Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2024, 06:38

General

  • Target

    3e59a8f8dd9274bd0151f3abd6d26266_JaffaCakes118.exe

  • Size

    816KB

  • MD5

    3e59a8f8dd9274bd0151f3abd6d26266

  • SHA1

    ee65358a0d4a9c47dab53dd766d78da11b029031

  • SHA256

    69a077b3f3c8217d7d28701031b746ab9e0ccde36ed82fef09883865d6e73fca

  • SHA512

    1626a57818d0da1f7522e8ff6c98a7ebe72f504d151db90041d69e039dee797f9502cc2a5580a438f6e4a291223e5b625d871e8cf5ba2135e5599e1bd38a48f3

  • SSDEEP

    12288:8yCxw3McTWMO5iUoyvczox+cln+wZiP9J6DNk8hSSP35F372vBUNC:8FC5WMO5Inz0Vn+Aoq7hv37Q

Score
4/10

Malware Config

Signatures

  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e59a8f8dd9274bd0151f3abd6d26266_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3e59a8f8dd9274bd0151f3abd6d26266_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:1728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\idbb.html

    Filesize

    576B

    MD5

    a1a38fba14af3208f72db676af697e23

    SHA1

    228f7441a6dcc5ebd7e81f2289651a1cee393ed7

    SHA256

    9f42e40d5c0acd2a801e27b0b4168fb50403f186566b856f4f87d4d8d635bff7

    SHA512

    c45b3405eb64093af1fbc41da0c486fc4958342b3acbb36da3a9dcf5afd525aa8e36612a6251aefbfde50dee865b91fcf118d983552d570d77b45d3546f02d8f

  • C:\Program Files (x86)\idcef.html

    Filesize

    576B

    MD5

    25d0eea2495444b482d459d85879da3c

    SHA1

    9912dc94d00d1f344419a53ed38f96055c7b127c

    SHA256

    e7fae3174611725e1baad0cc20d1ad249e20c661a7a5e54b1e9a64da1cf89541

    SHA512

    1a78eaf9343c23335590e2a3a463e1873fcbc45f00190fc7a9de20e7c203c4696149c11067c6d37863c16e1298b5a3c729fa2c64cefa4fa96c30c56957e11d68

  • C:\Program Files (x86)\idreal.html

    Filesize

    576B

    MD5

    7e9842001dadc366aea2227f073a69ac

    SHA1

    13eda7f768fdfff5af3c8e2d28dd2b03c019c0b7

    SHA256

    4afcd5a40ce6cca95ec3c66d35678144dad372fa0a033c83451cb82d046a887d

    SHA512

    1418f5f7b930a83ec3b63dde41b4fd404d7edf5e787e82e006e34c3d5da0eb02c5b513f6af156303f4de8f4944b9f58809f954f04a3c1e087a22539a472cb547

  • memory/1728-1-0x0000000000400000-0x00000000004CC000-memory.dmp

    Filesize

    816KB

  • memory/1728-0-0x0000000000400000-0x00000000004CC000-memory.dmp

    Filesize

    816KB

  • memory/1728-2-0x00000000003A0000-0x00000000003A1000-memory.dmp

    Filesize

    4KB

  • memory/1728-30-0x0000000000400000-0x00000000004CC000-memory.dmp

    Filesize

    816KB