Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/10/2024, 23:16

General

  • Target

    26e9dc1207fcb16adfe4f52aeaff5eb8_JaffaCakes118.exe

  • Size

    132KB

  • MD5

    26e9dc1207fcb16adfe4f52aeaff5eb8

  • SHA1

    7f4757fb7bab17ffc9679a83df8f94d6bb2e4b63

  • SHA256

    ea4925954b2953facd5a25c3b5d09051a4a1b0d8b337c23df944b39866565b8b

  • SHA512

    46bea7562f1a686d9a23c0fa4543dffe3e5ef50c23bba9f8dda8dc68d3e3e8806ebf8ef272fe157c574f7fe30ffe8582c668d6bfabcd9323a29dedd936ff3a24

  • SSDEEP

    3072:ra4B5eRp47aJgZeqct7WBB5NcIpomk2srRha2vlE4gaApIuA/:7524De9UyIpoP2sFha2S4gQ5/

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26e9dc1207fcb16adfe4f52aeaff5eb8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\26e9dc1207fcb16adfe4f52aeaff5eb8_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2536
    • C:\Users\Admin\AppData\Local\C575E8A8-16E2-4C95-AE36-0BA9C90710B0\rundll32.exe
      C:\Users\Admin\AppData\Local\C575E8A8-16E2-4C95-AE36-0BA9C90710B0\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      PID:1920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\C575E8A8-16E2-4C95-AE36-0BA9C90710B0\rundll32.exe

    Filesize

    132KB

    MD5

    26e9dc1207fcb16adfe4f52aeaff5eb8

    SHA1

    7f4757fb7bab17ffc9679a83df8f94d6bb2e4b63

    SHA256

    ea4925954b2953facd5a25c3b5d09051a4a1b0d8b337c23df944b39866565b8b

    SHA512

    46bea7562f1a686d9a23c0fa4543dffe3e5ef50c23bba9f8dda8dc68d3e3e8806ebf8ef272fe157c574f7fe30ffe8582c668d6bfabcd9323a29dedd936ff3a24

  • memory/1920-13-0x0000000000A70000-0x0000000000B95000-memory.dmp

    Filesize

    1.1MB

  • memory/1920-14-0x0000000000400000-0x0000000000524000-memory.dmp

    Filesize

    1.1MB

  • memory/1920-15-0x0000000000400000-0x0000000000524000-memory.dmp

    Filesize

    1.1MB

  • memory/2536-0-0x0000000002230000-0x0000000002355000-memory.dmp

    Filesize

    1.1MB

  • memory/2536-1-0x0000000000400000-0x0000000000524000-memory.dmp

    Filesize

    1.1MB

  • memory/2536-10-0x0000000000400000-0x0000000000524000-memory.dmp

    Filesize

    1.1MB