Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    14s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2024, 04:19

General

  • Target

    11ceef2c381a5aa0b6dabb50158f8cc7_JaffaCakes118.exe

  • Size

    333KB

  • MD5

    11ceef2c381a5aa0b6dabb50158f8cc7

  • SHA1

    5ceb028c5c525a8bca8fb2ad41a594265933bdb7

  • SHA256

    bd7ae6460bee4a39a8eb3d5e01135359bb5eebde33d288edf3b47aff7f737a23

  • SHA512

    ea4c7c04b5020401910c3562955822874047b9ff5bf5a148ba8a4c8288021e1cf22fe6d452b3f5eca0191db8d938925c8f1b2570745a28c71bb2569ab92536d1

  • SSDEEP

    6144:IXYxnf+cBTvBcMnvgIRoJU6yXQx3FzaO5BLjJoxGq6IE5y+:IXYxf+0cMnvgIRoJx99VFYGq6z

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\11ceef2c381a5aa0b6dabb50158f8cc7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\11ceef2c381a5aa0b6dabb50158f8cc7_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2376
    • C:\Users\Admin\AppData\Local\Xenocode\Sandbox\1.0.0.0\2010.08.22T13.27\Virtual\STUBEXE\@APPDATALOCAL@\Temp\server.exe
      "C:\Users\Admin\AppData\Local\Temp\server.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1448
      • C:\Users\Admin\AppData\Local\Xenocode\Sandbox\1.0.0.0\2010.08.22T13.27\Native\STUBEXE\@SYSTEM@\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1448 -s 200
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Xenocode\Sandbox\1.0.0.0\2010.08.22T13.27\Native\STUBEXE\@SYSTEM@\WerFault.exe

    Filesize

    17KB

    MD5

    36e3fa60e628d7cbd22bc1dc8ccd6a11

    SHA1

    7ae9f7da10ee11131aa0f48c8be00ad0a59bce11

    SHA256

    af12be88da7a4dff7849f9af96130976e137d2c854e699bedccb778dc0842e83

    SHA512

    0ab35aedae2c77e64f89be4280296cdbda268f91e78d8cdfd07f417f133d4f8fc003f2f40eea3f4b3bf7c78d56bc14c31d0c45616201e25070d53d04f86c4346

  • \Users\Admin\AppData\Local\Xenocode\Sandbox\1.0.0.0\2010.08.22T13.27\Virtual\STUBEXE\@APPDATALOCAL@\Temp\server.exe

    Filesize

    17KB

    MD5

    043c51b5683e79d80cbdbfa00e9f77a4

    SHA1

    ed18233e54ac7073613f8c334f2c1c3e18290461

    SHA256

    4d60172a4ff72d67b9d1ced63901e6dd056984e802e9b169ab06fbeebc328c15

    SHA512

    d98fa9211a191448249e179f2f19907f79cd4ef810cd0a0fcd689ec4f0fb716bd147aeecd9bd8bbf5ab121c754ba02312e8ffd7edda56956df12a31e41642c22

  • memory/2376-0-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-1-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-2-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-5-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-7-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-11-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-33-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-39-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-200-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-240-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-9-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-84-0x0000000077540000-0x0000000077541000-memory.dmp

    Filesize

    4KB

  • memory/2376-279-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-264-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-255-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-223-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-207-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-192-0x0000000077540000-0x0000000077541000-memory.dmp

    Filesize

    4KB

  • memory/2376-191-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-170-0x0000000077540000-0x0000000077541000-memory.dmp

    Filesize

    4KB

  • memory/2376-169-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-83-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-66-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-285-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-284-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-63-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-61-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-59-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-57-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-55-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-53-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-51-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-49-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-47-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-45-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-43-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-41-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-37-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-35-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-31-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-29-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-27-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-26-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-23-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-22-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-19-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-17-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-15-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-13-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-923-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB

  • memory/2376-926-0x0000000000410000-0x000000000047C000-memory.dmp

    Filesize

    432KB