Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    69s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/09/2024, 09:32

General

  • Target

    00a070f995feeb6cef385e2795d3d267_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    00a070f995feeb6cef385e2795d3d267

  • SHA1

    392beb989ceaeaf87f163c50348689f9c3f228cb

  • SHA256

    dc14091dd283ea5503280f9378c2abd570f658b08b97a901586b9d1f268f493d

  • SHA512

    474f440a935509f1cc88990c5711f992b4473c217558d3352ef61da42210d0857d27265a08fc2ab290fbeecc9e9db89950148dc7d66978768e06fe3de7432627

  • SSDEEP

    24576:hAkWrPamBGBL2Vp/Z9x6VFoas4+0U8hdHgyVo+F4CbdKy6vcr:hkZGBL27kwap+0U8hJE+FXd7lr

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 14 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 34 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00a070f995feeb6cef385e2795d3d267_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\00a070f995feeb6cef385e2795d3d267_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Windows\SysWOW64\explorer.exe
      explorer C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2336
    • C:\Windows\SysWOW64\7533b0\W43D57A.EXE
      C:\Windows\system32\\7533b0\W43D57A.EXE
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2876
      • C:\Windows\SysWOW64\7533b0\NT-4159DA23.EXE
        C:\Windows\SysWOW64\7533b0\NT-4159DA23.EXE 4|-|SOFTWARE\Microsoft\Windows\CurrentVersion\Run\FC4F2D|-|C:\Windows\SysWOW64\7533b0\W43D57A.EXE|-|0
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1152
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    PID:2928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\7533b0\HtmlView.fne

    Filesize

    212KB

    MD5

    4c9e8f81bf741a61915d0d4fc49d595e

    SHA1

    d033008b3a0e5d3fc8876e0423ee5509ecb3897c

    SHA256

    951d725f4a12cd4ff713ca147fa3be08a02367db6731283c3f1ba30445990129

    SHA512

    cf2c6f8f471c8a5aad563bc257035515860689b73ce343599c7713de8bc8338a031a722f366e005bc1907d6fc97b68b8b415e8ff05b7324fb1040c5dc02315d7

  • C:\Windows\SysWOW64\7533b0\W43D57A.EXE

    Filesize

    47KB

    MD5

    0271e117f0345ba46ffea502d03c86d2

    SHA1

    2350ad29d9462f99e867ee8022c4cbb3c8b8b4de

    SHA256

    21d719955b0893032aa7ffde54d8abd3c219181c6a9a29871c0a7eb536306346

    SHA512

    5fa36016d8cc1d8853b9e455345e873f32b3b263f019566a3ce35b65a69c8f8020942cd85c563f5ca647f18224ac4e3fc3f94eeb2bdfebefe435a57981158c6e

  • C:\Windows\SysWOW64\7533b0\dp1.fne

    Filesize

    124KB

    MD5

    c6c43f32ffc97272fddeb3dd480657b1

    SHA1

    311d8c071c8aa9fc1443803e552301bbf06e990e

    SHA256

    8832bdbc8231842a6d79c972cc9a6d8327ef674a4a2310fa43c731dea3383c17

    SHA512

    e00d1a818a33fde84ad04253e00115cc885cddfcb773c1a96820f9b8b27daa6f28ec3bd9f2e31912f8e2e6fa61d4b437edc796a9498605aeff90ebbff1fb699e

  • C:\Windows\SysWOW64\7533b0\eAPI.fne

    Filesize

    328KB

    MD5

    7bcb58659e959d65514c45cd01bfc8e4

    SHA1

    c2f41529a536c746ac0cf92c026dea65798f3ee7

    SHA256

    f37248aa68d84818fba2b1ea160d7eec4d3f426eeca4d215c8db8d8389d18388

    SHA512

    0b33bbcb059de95e74e9e115fb09ca73846720041113c9cab10e5dec40024136241d66a92181527e36db714c4c96ee532b7df00ae2c10798d8bea947f6762217

  • \Users\Admin\AppData\Local\Temp\E_N4\krnln.fnr

    Filesize

    1.1MB

    MD5

    54e586fb1643679e7d6ce885ad679a78

    SHA1

    899a490553e6460d63c8ba41999873652943ce8a

    SHA256

    60034f94c565dc91fa569019685efbfcf475ebf967d0bbab02b8177dfab0619c

    SHA512

    a129b24855429ce804467103846832ab3b126fb190ec6ccf473cd6db7455689abef6799c42a874a2531af74b29d74c2882ca4b11ca748be3adef91d147d51727

  • memory/1152-74-0x0000000010000000-0x000000001011D000-memory.dmp

    Filesize

    1.1MB

  • memory/1152-72-0x0000000001EA0000-0x0000000001ED8000-memory.dmp

    Filesize

    224KB

  • memory/1152-76-0x0000000010000000-0x000000001011D000-memory.dmp

    Filesize

    1.1MB

  • memory/1152-75-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2372-13-0x0000000000340000-0x0000000000361000-memory.dmp

    Filesize

    132KB

  • memory/2372-25-0x0000000000370000-0x000000000037F000-memory.dmp

    Filesize

    60KB

  • memory/2372-2-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2372-26-0x0000000000370000-0x000000000037F000-memory.dmp

    Filesize

    60KB

  • memory/2372-48-0x0000000000400000-0x000000000046A000-memory.dmp

    Filesize

    424KB

  • memory/2372-5-0x0000000010000000-0x000000001011D000-memory.dmp

    Filesize

    1.1MB

  • memory/2372-49-0x0000000010000000-0x000000001011D000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-28-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2876-34-0x0000000001D40000-0x0000000001D78000-memory.dmp

    Filesize

    224KB

  • memory/2876-45-0x0000000001E50000-0x0000000001E5C000-memory.dmp

    Filesize

    48KB

  • memory/2876-61-0x0000000002810000-0x000000000281C000-memory.dmp

    Filesize

    48KB

  • memory/2876-69-0x0000000002810000-0x000000000281F000-memory.dmp

    Filesize

    60KB

  • memory/2876-42-0x0000000000410000-0x0000000000431000-memory.dmp

    Filesize

    132KB

  • memory/2876-38-0x0000000001F50000-0x0000000001FB1000-memory.dmp

    Filesize

    388KB

  • memory/2876-82-0x0000000002810000-0x000000000281C000-memory.dmp

    Filesize

    48KB

  • memory/2876-31-0x0000000010000000-0x000000001011D000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-78-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/2876-79-0x0000000010000000-0x000000001011D000-memory.dmp

    Filesize

    1.1MB

  • memory/2876-80-0x0000000000410000-0x0000000000431000-memory.dmp

    Filesize

    132KB

  • memory/2876-81-0x0000000001E50000-0x0000000001E5C000-memory.dmp

    Filesize

    48KB

  • memory/2928-46-0x0000000003990000-0x00000000039A0000-memory.dmp

    Filesize

    64KB