Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/10/2024, 02:16

General

  • Target

    45547df6a597c4397554199150c9efea_JaffaCakes118.exe

  • Size

    1.0MB

  • MD5

    45547df6a597c4397554199150c9efea

  • SHA1

    ab476ae8ec193d5aaaf0689aed9865667adce880

  • SHA256

    71a7c6be2bea28c81deb73435e5fec7e67ed1b66efffbc60a2b9e56ff6a2b3ad

  • SHA512

    4662f19855ffc9e1c766cee39c26efe6d44b36ac39ffac6d61439459f0428606cd9ac264d41133691705823f94323ded4f48a40c24f539c60279a180abe29786

  • SSDEEP

    24576:1f7wX88YwRVSfyh/QxxUb9qwkoZK4WRjdPjIYQA+OmW6GkOJNt:9sX88YASfYmUJkp7BI/Pyt

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Use of msiexec (install) with remote resource 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\45547df6a597c4397554199150c9efea_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\45547df6a597c4397554199150c9efea_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Users\Admin\AppData\Local\Temp\~
      C:\Users\Admin\AppData\Local\Temp\~
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2064
      • C:\Windows\SysWOW64\MSIEXEC.EXE
        MSIEXEC.EXE /i "http://setup.realtimegaming.com/36175/cdn/winpalace/WinPalace20101209065652.msi" DDC_DID=870567 DDC_RTGURL=http://69.59.134.122/dl/TrackSetup/TrackSetup.aspx?DID=870567%26filename=WinPalace%2Eexe SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp" SETUPEXENAME="~"
        3⤵
        • Use of msiexec (install) with remote resource
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:1952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\{6BA495C1-090A-4EC9-A205-C87B98C8EB28}\0x0409.ini

    Filesize

    20KB

    MD5

    36affbd6ff77d1515cfc1c5e998fbaf9

    SHA1

    950d00ecc2e7fd2c48897814029e8eedf6397838

    SHA256

    fccc7f79d29318d8ae78850c262bac762c28858709a6e6cf3b62bcd2729a61e3

    SHA512

    2f29de86d486db783872581a43a834e5064d1488bc3f085ddc5a3287eb9ee8a4ce93d66f7b4965cafb3c4f06b38d4b0fcfdc0fcb1f99d61331a808e5d6011808

  • C:\Users\Admin\AppData\Local\Temp\{6BA495C1-090A-4EC9-A205-C87B98C8EB28}\_ISMSIDEL.INI

    Filesize

    20B

    MD5

    db9af7503f195df96593ac42d5519075

    SHA1

    1b487531bad10f77750b8a50aca48593379e5f56

    SHA256

    0a33c5dffabcf31a1f6802026e9e2eef4b285e57fd79d52fdcd98d6502d14b13

    SHA512

    6839264e14576fe190260a4b82afc11c88e50593a20113483851bf4abfdb7cca9986bef83f4c6b8f98ef4d426f07024cf869e8ab393df6d2b743b9b8e2544e1b

  • C:\Users\Admin\AppData\Local\Temp\~B138.tmp

    Filesize

    5KB

    MD5

    2bf395b3549b237fbcc29fcf36a1d64c

    SHA1

    61c70bb58c49d218f3438b282493a3dfdc3297f7

    SHA256

    68a6d360808fc2be3564384e993e236e1da6b5fe57e49a3d28e13e19c9c6666f

    SHA512

    9c5593676e3c24ceb54e71f7b1f206157771c386c44d4fc064f1217d88b8f9b76e8902751d0bb4c1d16292b08362f1aeda0860a93895862373541e5cdbeb464a

  • \Users\Admin\AppData\Local\Temp\~

    Filesize

    904KB

    MD5

    ab89de828f1df84cad577fc257e8ad3e

    SHA1

    d0f2b270999d1f178a706610228a704acea8fbb3

    SHA256

    cd2de20f3756c5bc83e4aa98bbe1a78084e10348d56de6105bd975fa207aab02

    SHA512

    86e4ce8f37b3b548622cc52dd6f6c6bca8a490156b111d7a2c58b25838e3691fddc8c7b2120b0b4bf929363012ececa927188a86ccf68dd48ab1ff4b6899b2b1

  • memory/2064-7-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2064-39-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB

  • memory/2064-57-0x0000000000400000-0x00000000004E8000-memory.dmp

    Filesize

    928KB