Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/04/2024, 22:33

General

  • Target

    c3800397f17eef5cdd465ef4f1894bda_JaffaCakes118.exe

  • Size

    15.9MB

  • MD5

    c3800397f17eef5cdd465ef4f1894bda

  • SHA1

    6d2deef42bd2d50774a4552bee2717ec1b258d7a

  • SHA256

    abfe3302b378fa5acb30625ff27410f9fdc604377006567451bec920ebcebadc

  • SHA512

    db299041781a2e2b40d8e4ca6f81a8a656dcd1e9106a2104517fcceeb306ffe7af7423355f40c5755879f195ba00fa8c637d31bdf1cad4cf81b793ba72d30137

  • SSDEEP

    393216:5g7uvg7uvg7uvg7uvg7uvg7uvg7uvg7uN:aS4S4S4S4S4S4S4SN

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c3800397f17eef5cdd465ef4f1894bda_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c3800397f17eef5cdd465ef4f1894bda_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3868
    • C:\Windows\SysWOW64\reg.exe
      "C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Windows Update" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe" /f
      2⤵
      • Adds Run key to start application
      • Modifies registry key
      PID:808
    • C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe
      "C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1672
      • C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe
        "C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1108
    • C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe
      "C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"
      2⤵
      • Executes dropped EXE
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2756
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5256 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4440

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe

      Filesize

      15.9MB

      MD5

      b73e30636dd73521cce2bfcf2860937a

      SHA1

      62eed7497013ff73d90bc2c22452388c7278d19e

      SHA256

      58b15a465535246424ead5e3ccb7a6d71a091109c422d7e3743e914b9d926a16

      SHA512

      c676b24bc99b5be282ef05d3447a6dab50acf895b4a01980f93c1d523823e51a754a63dae88426e4c16b8f794060c27f8a21399be7140af396b464fc1224eef8

    • C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe

      Filesize

      1.0MB

      MD5

      a2f259ceb892d3b0d1d121997c8927e3

      SHA1

      6e0a7239822b8d365d690a314f231286355f6cc6

      SHA256

      ab01a333f38605cbcebd80e0a84ffae2803a9b4f6bebb1e9f773e949a87cb420

      SHA512

      5ae1b60390c94c9e79d3b500a55b775d82556e599963d533170b9f35ad5cfa2df1b7d24de1890acf8e1e2c356830396091d46632dbc6ee43a7d042d4facb5dad

    • memory/1108-41-0x0000000002320000-0x0000000002321000-memory.dmp

      Filesize

      4KB

    • memory/1108-44-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/1108-40-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/1108-46-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/1108-36-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/1108-47-0x0000000002320000-0x0000000002321000-memory.dmp

      Filesize

      4KB

    • memory/1108-38-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/1108-34-0x0000000000400000-0x00000000004A6000-memory.dmp

      Filesize

      664KB

    • memory/1672-15-0x0000000002260000-0x0000000002261000-memory.dmp

      Filesize

      4KB

    • memory/1672-30-0x0000000000400000-0x0000000000601000-memory.dmp

      Filesize

      2.0MB

    • memory/1672-37-0x0000000000400000-0x0000000000601000-memory.dmp

      Filesize

      2.0MB

    • memory/1672-33-0x0000000000400000-0x0000000000601000-memory.dmp

      Filesize

      2.0MB

    • memory/2756-39-0x0000000000400000-0x00000000004FB000-memory.dmp

      Filesize

      1004KB

    • memory/2756-31-0x0000000000400000-0x00000000004FB000-memory.dmp

      Filesize

      1004KB

    • memory/2756-27-0x0000000002400000-0x0000000002401000-memory.dmp

      Filesize

      4KB

    • memory/2756-42-0x0000000002400000-0x0000000002401000-memory.dmp

      Filesize

      4KB

    • memory/2756-43-0x0000000000400000-0x00000000004FB000-memory.dmp

      Filesize

      1004KB

    • memory/2756-45-0x0000000000400000-0x00000000004FB000-memory.dmp

      Filesize

      1004KB

    • memory/3868-28-0x0000000000400000-0x0000000000601000-memory.dmp

      Filesize

      2.0MB

    • memory/3868-0-0x0000000000810000-0x0000000000811000-memory.dmp

      Filesize

      4KB

    • memory/3868-14-0x0000000000400000-0x0000000000601000-memory.dmp

      Filesize

      2.0MB

    • memory/3868-5-0x0000000000400000-0x0000000000601000-memory.dmp

      Filesize

      2.0MB

    • memory/3868-4-0x0000000000810000-0x0000000000811000-memory.dmp

      Filesize

      4KB

    • memory/3868-2-0x0000000000400000-0x0000000000601000-memory.dmp

      Filesize

      2.0MB

    • memory/3868-1-0x0000000000400000-0x0000000000601000-memory.dmp

      Filesize

      2.0MB