Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    81s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/10/2024, 11:10

General

  • Target

    1771b607c2ccc1ef7c937553d235ef4f_JaffaCakes118.exe

  • Size

    332KB

  • MD5

    1771b607c2ccc1ef7c937553d235ef4f

  • SHA1

    80c5de67e55c8846ad3de519c27be6ebe750e889

  • SHA256

    6592f72158146c757c839465f82ff743d031962b688d3818acb6943ae2957224

  • SHA512

    5832b88e4135ae879aad90f97d29e945400dd33d0f6521ffb597ad59c06bbc9862020767c2acd062d7a187f454350ff7f99725f2fcc18b20c91ef513d7c37fd0

  • SSDEEP

    6144:GVhCM5ngTuV6righfSGuob5/UNC9ivI+wAI6jxl4C1:1M5ngTuVmiOWCL5AISQ

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1771b607c2ccc1ef7c937553d235ef4f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1771b607c2ccc1ef7c937553d235ef4f_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2140
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\1771B6~1.EXE > nul
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\~instTmp\License.txt

    Filesize

    9KB

    MD5

    9c78d77c45af3e07eb6cea30e9da6172

    SHA1

    cb62165e4a757caf1628b3576ed1a89846b11bd4

    SHA256

    e57a483010e71071a6fb3be9e0abd55738db425c000f117a22386fee7f109db0

    SHA512

    25811d80f609e4991b695e35950f4ed4780fe0386b06885189e24363f5b41cdd8639e7ac4abf716c67ed7ce10d7fcb65090d825bfad72afc2048545b5c9cba47

  • C:\Users\Admin\AppData\Local\Temp\~instTmp\container.zip

    Filesize

    233KB

    MD5

    e38f84dfdcb2c14654db72a3135fb4d8

    SHA1

    b6a625e65fd2334465df1a96f6a24774b80bb7c6

    SHA256

    cc3a95efc73b520141601438cf750eeb6f3672649e6b78029251ab0c505dd32c

    SHA512

    8d9f39daf8cf832ca7f2938f4220e28b75f1100b9ffad1c023d1deadaba7d584cf5d0915d1333df9114c17195e5b6c2f8f6f3fce491f8a37c57d1a04316bd641

  • C:\Users\Admin\AppData\Local\Temp\~instTmp\nsvs.dll

    Filesize

    200KB

    MD5

    aca9d8034da13c815d0af484e9a8553a

    SHA1

    fe969d75f5b0c30bce47fd9e3699fd7d0fd73a0e

    SHA256

    1e5b79c6a3277de583e783312b937349cc4efbb4ca5aa31bfaf365e4f22ccf79

    SHA512

    32d0edc256025a256f8e41f1bb9190552d3c528986001e3aa10a7eb0c1af4179d143caa5f7c5c41efaa971fe785b52282ecb0ef8b9e29655509947c4b0ddf872