Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/02/2025, 18:39 UTC

General

  • Target

    JaffaCakes118_071a1968095df7cd94f071413bab8180.exe

  • Size

    201KB

  • MD5

    071a1968095df7cd94f071413bab8180

  • SHA1

    8a94048279be743a6ca37f4229c17dcfcd662050

  • SHA256

    584db6d47e147f6b1239a0a16e82ef0a91e683f65076e2361fd65a508b03f891

  • SHA512

    0710a266d34a5ec41d071693547a9a9a985890398eb9481a031ee32d2249568d0b6007d0a355bd345a5c7bb9dd488a42029efbab59243f3cb6aabbe2f4db95c7

  • SSDEEP

    6144:Hza2Nj+MLxwkcWTq/81DDiSTz9nqEja3TXU0xtFu:HqEjk7l7Fu

Malware Config

Signatures

  • Parallax family
  • ParallaxRat

    ParallaxRat is a multipurpose RAT written in MASM.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_071a1968095df7cd94f071413bab8180.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_071a1968095df7cd94f071413bab8180.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2660
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_071a1968095df7cd94f071413bab8180.exe
      "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_071a1968095df7cd94f071413bab8180.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:672
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\FEPML.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2700
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Security" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Security\security.exe" /f
          4⤵
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          PID:2680
      • C:\Users\Admin\AppData\Roaming\Security\security.exe
        "C:\Users\Admin\AppData\Roaming\Security\security.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2820
        • C:\Users\Admin\AppData\Roaming\Security\security.exe
          "C:\Users\Admin\AppData\Roaming\Security\security.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:2084
        • C:\Windows\explorer.exe
          "C:\Windows\explorer.exe"
          4⤵
            PID:2580

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\FEPML.bat

      Filesize

      147B

      MD5

      6f473a1ba53e043362047f72e20b34f4

      SHA1

      e8f121a589e1207ed950453376ee1d21b1223835

      SHA256

      5fbce2c77a90ba9edbcf60be3851ab81633b7c10b1babb624d475c7be589de4b

      SHA512

      b4976d40bc708ae6cddf367a5382cd532e4cf235b848cdaa4e4d317e06d9126e50745a7772591bc21dc7380689f4399e57501b0aa73cd231bce32e22d53b0818

    • \Users\Admin\AppData\Roaming\Security\security.exe

      Filesize

      201KB

      MD5

      59325692290801aefa284a1aab7b3374

      SHA1

      07154aa7cb625a58edc394be2f53018f07df4a63

      SHA256

      bbb91fb89e0fcbb2dc816ea2e108f75b219f93090de77e6b4828ea6b68bea043

      SHA512

      113097e666bea90f13ee5f98e674fb8404e4d5142d992456f39ff0f7be684ee85e5bd6d6454ab6318e0edc6ed667773f9102c7139b4bb23ebf3ad24b9ad1b2ab

    • memory/672-370-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/672-361-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/672-355-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/672-357-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/672-791-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/672-359-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/672-362-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/672-368-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/2084-793-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/2660-279-0x0000000000370000-0x0000000000371000-memory.dmp

      Filesize

      4KB

    • memory/2660-4-0x0000000000240000-0x0000000000241000-memory.dmp

      Filesize

      4KB

    • memory/2660-10-0x0000000000250000-0x0000000000251000-memory.dmp

      Filesize

      4KB

    • memory/2660-16-0x0000000000260000-0x0000000000261000-memory.dmp

      Filesize

      4KB

    • memory/2660-20-0x0000000000270000-0x0000000000271000-memory.dmp

      Filesize

      4KB

    • memory/2660-276-0x00000000002A0000-0x00000000002A1000-memory.dmp

      Filesize

      4KB

    • memory/2660-278-0x0000000000320000-0x0000000000321000-memory.dmp

      Filesize

      4KB

    • memory/2660-283-0x00000000003B0000-0x00000000003B1000-memory.dmp

      Filesize

      4KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.