Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    30/09/2024, 11:49

General

  • Target

    012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe

  • Size

    408KB

  • MD5

    012956475b26cbdf95e0c37fb49df4b5

  • SHA1

    495780916fd0cf2d293ae78931b942e99edfc5e9

  • SHA256

    5a2404f77f0bc03e7b0881c1e44361ca04d3790d30663211c371ad808a49098a

  • SHA512

    ba01c3f12d3b1e8accdb8acf123be80ac5db88b8718a34e7e226dc92df16b27c711e320ad08fd1d144b38b1bbdee405fd41dd21f1dd2c20d3a6e74736addedc8

  • SSDEEP

    12288:hw7GJF+yDSO+2Rz8++HxBETNUCUeQozxfcI:Wy5WJ/0zZcI

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 3 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1184
      • C:\Users\Admin\AppData\Local\Temp\012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\012956475b26cbdf95e0c37fb49df4b5_JaffaCakes118.exe"
        2⤵
        • Checks BIOS information in registry
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:1476
        • C:\Windows\SERVER.EXE
          "C:\Windows\SERVER.EXE"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2360
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
      1⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      PID:2840

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\COLLINES.JPG

      Filesize

      27KB

      MD5

      6fb2a38dc107eacb41cf1656e899cf70

      SHA1

      4eee44b18576e84de7b163142b537d2fe6231845

      SHA256

      62e85a0f3a4cbc01b6d3390d63de0f7d051e1e723aeb071416a38799c50738ea

      SHA512

      939f4a7f03996833d54a36f608949a579a7e6c37f5a477694287158fae1403bce8b5b57603ac45f8caf683129f918093e5663703c05d44e78e9e3606a0d683fb

    • C:\Windows\SERVER.EXE

      Filesize

      28KB

      MD5

      8fbc616195317fe76e9830ef73649e46

      SHA1

      a20e6898fe63a88dab5f4de21b4cf17405b90147

      SHA256

      8eaca2d838cf928fdf33a322750c0d2a545f022a71138ad9f256d57993390fb0

      SHA512

      227f713e7e83eb9634c8940ed9a8e4af00c31415a7c42784afecf81aeb50edf9b5165726df085481caf78cadf411f47fb866eb5144c8a9dbdb82167484a4fd06

    • memory/1184-15-0x000000007FFF0000-0x000000007FFF1000-memory.dmp

      Filesize

      4KB

    • memory/1184-21-0x000000007EFC0000-0x000000007EFC6000-memory.dmp

      Filesize

      24KB

    • memory/1476-12-0x0000000002300000-0x0000000002410000-memory.dmp

      Filesize

      1.1MB

    • memory/1476-9-0x0000000003A30000-0x0000000003A39000-memory.dmp

      Filesize

      36KB

    • memory/1476-1-0x0000000002300000-0x0000000002410000-memory.dmp

      Filesize

      1.1MB

    • memory/1476-5-0x0000000003A30000-0x0000000003A39000-memory.dmp

      Filesize

      36KB

    • memory/1476-24-0x0000000003C50000-0x0000000003C52000-memory.dmp

      Filesize

      8KB

    • memory/1476-31-0x0000000000400000-0x00000000007E6000-memory.dmp

      Filesize

      3.9MB

    • memory/1476-0-0x0000000000400000-0x00000000007E6000-memory.dmp

      Filesize

      3.9MB

    • memory/2360-13-0x0000000010000000-0x0000000010011000-memory.dmp

      Filesize

      68KB

    • memory/2360-40-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/2360-38-0x0000000010000000-0x0000000010011000-memory.dmp

      Filesize

      68KB

    • memory/2840-25-0x0000000000230000-0x0000000000232000-memory.dmp

      Filesize

      8KB

    • memory/2840-30-0x0000000000340000-0x0000000000341000-memory.dmp

      Filesize

      4KB

    • memory/2840-42-0x0000000000340000-0x0000000000341000-memory.dmp

      Filesize

      4KB