01803.exe" "C:\Users\Admin\AppData\Local\Temp\fa92e9531f6e0b5a12e112536d578eda_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:3180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \ProgramData\iCfPaLn01803\iCfPaLn01803.exe

    Filesize

    380KB

    MD5

    a94c6ff6d855628388fee91933918368

    SHA1

    c4c09d111f5454eb690ffce3c2bd63cc281efa18

    SHA256

    81213ac146cb66b1b5ca50ded6423bdf7887e23514517c28add90839865cf68f

    SHA512

    2c7e5e1feae40ea78f9c36d46f4260f89f7a0ca6ddc0f9daeabd7e1ce82be7a0a3e0b133c0927a6e917517a63065701d056f793e41bd777c94c366afbea446d4

  • memory/2688-1-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2688-2-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/2688-17-0x0000000000400000-0x00000000004B2000-memory.dmp

    Filesize

    712KB

  • memory/2688-18-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/3180-13-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/3180-20-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB

  • memory/3180-28-0x0000000000400000-0x00000000004B5000-memory.dmp

    Filesize

    724KB