Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    17/10/2024, 01:53

General

  • Target

    503a2f9558fc18c75df27af4f462f320_JaffaCakes118.exe

  • Size

    482KB

  • MD5

    503a2f9558fc18c75df27af4f462f320

  • SHA1

    fa5c51762198e9e2c19e2596ad071352d535cfd3

  • SHA256

    86021b2bce948ca1c22d1a575001f2591e624d977f60ff2ded9b1befd83d78ff

  • SHA512

    b7672c5276944e329bef63d9c96b635c1f45007aeaebd20d5728351712b827a643fd5f5e4459ed75f3c05ae1c5839dae0c6a51fc75d7e31166bcc37459e7212c

  • SSDEEP

    6144:K8/kjlZoZuvxbOa5fLxC1u90lUsLV3AkhnD+veRMMijHKCzFWvYsbnWwsQ:KVjlZGMY1u91m3AkhnueueCzuz

Malware Config

Extracted

Family

gozi

Signatures

  • Gozi

    Gozi is a well-known and widely distributed banking trojan.

  • Deletes itself 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\503a2f9558fc18c75df27af4f462f320_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\503a2f9558fc18c75df27af4f462f320_JaffaCakes118.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\8AE1.bat" "C:\Users\Admin\AppData\Local\Temp\503A2F~1.EXE""
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2128
      • C:\Windows\SysWOW64\attrib.exe
        attrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\503A2F~1.EXE"
        3⤵
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:2312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\8AE1.bat

    Filesize

    76B

    MD5

    2a4ac7c7e37ac7f08775f0be6f045974

    SHA1

    2b75bd16a57f2f68a3d88be5dc0f09a683f3dca4

    SHA256

    9353b26b9381bfd25edb43d50ab413d19589c3dd64279c57c2561edb7eaa7d0b

    SHA512

    b575188a89596ae8025ffd94b382eed1f44446df073af6dc7ee1bd83993803f8ab9ac35e151de2e2814f6d8f79756cd7bd515c957419da4e8132a5c8ac4f5f23

  • memory/1740-0-0x00000000003F0000-0x00000000003F1000-memory.dmp

    Filesize

    4KB

  • memory/1740-1-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/1740-2-0x0000000002560000-0x0000000002565000-memory.dmp

    Filesize

    20KB

  • memory/1740-15-0x0000000000400000-0x00000000004A1000-memory.dmp

    Filesize

    644KB