Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2024, 00:06 UTC

General

  • Target

    JaffaCakes118_8c870fe7eadcabb8409c00c442fa9511edb8d065d578f4fcfdc8381a6e9dc609.exe

  • Size

    1.2MB

  • MD5

    1fd54d892c77e714ac3e48f9e113786a

  • SHA1

    d2c7a2e59b5ba71093f2969a024878ee088a4f49

  • SHA256

    8c870fe7eadcabb8409c00c442fa9511edb8d065d578f4fcfdc8381a6e9dc609

  • SHA512

    eec7d6b0e851617001b93ec5081aa114547161f9c48add8ba464260939177bf3e5749bc642ed6e2818c6f95bd76af4064888b51343832142245e0526d5d20ac5

  • SSDEEP

    24576:cB0NWp6nr52LyDXRfJ5dwEztbXCmAUscM7P8g6A7Vpg83atTUHnlr:cBSDnV3XRfJ/emAUscMoCVuw

Malware Config

Signatures

  • Blackmoon family
  • Blackmoon, KrBanker

    Blackmoon also known as KrBanker is banking trojan first discovered in early 2014.

  • Detect Blackmoon payload 7 IoCs
  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8c870fe7eadcabb8409c00c442fa9511edb8d065d578f4fcfdc8381a6e9dc609.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8c870fe7eadcabb8409c00c442fa9511edb8d065d578f4fcfdc8381a6e9dc609.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1820
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8c870fe7eadcabb8409c00c442fa9511edb8d065d578f4fcfdc8381a6e9dc609.exe
      2⤵
      • Server Software Component: Terminal Services DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:292
      • C:\Windows\SysWOW64\sc.exe
        sc failure SQL Server Reporting Services (MSSQLSERVSER) reset= 86400 actions= restart/1000
        3⤵
        • Launches sc.exe
        • System Location Discovery: System Language Discovery
        PID:2284
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Windows\System32\\Delete00.bat
        3⤵
        • Deletes itself
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:836
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:2676
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2260

Network

  • flag-us
    DNS
    r.nxxxn.ga
    netsvcs
    Remote address:
    8.8.8.8:53
    Request
    r.nxxxn.ga
    IN A
    Response
  • flag-us
    DNS
    fuck88.f3322.net
    netsvcs
    Remote address:
    8.8.8.8:53
    Request
    fuck88.f3322.net
    IN A
    Response
  • 10.127.1.153:10020
    netsvcs
  • 10.127.1.153:5805
    netsvcs
  • 10.127.1.153:10020
    netsvcs
  • 10.127.1.153:5805
    netsvcs
  • 10.127.1.153:10020
    netsvcs
  • 10.127.1.153:5805
    netsvcs
  • 10.127.1.153:10020
    netsvcs
  • 10.127.1.153:5805
    netsvcs
  • 10.127.1.153:10020
    netsvcs
  • 10.127.1.153:5805
    netsvcs
  • 10.127.1.153:10020
    netsvcs
  • 10.127.1.153:5805
    netsvcs
  • 10.127.1.153:10020
    netsvcs
  • 10.127.1.153:5805
    netsvcs
  • 10.127.1.153:10020
    netsvcs
  • 10.127.1.153:5805
    netsvcs
  • 10.127.1.153:10020
    netsvcs
  • 10.127.1.153:5805
    netsvcs
  • 10.127.1.153:10020
    netsvcs
  • 8.8.8.8:53
    r.nxxxn.ga
    dns
    netsvcs
    56 B
    116 B
    1
    1

    DNS Request

    r.nxxxn.ga

  • 8.8.8.8:53
    fuck88.f3322.net
    dns
    netsvcs
    62 B
    123 B
    1
    1

    DNS Request

    fuck88.f3322.net

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Delete00.bat

    Filesize

    179B

    MD5

    a0afe9311feeaaf805299cf384446e1e

    SHA1

    b5e98a9aa07ee10a6d2e117064e1e50218a1c26c

    SHA256

    37fa878a6513eb7dea92a4cd740340a5522d3add0661850d20013dfee863feeb

    SHA512

    2345848931aa1faf1069c4976f28fadc0105769ced36830f37cfe909812f384e0e11d44baa6973e569b0c5531cb4c9cf3ae9436153fe46163a0ead81ad51dd82

  • \??\c:\programdata\microsoft\windows\gameexplorer\remote.hlp

    Filesize

    936KB

    MD5

    2148ed98f723563683990f569d23bf43

    SHA1

    25cfad1a06933f65f7d110a81d7adbfa83c19005

    SHA256

    b53132d5c59e5e62e23a9cb65fa9c09aa8403f625d76877c4e8fd60a331be56a

    SHA512

    8ac4b829802e3238fcdf6629b09417dfb48b04d18880a230a387b3673c724a8281c795c83e7a088c12ef676b9fd054b70f90aebca34a1217fc7376aeb9f13dfa

  • memory/292-1-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/292-26-0x0000000000400000-0x0000000000611000-memory.dmp

    Filesize

    2.1MB

  • memory/292-10-0x0000000000400000-0x0000000000611000-memory.dmp

    Filesize

    2.1MB

  • memory/292-9-0x0000000000400000-0x0000000000611000-memory.dmp

    Filesize

    2.1MB

  • memory/292-8-0x0000000000400000-0x0000000000611000-memory.dmp

    Filesize

    2.1MB

  • memory/292-5-0x0000000000400000-0x0000000000611000-memory.dmp

    Filesize

    2.1MB

  • memory/292-4-0x0000000000400000-0x0000000000611000-memory.dmp

    Filesize

    2.1MB

  • memory/1820-14-0x0000000000400000-0x00000000005CA000-memory.dmp

    Filesize

    1.8MB

  • memory/1820-0-0x0000000000400000-0x00000000005CA000-memory.dmp

    Filesize

    1.8MB

  • memory/1820-6-0x0000000002B00000-0x0000000002CCA000-memory.dmp

    Filesize

    1.8MB

  • memory/2260-28-0x0000000000160000-0x000000000016B000-memory.dmp

    Filesize

    44KB

  • memory/2260-27-0x0000000000160000-0x000000000016B000-memory.dmp

    Filesize

    44KB

  • memory/2260-31-0x0000000000160000-0x000000000016B000-memory.dmp

    Filesize

    44KB

  • memory/2260-30-0x0000000010000000-0x0000000010100000-memory.dmp

    Filesize

    1024KB

  • memory/2260-32-0x0000000010000000-0x0000000010100000-memory.dmp

    Filesize

    1024KB

  • memory/2260-38-0x0000000010000000-0x0000000010100000-memory.dmp

    Filesize

    1024KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.