Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240319-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/03/2024, 00:24

General

  • Target

    13bf03822363f33495128c4b919327fd_JaffaCakes118.exe

  • Size

    15KB

  • MD5

    13bf03822363f33495128c4b919327fd

  • SHA1

    a35abf96f1a965b9b790ffbd8b9dc4ce06428a55

  • SHA256

    ec8cd1967a5a50cd6930a516d77dbe40fa8c0324550d2e8838b02d6d0bf3994d

  • SHA512

    7c91a57b8d1a935c3d090cc5a80050e1f4f4803c8595ee5efac315bfe1c2ae2f54414c80763db289acc7fa7252563d2fb42d0ed9fd6b4cfeba7f4ab94949b7c5

  • SSDEEP

    384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhY4l+LQ:hDXWipuE+K3/SSHgxmo

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\13bf03822363f33495128c4b919327fd_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\13bf03822363f33495128c4b919327fd_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1320
    • C:\Users\Admin\AppData\Local\Temp\DEM7B79.exe
      "C:\Users\Admin\AppData\Local\Temp\DEM7B79.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1116
      • C:\Users\Admin\AppData\Local\Temp\DEMD4C5.exe
        "C:\Users\Admin\AppData\Local\Temp\DEMD4C5.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3220
        • C:\Users\Admin\AppData\Local\Temp\DEM2D06.exe
          "C:\Users\Admin\AppData\Local\Temp\DEM2D06.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2576
          • C:\Users\Admin\AppData\Local\Temp\DEM841F.exe
            "C:\Users\Admin\AppData\Local\Temp\DEM841F.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4216
            • C:\Users\Admin\AppData\Local\Temp\DEMDC22.exe
              "C:\Users\Admin\AppData\Local\Temp\DEMDC22.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:2932
              • C:\Users\Admin\AppData\Local\Temp\DEM3426.exe
                "C:\Users\Admin\AppData\Local\Temp\DEM3426.exe"
                7⤵
                • Executes dropped EXE
                PID:4040
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3504 --field-trial-handle=2260,i,4762972005863767630,9297428255150568035,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:5116

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\DEM2D06.exe

      Filesize

      15KB

      MD5

      99a865d1080688e205a6a30e934d72f2

      SHA1

      0bf9e90bd1e1f02b0d6d3905bb2055c1d709605e

      SHA256

      49988871057c72b704c145234ba84503e04e6de0e03f0c867cd5a4a28e5d1f5f

      SHA512

      55b4f5e01843afc4652073a18903a821dae583b91d1b445eef552f065917540d8821dfc7c1997b3be1e494127f28826b3a44c3af416b6445f87f3309b7259ddc

    • C:\Users\Admin\AppData\Local\Temp\DEM3426.exe

      Filesize

      15KB

      MD5

      de9dda3bfa4bb4c08a4826ad28cb34b6

      SHA1

      a18802d714efe56d593590a00c36326103127847

      SHA256

      6a6c5de1c3b32f97acb24fe2514686864984524ef06042c77c4488d0a6d9d358

      SHA512

      080335fe4f67da889cd14cb1d256f95ed5784a2d324d3e1d17ba23381dfdec0344c8c1348739da4cf659d3447be8425891206922a43ff02f03bb40698c71d578

    • C:\Users\Admin\AppData\Local\Temp\DEM7B79.exe

      Filesize

      15KB

      MD5

      7f1ff8dfa8cda7b5366189b6eb077344

      SHA1

      ba27aed5c903c147a6e7850ada80ec205b18b560

      SHA256

      b630a19c952353729810baa3b3bbfecd01a7fcd62fded2b94ab2818f67ed4dde

      SHA512

      3d1aa325bd39bcaa6a284a27c86820f3a123025f66f9643b118f3929024acd4687b6874cc1ca8bd6f664ed4cb310eb569f39e1bee45f088855a2c6861d7eddaf

    • C:\Users\Admin\AppData\Local\Temp\DEM841F.exe

      Filesize

      15KB

      MD5

      fe9732b3bd0a53d08c040424fe7aa8f1

      SHA1

      6818e66b9151cc4f81569c4385f731ae209e0dfc

      SHA256

      7a44ce82997e6817bf587d0bd122fe8fcd1d266521820ce4f3bc442d76fe3d11

      SHA512

      6002c5d7a238c6f031f77e889358d9b135bbd47f4206ae61dc4660596a3cc63f3c77426bf88f0cdab7dc3001f84261afb5a3a018830ce05b6786f5462b81d136

    • C:\Users\Admin\AppData\Local\Temp\DEMD4C5.exe

      Filesize

      15KB

      MD5

      6ee12be4c74a7da4c2b34b7057bbb112

      SHA1

      9d3a961b9a66f0b4f7b9f5fd58fbea6dd809d3bc

      SHA256

      c2ad1ae11c7dda813f898a98352634d416706a8f23db7f2515891777555bd732

      SHA512

      f76e4b17e8b065fac3a2f60c4eed53879c7be35ad33c03a1e01babd6d5a437276cce33e914c6b43813fe2e04359850b9507a64cca57afe85e0a7ea24183be26b

    • C:\Users\Admin\AppData\Local\Temp\DEMDC22.exe

      Filesize

      15KB

      MD5

      1a390448b82c263b2eddfe68ed26764e

      SHA1

      693cc7d36fc81c17a606b9a5e6537e3f782c5d2f

      SHA256

      624b3d21477629015e91395af00376a4c8a462f4e208644af70d051f63014c49

      SHA512

      9db3a3e0d225bc2ad42d07109fabcfdf083d3535db6c4168e3619524b411c223d475e8b95a554ff03f9e2b37fcc25fe7e760049d8cbcd77c0b94e0f5665efc7d