Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    21/01/2025, 15:11

General

  • Target

    JaffaCakes118_0575f0df1ee321d86b6cd0fc3b5c01ea.exe

  • Size

    97KB

  • MD5

    0575f0df1ee321d86b6cd0fc3b5c01ea

  • SHA1

    ce8317c732f3aea23a9147c4a95a7b189c857ff0

  • SHA256

    5650241f11ce2b5ba60daf57c1ebdd7f4fc474bd665de8b584e20ae49eaee99b

  • SHA512

    e8d012e3aaaf79a7800a60f356604c115c72f67b345952f8babb59c2d80356a694e8b05c07b463c4d8ea5119629472540d1f720dc3263b74dee471e471579b4e

  • SSDEEP

    3072:RSovDE/VxvSumPXcmCahoxWjwaaHw7Koj4ruR:pDE/xmPwaL

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • UAC bypass 3 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0575f0df1ee321d86b6cd0fc3b5c01ea.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0575f0df1ee321d86b6cd0fc3b5c01ea.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2328
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\system32\svchost.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:1704
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\system32\svchost.exe
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Checks BIOS information in registry
      • Drops startup file
      • Impair Defenses: Safe Mode Boot
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2780
    • C:\Users\Admin\AppData\Local\Temp\cukqigvqbnfckqdk.exe
      "C:\Users\Admin\AppData\Local\Temp\cukqigvqbnfckqdk.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:380

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\cjugvent\kpmsgetg.exe

    Filesize

    97KB

    MD5

    0575f0df1ee321d86b6cd0fc3b5c01ea

    SHA1

    ce8317c732f3aea23a9147c4a95a7b189c857ff0

    SHA256

    5650241f11ce2b5ba60daf57c1ebdd7f4fc474bd665de8b584e20ae49eaee99b

    SHA512

    e8d012e3aaaf79a7800a60f356604c115c72f67b345952f8babb59c2d80356a694e8b05c07b463c4d8ea5119629472540d1f720dc3263b74dee471e471579b4e

  • memory/380-94-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/380-95-0x0000000000400000-0x0000000000438F20-memory.dmp

    Filesize

    227KB

  • memory/380-88-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/380-89-0x0000000000400000-0x0000000000438F20-memory.dmp

    Filesize

    227KB

  • memory/380-90-0x0000000000400000-0x0000000000438F20-memory.dmp

    Filesize

    227KB

  • memory/1704-22-0x0000000020010000-0x000000002001C000-memory.dmp

    Filesize

    48KB

  • memory/1704-23-0x0000000020010000-0x000000002001C000-memory.dmp

    Filesize

    48KB

  • memory/1704-15-0x0000000000050000-0x0000000000051000-memory.dmp

    Filesize

    4KB

  • memory/1704-14-0x0000000000070000-0x0000000000071000-memory.dmp

    Filesize

    4KB

  • memory/1704-20-0x0000000000060000-0x0000000000061000-memory.dmp

    Filesize

    4KB

  • memory/1704-16-0x0000000020010000-0x000000002001C000-memory.dmp

    Filesize

    48KB

  • memory/1704-7-0x0000000020010000-0x000000002001C000-memory.dmp

    Filesize

    48KB

  • memory/1704-21-0x0000000020010000-0x000000002001C000-memory.dmp

    Filesize

    48KB

  • memory/1704-9-0x0000000000050000-0x0000000000051000-memory.dmp

    Filesize

    4KB

  • memory/2328-5-0x0000000000310000-0x0000000000311000-memory.dmp

    Filesize

    4KB

  • memory/2328-2-0x0000000000400000-0x0000000000438F20-memory.dmp

    Filesize

    227KB

  • memory/2328-27-0x0000000077C1F000-0x0000000077C20000-memory.dmp

    Filesize

    4KB

  • memory/2328-28-0x0000000077C20000-0x0000000077C21000-memory.dmp

    Filesize

    4KB

  • memory/2328-36-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2328-37-0x0000000000400000-0x0000000000438F20-memory.dmp

    Filesize

    227KB

  • memory/2328-1-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2328-24-0x0000000077C20000-0x0000000077C21000-memory.dmp

    Filesize

    4KB

  • memory/2328-86-0x0000000000400000-0x0000000000438F20-memory.dmp

    Filesize

    227KB

  • memory/2328-0-0x0000000000400000-0x0000000000438F20-memory.dmp

    Filesize

    227KB

  • memory/2328-4-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2328-13-0x0000000000400000-0x0000000000438F20-memory.dmp

    Filesize

    227KB

  • memory/2328-87-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/2328-82-0x0000000002250000-0x0000000002289000-memory.dmp

    Filesize

    228KB

  • memory/2328-83-0x0000000002250000-0x0000000002289000-memory.dmp

    Filesize

    228KB

  • memory/2328-67-0x0000000077C1F000-0x0000000077C20000-memory.dmp

    Filesize

    4KB

  • memory/2328-71-0x0000000002250000-0x0000000002289000-memory.dmp

    Filesize

    228KB

  • memory/2780-30-0x0000000020010000-0x000000002002C000-memory.dmp

    Filesize

    112KB

  • memory/2780-98-0x0000000020010000-0x000000002002C000-memory.dmp

    Filesize

    112KB

  • memory/2780-62-0x0000000020010000-0x000000002002C000-memory.dmp

    Filesize

    112KB

  • memory/2780-59-0x0000000020010000-0x000000002002C000-memory.dmp

    Filesize

    112KB

  • memory/2780-48-0x0000000020010000-0x000000002002C000-memory.dmp

    Filesize

    112KB

  • memory/2780-54-0x0000000020010000-0x000000002002C000-memory.dmp

    Filesize

    112KB

  • memory/2780-47-0x0000000020010000-0x000000002002C000-memory.dmp

    Filesize

    112KB

  • memory/2780-38-0x0000000020010000-0x000000002002C000-memory.dmp

    Filesize

    112KB

  • memory/2780-57-0x0000000020010000-0x000000002002C000-memory.dmp

    Filesize

    112KB

  • memory/2780-64-0x0000000020010000-0x000000002002C000-memory.dmp

    Filesize

    112KB

  • memory/2780-97-0x0000000020010000-0x000000002002C000-memory.dmp

    Filesize

    112KB

  • memory/2780-99-0x0000000020010000-0x000000002002C000-memory.dmp

    Filesize

    112KB

  • memory/2780-100-0x0000000020010000-0x000000002002C000-memory.dmp

    Filesize

    112KB

  • memory/2780-101-0x0000000020010000-0x000000002002C000-memory.dmp

    Filesize

    112KB

  • memory/2780-102-0x0000000020010000-0x000000002002C000-memory.dmp

    Filesize

    112KB

  • memory/2780-103-0x0000000020010000-0x000000002002C000-memory.dmp

    Filesize

    112KB

  • memory/2780-104-0x0000000020010000-0x000000002002C000-memory.dmp

    Filesize

    112KB

  • memory/2780-105-0x0000000020010000-0x000000002002C000-memory.dmp

    Filesize

    112KB