Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    27/10/2024, 22:53

General

  • Target

    765c661785dabc5692bf2560b5ddb7a8_JaffaCakes118.exe

  • Size

    133KB

  • MD5

    765c661785dabc5692bf2560b5ddb7a8

  • SHA1

    bdfdeacb530e31171c33c93c4d5338d18bfdde61

  • SHA256

    099abdd3556d9f39ee963c663479fb2aa74af294ddadae6ef83ba71b7d035564

  • SHA512

    2a7964535c1e5bc3c2f12478dc21e089fac2850ca9f452f92303c807a2d5bd2c2443497600474510c4ba578cd18f866831b1c054a51d67fccac360aa5392bff8

  • SSDEEP

    3072:PegF2jRYn8cdwdA/lVhWsf0sbbHB5FeXDRLumUggT:mgF2p3A/rAsf0sXDFqRKu6

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\765c661785dabc5692bf2560b5ddb7a8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\765c661785dabc5692bf2560b5ddb7a8_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2836
    • C:\Users\Admin\AppData\Local\Temp\765c661785dabc5692bf2560b5ddb7a8_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\765c661785dabc5692bf2560b5ddb7a8_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe%C:\Users\Admin\AppData\Roaming\Microsoft
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1768
    • C:\Users\Admin\AppData\Local\Temp\765c661785dabc5692bf2560b5ddb7a8_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\765c661785dabc5692bf2560b5ddb7a8_JaffaCakes118.exe startC:\Users\Admin\AppData\Local\Temp\dwm.exe%C:\Users\Admin\AppData\Local\Temp
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2072

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\stor.cfg

    Filesize

    612B

    MD5

    f8775d59e14353a65c51d73941bb1eac

    SHA1

    08e1c47cb4c435f6467ccd98ce6233191a19bc6e

    SHA256

    d941e62d3b14fc2874389ead5466b24e8d025409204e28457caeb4c805bbda39

    SHA512

    96b0426df5149fb8d9be95201d6e345c026a1d1bd2dfda1b3edecafedc14727138cc39b95a9dbb609355781eb834fda04f3a87679c52b52a6f4db9f761591b98

  • C:\Users\Admin\AppData\Roaming\Microsoft\stor.cfg

    Filesize

    1KB

    MD5

    e39bf41053064fbb4700a35fa1ffa919

    SHA1

    68cf15592057538b0af820e35d6e483711c2ab54

    SHA256

    87ca061313246ef15ec12805afd4063b07b57a6bf424f9b53676d89888860fe2

    SHA512

    07ee79538fba41c11d985bd8b3172aeba2818e4918643f17582827c158164895276b624df4203b2829b909af0b0f43f805a94f57d1e5e50624f6771dc229f3cc

  • C:\Users\Admin\AppData\Roaming\Microsoft\stor.cfg

    Filesize

    924B

    MD5

    5cbdda63a1ab4ba2a3ab0415e5029977

    SHA1

    3a8c2244af844e508c713151696385923150fd91

    SHA256

    537f1cf82d603620e3225925490b8063944c24e2a116fb7de4bf512a79b1573d

    SHA512

    4129672537876c6803b9a8d276a5534721533ac01b799fcc7da3709b5d140880d4a04e30bb5642f41a4df9f88965ae59a9c80a25650e921a6e0b70c30d424eaa

  • memory/1768-93-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/1768-96-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/1768-95-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/2072-169-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/2072-171-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/2836-1-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/2836-3-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/2836-97-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/2836-172-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB