Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2024, 15:46

General

  • Target

    42ef7d0682afe1e17084b9e4e8f6fa7e_JaffaCakes118.exe

  • Size

    84KB

  • MD5

    42ef7d0682afe1e17084b9e4e8f6fa7e

  • SHA1

    5e10b642de7611b81857f7f4920d4b8409a257d7

  • SHA256

    0ec6cfdd24365db9a661561652a05f5bb6400ac0e873608944f1fbc4e40c2a23

  • SHA512

    0e2cc9103842725a01d06811bc984adac87ba68d7b5522f32d4a0543282497daf88cba897bc4d40318b9c6160aa2f7f8fcdd4189212c45505491f277a41abc8f

  • SSDEEP

    1536:0LE5nnQe9kzuY21ixKmppo+BuO0arCTizh7Jh5Rtk3yTzgZK:l5nx9tYc59ja7J/Rtog

Malware Config

Signatures

  • Server Software Component: Terminal Services DLL 1 TTPs 10 IoCs
  • Loads dropped DLL 16 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 10 IoCs
  • Drops file in Program Files directory 32 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\42ef7d0682afe1e17084b9e4e8f6fa7e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\42ef7d0682afe1e17084b9e4e8f6fa7e_JaffaCakes118.exe"
    1⤵
    • Server Software Component: Terminal Services DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    PID:2668
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2240
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • System Location Discovery: System Language Discovery
    PID:944
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:1632
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2896
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:1864
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:316
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2164
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:3020
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • System Location Discovery: System Language Discovery
    PID:812
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Package Cache\{4d8dcf8c-a72a-43e1-9833-c12724db736e}\VC_redist.x86.exe

    Filesize

    635KB

    MD5

    91a917a34024158ed86ea60e2d6b5fb9

    SHA1

    7fecab9c3403e5b8a0d9919566a49fd0346e1ffd

    SHA256

    e48aa1dd07b495884447aa1319f9d51f83d1589ec8e13b203844c974d93f607f

    SHA512

    4dee536b6cea4358bea1337158390b723545592b432f081b0e5d6fb46f2762552b17b42f22dd1db61b71fb208fa98131947ccc8501359fb4674e402bd2d5478a

  • C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe

    Filesize

    635KB

    MD5

    4f81f423a293dbc1d8426a64c372e2c3

    SHA1

    d7a55ec91b232a0a540c87c70e834beaa2962694

    SHA256

    7c001e7d87a7ac61340f24a8bdb1e51a756f8ac0e909aceddb86ce3342fd2928

    SHA512

    2067b6adac8c6afb75f79959816e7806fafd22846ca7a9097ec075c479b1399a9a922b2d890174f3f4d8d309647c9c86e93be877449ac4513feef81652733c6f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7B8944BA8AD0EFDF0E01A43EF62BECD0_B2DB1CC4B5F2D2A802D56AAED525802D

    Filesize

    5B

    MD5

    5bfa51f3a417b98e7443eca90fc94703

    SHA1

    8c015d80b8a23f780bdd215dc842b0f5551f63bd

    SHA256

    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

    SHA512

    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C3948BE6E525B8A8CEE9FAC91C9E392_F70553637B9F26717122C4DAFA3ADB11

    Filesize

    412B

    MD5

    b17e16410f9b5f955f3974c4367179c2

    SHA1

    9e8801a78d5d4657c441fd3c7b5f0ab241997261

    SHA256

    3c77a5838051729a200960ec513f3088816d0fb716cf7ad9e6ff12f6e30c2d62

    SHA512

    73c09f1b1d55c7548b5922839fd991740e7a1a2c6573d7c16146e7918f1c59bb99fef440d94749b3517825ce8a725a4771132722991a1a6d43b6759aff04285d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    971a2e70e8843d9a4e67910e94866ef0

    SHA1

    2aa4611d88f4306ccd8d69382c93e9f607c39859

    SHA256

    ec84832b7cdbcaf6a8ef1fe1eac77ef7458644b8dab274fb2c372b8bfc34a284

    SHA512

    1f108c4d4882e5cbc9d5cad744905fb7c6957e25464120b190dc8ff00972cac0640aaa4df5491e5860c05b67dc88369872a0da4b72e8ef7d261d7fb57adbef2e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    c7821bd06ba28d42dfe3280091156400

    SHA1

    990f1b43846d1f6cae54c9e183d20e390133be32

    SHA256

    952af40e70b7290524cb189b7be8cb3bd3a13c0de0faf357aa5859cd7a9c3c14

    SHA512

    5bb0158d60452d00b449c9813ec6b86b66d9c229a9241880eb539acfbe9183f8e57996cff7f0ae52458455fb5650f9162d14d5852fa111c9fed8f504c1aa09aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8d5526332185f746bd7db6dc753fc027

    SHA1

    9cd3cc82df8d0540b7d64492b913f3c690962504

    SHA256

    f8c957bc8fcbe06dd951b67350415f3a3f480af56d01b616909e325dc966d21c

    SHA512

    0071d83620ebcbe6ed85e8610a343d041878dc58012cac2a4d5eed6d3c233a12bf225053c743f10c61ab0c541c4ae50ce4f0d200981d9b4e4f3fd0ef329f7056

  • C:\Users\Admin\AppData\Local\Temp\Cab3630.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar3643.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \??\c:\windows\SysWOW64\fastuserswitchingcompatibility.dll

    Filesize

    84KB

    MD5

    e6dc09ce56dc47d647fef2b3898a68f9

    SHA1

    69da5e0a0292de8498100093864652d783907351

    SHA256

    cacdfce01a543c12abc2f2ffa2b24155fe216a2bb715431dfe0c28027ad3a99a

    SHA512

    11dfbfb1df9c0d2bd1edbf44164378e205d20febd2a6b3f60c8b782bf900ada1818d8f9be5cd0f1217061028243c991232628ad253ca7883d0d12e627ba3aa22

  • memory/316-366-0x0000000074DD0000-0x0000000074DF1000-memory.dmp

    Filesize

    132KB

  • memory/316-367-0x0000000074DA0000-0x0000000074DC1000-memory.dmp

    Filesize

    132KB

  • memory/1632-349-0x0000000074DD0000-0x0000000074DF1000-memory.dmp

    Filesize

    132KB

  • memory/1864-360-0x0000000074DD0000-0x0000000074DF1000-memory.dmp

    Filesize

    132KB

  • memory/1864-361-0x0000000074DA0000-0x0000000074DC1000-memory.dmp

    Filesize

    132KB

  • memory/2164-372-0x0000000074E10000-0x0000000074E31000-memory.dmp

    Filesize

    132KB

  • memory/2240-340-0x0000000074DD0000-0x0000000074DF1000-memory.dmp

    Filesize

    132KB

  • memory/2240-342-0x0000000074DA0000-0x0000000074DC1000-memory.dmp

    Filesize

    132KB

  • memory/2312-391-0x0000000074DE0000-0x0000000074E01000-memory.dmp

    Filesize

    132KB

  • memory/2312-389-0x0000000074E10000-0x0000000074E31000-memory.dmp

    Filesize

    132KB

  • memory/2668-0-0x00000000009E0000-0x0000000000A01000-memory.dmp

    Filesize

    132KB

  • memory/2668-3-0x0000000000140000-0x0000000000161000-memory.dmp

    Filesize

    132KB

  • memory/2668-315-0x00000000009E0000-0x0000000000A01000-memory.dmp

    Filesize

    132KB

  • memory/2668-4-0x0000000000A00000-0x0000000000A01000-memory.dmp

    Filesize

    4KB

  • memory/2668-158-0x0000000000140000-0x0000000000161000-memory.dmp

    Filesize

    132KB

  • memory/2668-2-0x0000000000140000-0x0000000000161000-memory.dmp

    Filesize

    132KB

  • memory/2668-159-0x0000000000140000-0x0000000000161000-memory.dmp

    Filesize

    132KB

  • memory/2668-160-0x0000000000140000-0x0000000000161000-memory.dmp

    Filesize

    132KB

  • memory/2668-157-0x00000000009E0000-0x0000000000A01000-memory.dmp

    Filesize

    132KB

  • memory/3020-382-0x0000000074E10000-0x0000000074E31000-memory.dmp

    Filesize

    132KB