Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2024, 21:47

General

  • Target

    078cf928167301554726a6af8f53d082_JaffaCakes118.exe

  • Size

    275KB

  • MD5

    078cf928167301554726a6af8f53d082

  • SHA1

    d36e949908407dd7cadef0c0167b377321e337b0

  • SHA256

    f1b6e11622a33f734bd008dd1502b94404eff6bba304a316c42bac7156e12264

  • SHA512

    fd2acd9d7d66cf9771289955d3435203c7ef103bfea25b7a10a9aa93b2012ec0538ae9777800c40282e9a7b43484c3619def237bad4469015f1f19704ac33a5d

  • SSDEEP

    6144:AB/ImQ7AKAiBmU9fvIJw5Gle2rRBL8+bw+MH:y/IUChNwJbe2rRZ8+LM

Malware Config

Signatures

  • Modifies security service 2 TTPs 1 IoCs
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Disables taskbar notifications via registry modification
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 18 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\078cf928167301554726a6af8f53d082_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\078cf928167301554726a6af8f53d082_JaffaCakes118.exe"
    1⤵
    • Modifies security service
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2304
    • C:\Users\Admin\AppData\Local\Temp\078cf928167301554726a6af8f53d082_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\078cf928167301554726a6af8f53d082_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\8933A\D117E.exe%C:\Users\Admin\AppData\Roaming\8933A
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1912
    • C:\Users\Admin\AppData\Local\Temp\078cf928167301554726a6af8f53d082_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\078cf928167301554726a6af8f53d082_JaffaCakes118.exe startC:\Program Files (x86)\3A83F\lvvm.exe%C:\Program Files (x86)\3A83F
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2356
    • C:\Program Files (x86)\LP\7E68\EFE.tmp
      "C:\Program Files (x86)\LP\7E68\EFE.tmp"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3024
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1820
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\8933A\A83F.933

    Filesize

    1KB

    MD5

    a014de475d8ae679532091c41f47340b

    SHA1

    4ba36fb3deaccaf343f096e3019a95e038000feb

    SHA256

    add5a86e154874c91f813cb0c2457141348f9d29d64931a5b24939351e4b1f4e

    SHA512

    7f35dbe10a6d57205f387ed2a1f12ff4e03277a76cde5fb91340ed5fd3f3562cce4abd4ce82e3e3f200c012ffd33d64284992c61f9d700674f6d008add38cc74

  • C:\Users\Admin\AppData\Roaming\8933A\A83F.933

    Filesize

    1KB

    MD5

    fdca4956213dc7110f4445d0d94a0080

    SHA1

    8dc0e4f4104e49420836f1653fda16cb34bfd93b

    SHA256

    458dabfa039f88a41fc209001dd36a2e6e2ac1313d79449cfded5d4f4ddb7e89

    SHA512

    32c57feb342078076e8ab4f76df629ade73ba183efb20dd531ab6585acd7d6c23472ccdd570b005009e9ea4264706d34a839401e79ec9ac1bc1a9810cfb45954

  • C:\Users\Admin\AppData\Roaming\8933A\A83F.933

    Filesize

    600B

    MD5

    ba9285d3540d54c264b012c51261eeb9

    SHA1

    53a06c282103c5e2c5e14a21954fd70ba1caf63a

    SHA256

    f56dd1662c0a1b06a00576f4012e319403bfa0c03eb4b61510b2b088dd4c8e4e

    SHA512

    c42fbffea75033bde23a34a6e2e8253f15632c3486234f2f7e4126d4eef5def3e704e41e0e904e5ca307eae30fa2b647b32863fd659d533c8fd48490901ccb52

  • C:\Users\Admin\AppData\Roaming\8933A\A83F.933

    Filesize

    996B

    MD5

    f4658ad05887246a8ddfdfc22b65dce3

    SHA1

    0178e741b8876cf69fc5b1c5af99eb62b79beadb

    SHA256

    2ec3924b55d6cd93eea0a4f1f1092c775d0a862b73b174bf8ee6fa78ce1454c3

    SHA512

    0ba858b62a2d880873bc6e6479651397ee4c4e239078f0bd94cc911ed07c709077b967c8150651ef56fb07feba00f8c4b8019be44b80f3a83e1bb7a3bd949b47

  • \Program Files (x86)\LP\7E68\EFE.tmp

    Filesize

    98KB

    MD5

    7bcdd69e096631aa9d2ed6740fea7003

    SHA1

    f9e3911cf42623317a3a2dca1b7c42eef691f106

    SHA256

    3266d081c78f984aa74c555ba61b7f2d80ee98d657cce2e4ce3bd9cd8e77de63

    SHA512

    e1d4b814d1ebab64b43fc074e2dea0fa7af01856cf5fdef52b1687095263af65d6d06ad0589fe51da2ee5c496be5e3ac1195a54af26f0c3f9f2c93057de755d5

  • memory/1912-14-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/1912-12-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2304-15-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/2304-83-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2304-16-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2304-1-0x0000000000400000-0x0000000000468000-memory.dmp

    Filesize

    416KB

  • memory/2304-161-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2304-2-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2304-204-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2356-82-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2356-81-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/3024-200-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB