Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    52s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2024, 22:54

Errors

Reason
Machine shutdown

General

  • Target

    153747a1dcd8b744c9786f816ce619a6_JaffaCakes118.msi

  • Size

    2.3MB

  • MD5

    153747a1dcd8b744c9786f816ce619a6

  • SHA1

    284f23673721cb8c47afe3b386d4c84b8ebd04de

  • SHA256

    7e137d2a5b6bd0ebfcc9116d84e9102065def969adbebf550befb7f333d70b22

  • SHA512

    5ff7d556553cb51cd5b860cec392f1282825f74b6829b6d13ac3c48bacc86145a857146c5d222b6b6e95771558bfe7c13a1739ab0bef5a6a127b27de21ceda02

  • SSDEEP

    49152:vBeroYyZ61blZlQBBpdUKF21E1bMCIBODxkALgJo2rL4Mixs7bToxth:XYyZeOBBpdUaMC9EJXJ4skxD

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Sets service image path in registry 2 TTPs 2 IoCs
  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 16 IoCs
  • Drops file in Windows directory 19 IoCs
  • Executes dropped EXE 1 IoCs
  • Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 46 IoCs
  • Modifies registry class 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\153747a1dcd8b744c9786f816ce619a6_JaffaCakes118.msi
    1⤵
    • Enumerates connected drives
    • Event Triggered Execution: Installer Packages
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2536
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Windows\Installer\MSI44E0.tmp
      "C:\Windows\Installer\MSI44E0.tmp" inst
      2⤵
      • Drops file in Drivers directory
      • Sets service image path in registry
      • Executes dropped EXE
      PID:2020
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2812
  • C:\Windows\system32\DrvInst.exe
    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005E4" "00000000000003A8"
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    PID:2732
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:640
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x1
      1⤵
        PID:1772

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Config.Msi\f77430b.rbs

        Filesize

        11KB

        MD5

        3fbe01dfed882ff9c253625d9b5488e5

        SHA1

        f3d43ec1e1d3f43ad11542d7e0150604a3b78d47

        SHA256

        98ee59d2fd2b1549e49e57de8e95f808378400a95f9be22712c12340afaa33e3

        SHA512

        4fde1b6ca58f08ad520dcf8332c05351deed0e2f2a6b157fa47815ce0044219b650bf9365b091fc2fe8e75cd341c6b5c327466023af8733b6f4a09ac1209b590

      • C:\Windows\Installer\MSI44E0.tmp

        Filesize

        39KB

        MD5

        7fc3802f8432044400b55c94f4f36dbc

        SHA1

        c35fc5465051a13c1f8423b6a23f860241fd2d08

        SHA256

        e2e7c49a68c490885841e6e39c80baf9b63ce1cad7ef67e3b4bb73a20ad88cdf

        SHA512

        4bc821ee545507d2181470b0aaff6bde36826466d9bb4639f387659164ad7ba3e6191805fabbbb32be5d4cc737070d495e528cc8fc66869f24cfb858e6c57c61

      • C:\Windows\Installer\f774309.msi

        Filesize

        2.3MB

        MD5

        153747a1dcd8b744c9786f816ce619a6

        SHA1

        284f23673721cb8c47afe3b386d4c84b8ebd04de

        SHA256

        7e137d2a5b6bd0ebfcc9116d84e9102065def969adbebf550befb7f333d70b22

        SHA512

        5ff7d556553cb51cd5b860cec392f1282825f74b6829b6d13ac3c48bacc86145a857146c5d222b6b6e95771558bfe7c13a1739ab0bef5a6a127b27de21ceda02

      • memory/2020-58-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB