Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/04/2024, 16:07

General

  • Target

    d860e55a2586cd2b8659dfa853d4aa03_JaffaCakes118.exe

  • Size

    14KB

  • MD5

    d860e55a2586cd2b8659dfa853d4aa03

  • SHA1

    cc37f985718e35c3c61e395030b1505136c84470

  • SHA256

    503c792e8a1045b0b522e7eb53c4453f89577e54b5dcd591ffc6e8fc9d463d53

  • SHA512

    3a91a791c30ac7d45af1fc9dde0263d787533522381633366b1ae799199b232fbe59584df1a70392083a585c6ec1907d678059532d275bf2a61b8ab1ab3a2846

  • SSDEEP

    384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhRl5T:hDXWipuE+K3/SSHgxXT

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d860e55a2586cd2b8659dfa853d4aa03_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d860e55a2586cd2b8659dfa853d4aa03_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3096
    • C:\Users\Admin\AppData\Local\Temp\DEM2EC1.exe
      "C:\Users\Admin\AppData\Local\Temp\DEM2EC1.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2580
      • C:\Users\Admin\AppData\Local\Temp\DEM854D.exe
        "C:\Users\Admin\AppData\Local\Temp\DEM854D.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3752
        • C:\Users\Admin\AppData\Local\Temp\DEMDB0E.exe
          "C:\Users\Admin\AppData\Local\Temp\DEMDB0E.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4280
          • C:\Users\Admin\AppData\Local\Temp\DEM30B0.exe
            "C:\Users\Admin\AppData\Local\Temp\DEM30B0.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1372
            • C:\Users\Admin\AppData\Local\Temp\DEM8681.exe
              "C:\Users\Admin\AppData\Local\Temp\DEM8681.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:4800
              • C:\Users\Admin\AppData\Local\Temp\DEMDCBF.exe
                "C:\Users\Admin\AppData\Local\Temp\DEMDCBF.exe"
                7⤵
                • Executes dropped EXE
                PID:3972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\DEM2EC1.exe

    Filesize

    14KB

    MD5

    0a3b6bbfb499610f1f272d463d419e8b

    SHA1

    7b4f5029a4b07d1ded5df007269e064568a83862

    SHA256

    ba5c911257d644b36a9872f5eba73405c036d9c9972d0632711a22ea483d12df

    SHA512

    246d222a0ac2be4e7b56689866378c04797eb719a7340eaf2ea2355da70b783cf11df29db22613fe4098ed41d666bfe46aa07907fabc6a0de099cad139eb08a6

  • C:\Users\Admin\AppData\Local\Temp\DEM30B0.exe

    Filesize

    14KB

    MD5

    3a932674be92db55d3dde5165cec4ee3

    SHA1

    9d01e89fce7d7b2fa94a7db43290458e72892b8e

    SHA256

    2bfcf06fcf5fa68d00c327eda94e3972e1162c2a8e56cf8a4a979e85ed468e88

    SHA512

    cd2e3d0ff1dffd778b4ad1ce6861cc0092e4e5e09c499cf816a939144dbcb5687fd2d646a4d08b6215577c089618d07f88308d47eab571308a2e28b7952f9232

  • C:\Users\Admin\AppData\Local\Temp\DEM854D.exe

    Filesize

    14KB

    MD5

    ad33c031b0995ba6c0a21434bbbaec43

    SHA1

    a10c28ea82781eca456693b7755b773d6d3c1c82

    SHA256

    a919bc19d77eb17c927501a27aed3e9ae424f8e2a9340203bd5d4799b5b97714

    SHA512

    8bb07d5eca3675cfc1e80366bbf0083a8e6a357ab9cd8b5d3e0765dbe1107bceabdf6ecfd1086acfabf8dc4334c0190d19ab82bc69089208cbb5bfcea80be500

  • C:\Users\Admin\AppData\Local\Temp\DEM8681.exe

    Filesize

    14KB

    MD5

    6bcd85f2544d1d3fc32f89510f1200eb

    SHA1

    10ed27349595bff22bc9d183d88a1726ac6e9e4c

    SHA256

    3d0f7cee4498059b8e75f3f4098b69ba088c490af3cfd0fe994dc2a7cece5186

    SHA512

    8903cd9869756128d030948fdaaad89373f01396b72a0c794f7cd66dca9e27f2b90e60bfb51846435d6b66f42a3acdbf3dd9cd3ca9b2c205c771ba3dcad6ae52

  • C:\Users\Admin\AppData\Local\Temp\DEMDB0E.exe

    Filesize

    14KB

    MD5

    14dadea4a80d04ac0f3409e462a825b7

    SHA1

    eb20f0d94654553f0661ffd289a786512b14798d

    SHA256

    8946ac43e366b6015dae1427e515c99356e4637dbbd7a60d85c7fa84c0cc6b54

    SHA512

    507419b153221d313034d129d6b17bb6a0d21506816c8bf38d389aa633b160548344d802baa030a252d37b52a820f3668de9f2e42feb83761d2d1d93385088f9

  • C:\Users\Admin\AppData\Local\Temp\DEMDCBF.exe

    Filesize

    14KB

    MD5

    324146d9714f3d850f476dfb09976f90

    SHA1

    eb10c0d47b45b07aa489bcb96e204dc800359e68

    SHA256

    0daf6160bd6e989e0f9f625323577e12a78c566012b93eb0b567c26ae5339792

    SHA512

    dea4e3916b9cfb7a688719220d675983a3d3850a7ebe363b281c68bfe100a8d6bb2947152b4fc1dff620765a06dec0ec69514a7e4225939748885c68b77004df