Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2024, 06:33

General

  • Target

    0e61494eae62d4bf1da27a0ae9566ac9_JaffaCakes118.exe

  • Size

    111KB

  • MD5

    0e61494eae62d4bf1da27a0ae9566ac9

  • SHA1

    36b97b00d47923760b30bf0027ca6154d3b3c943

  • SHA256

    806f940cb5eb48df89e011d47888378af7466fe61743d5d01ceda32f0b8f9238

  • SHA512

    5ade2c5656c36470d5eff992214655e25eda4494ae87c0212a08dda732242e91c43514cfb3dd95c2bab90ccb90f962dca093cd6849c38612c79a3e6e83091692

  • SSDEEP

    1536:5P1ak2c8CgDwTvD+bFWU+L1i4QmOexXxBxmxZx44D4dMz4n4N4t4R4R7ILiJIIIQ:91akL8Mp4D4dMz4n4N4t4R4aEIIIIzH

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e61494eae62d4bf1da27a0ae9566ac9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0e61494eae62d4bf1da27a0ae9566ac9_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1812
    • C:\Users\Admin\lfkiej.exe
      "C:\Users\Admin\lfkiej.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2500

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\lfkiej.exe

    Filesize

    111KB

    MD5

    07e31c0c1e8bb4656fbbf8ab4bfe66d4

    SHA1

    acbfafb0dea49ef752ba230c168ce264c1798cc1

    SHA256

    df6573a275592556025a8694497394a2e90691cee604a6786de966ec4c4ed33e

    SHA512

    c09fc18cec6a77c7848304fd33249df6aed1cf005e86863888e2fce1d7197d71bbb9837447f68072530415ab0511220d50d7a70a382caecccacddd1a90377bb6