Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2024, 12:46

General

  • Target

    3fee7f05762e521ecf41e1e02a5e4f26_JaffaCakes118.exe

  • Size

    179KB

  • MD5

    3fee7f05762e521ecf41e1e02a5e4f26

  • SHA1

    3a4f5449ffe442b6ced6a32fa04859c19632dd06

  • SHA256

    722fd905dc7cdb5c905bae00657f510834efb64e9baa0d0d3edd2e0442e9dd91

  • SHA512

    df8110e74761a3825d1a0d7d52e99cc4db01ef11b6457d702003172760ac54546ad3bbf7c2f0e048d2ac84b56e102844c3d983bfadf6e1a16d32d6fbf76c4697

  • SSDEEP

    3072:Vo/lri4GAA9LnsBrsDMAp87V4g6Duv6Thx9iw7xe1AqBRqNGuVfJExP:e8d8of8tv60seaqBRqNGsJEh

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3fee7f05762e521ecf41e1e02a5e4f26_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3fee7f05762e521ecf41e1e02a5e4f26_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Users\Admin\AppData\Local\Temp\7zSE743.tmp\winvnc.exe
      .\winvnc.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zSE743.tmp\background.bmp

    Filesize

    1KB

    MD5

    6ce6e5fcf1a56b80f4ffa6f685d4329d

    SHA1

    91780868c241e83754003855407805c0cda20254

    SHA256

    6fcc92e281d25569d300297ef79a5796bc5e0c226aa35624dd6a9f38b8413402

    SHA512

    7af21c8840f56c5ded22161504dd3d6c282ad83a0fb1f711fccfc7d87676de3036120e60e2c0e57fb998a0dcfe512950d3f16e0bdcb493d37a681f31b8cb399f

  • C:\Users\Admin\AppData\Local\Temp\7zSE743.tmp\helpdesk.txt

    Filesize

    2KB

    MD5

    76401ab893c3e8caa9ef0e441c8e3917

    SHA1

    e76765dc80438db1a451f6d38f62636a6873a865

    SHA256

    a3f2ca87f07600ea490b16700404c740266be0e55f1d9ac6c963c61c9d0113cf

    SHA512

    194dec689f831f412bf17e96f7e647d44018275e0ed70b94395761b92807c3cd6b9d69f10c6d747e32953183c362d0c27f01cd8f90fa8b1021047f3c5ecf2494

  • C:\Users\Admin\AppData\Local\Temp\7zSE743.tmp\logo.bmp

    Filesize

    103KB

    MD5

    8af47af535611164352e880641d577ed

    SHA1

    944e8a7a9fe359e096f6342b691d712d6e4fb91e

    SHA256

    bdf0b4040e7fd4f08df05bb4ad7248cdc794fc4fa1cb8b306b6c838f3bf3d99f

    SHA512

    b77981b3da4745590dc5b9bcc4e2e03165cd9501564984f7895612c01dffc0fb59c0d4cf7e1e291a597b5497cd4a504e885562b57c4b91a83d9c1064af4cbd44

  • C:\Users\Admin\AppData\Local\Temp\7zSE743.tmp\winvnc.exe

    Filesize

    236KB

    MD5

    77de6bb7c680776fa67a5646072b7fed

    SHA1

    7f3c35d85c96ff903844feaf1aed010a34119c40

    SHA256

    50831333c6ba49fc871ca20f4a4778119e24fb975912023fd4c8bfd72b45c191

    SHA512

    c7e84578ac2ad87c4595496e695f66245910a446aaa54cc2540feed18a0cc6933d88570aa0280749e5ae8374f6643d20e98ca57f6ad437cc3dc6acf916a4bd5a

  • memory/2372-0-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2372-2-0x0000000000020000-0x000000000003E000-memory.dmp

    Filesize

    120KB

  • memory/2372-1-0x0000000000020000-0x000000000003E000-memory.dmp

    Filesize

    120KB

  • memory/2372-33-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/2372-34-0x0000000000020000-0x000000000003E000-memory.dmp

    Filesize

    120KB

  • memory/2372-35-0x0000000000020000-0x000000000003E000-memory.dmp

    Filesize

    120KB

  • memory/2372-36-0x0000000000020000-0x000000000003E000-memory.dmp

    Filesize

    120KB