Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    134s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/12/2024, 13:27

General

  • Target

    ebb846d7b9caee805a5104a086e57a35_JaffaCakes118.exe

  • Size

    1.3MB

  • MD5

    ebb846d7b9caee805a5104a086e57a35

  • SHA1

    534d5bd0e9752416aee858c6df1cdc580fcdd657

  • SHA256

    2d8de32e24a97b04b486cdd19c445a78baba0d56d8990bc990f990a5a0311a1d

  • SHA512

    f4a42bcc06c3027f15736a921e0b2c554554e29153528cc7965840b1519ae81509b03c7ac6e74c5c1ea89ac0f21494902efc881bfc8289ac33e9b3f588a918dd

  • SSDEEP

    12288:/QjJNQK23cZDLIW9563iA9CnXwvqUUetMTeY6guOI3DlqTn+h7XyoxIqk0KOKMUD:/AjFiF9KyU5TqFMSdWQATMhwu+3CLwh

Malware Config

Signatures

  • Imminent RAT

    Remote-access trojan based on Imminent Monitor remote admin software.

  • Imminent family
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ebb846d7b9caee805a5104a086e57a35_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ebb846d7b9caee805a5104a086e57a35_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:3060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3060-0-0x00000000743A1000-0x00000000743A2000-memory.dmp

    Filesize

    4KB

  • memory/3060-1-0x00000000743A0000-0x000000007494B000-memory.dmp

    Filesize

    5.7MB

  • memory/3060-2-0x00000000743A0000-0x000000007494B000-memory.dmp

    Filesize

    5.7MB

  • memory/3060-7-0x00000000743A0000-0x000000007494B000-memory.dmp

    Filesize

    5.7MB