Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2024, 10:32

General

  • Target

    398b1b1bdcfd378635811a7f9f676875_JaffaCakes118.exe

  • Size

    17KB

  • MD5

    398b1b1bdcfd378635811a7f9f676875

  • SHA1

    a7db3079966a281bdb3bd4e7a5e3e12023d32f59

  • SHA256

    1dc84ace0b8c01de6422df830d758fc02a1c36970d4dd23bb6e744ebc8aced05

  • SHA512

    5c0fc8619b124474876b053e13cd0f7f8811881b1bbbed928922a61254b335c49fdcc58815a402420083e4ce9d3e5c0eeb0abe1dc3b139d0126e3b8b302c1677

  • SSDEEP

    384:mjWSFaWrGkbGOu1Yaj1hFzivYwS8laU29v9QopRP:EPJb25hFzipS8dgv9nP

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 7 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\398b1b1bdcfd378635811a7f9f676875_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\398b1b1bdcfd378635811a7f9f676875_JaffaCakes118.exe"
    1⤵
    • Sets service image path in registry
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\system32\delme.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2400
  • C:\Windows\SysWOW64\8B58A615.EXE
    C:\Windows\SysWOW64\8B58A615.EXE -service
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:1732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\8B58A615.EXE

    Filesize

    17KB

    MD5

    398b1b1bdcfd378635811a7f9f676875

    SHA1

    a7db3079966a281bdb3bd4e7a5e3e12023d32f59

    SHA256

    1dc84ace0b8c01de6422df830d758fc02a1c36970d4dd23bb6e744ebc8aced05

    SHA512

    5c0fc8619b124474876b053e13cd0f7f8811881b1bbbed928922a61254b335c49fdcc58815a402420083e4ce9d3e5c0eeb0abe1dc3b139d0126e3b8b302c1677

  • C:\Windows\SysWOW64\delme.bat

    Filesize

    239B

    MD5

    0396233d2f2090aaf3563dc00d4cf8df

    SHA1

    e5c56b6dbac49e0de8a0b9f69cce2efbc499538e

    SHA256

    9feedeaeef490bd955e23cba0c6e2401654fd36d0d9bb53bec86bc8ba0216acd

    SHA512

    49d370814a201da5b1469b2052c85ce95ed405559b65e7c3033313f5e6c2dfde924ffa148928ada7744a132c199c0957a79b8d123685f13b9a5d4d36cb788396

  • memory/1732-18-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/2360-1-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2360-0-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/2360-16-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB