Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/04/2024, 00:05

General

  • Target

    e39bc371b904aec26b48a16e86671735_JaffaCakes118.exe

  • Size

    119KB

  • MD5

    e39bc371b904aec26b48a16e86671735

  • SHA1

    6cd44e9b3bc79aeae506b3cbacbb2ae098d41ed6

  • SHA256

    7e3410538c1117e54546c7bec64e4f9268b25adf77aee53f4097ac92550feb89

  • SHA512

    4eb09e8fab53405d9be6d38945a3f9b2416ee1c40b6cde56505b4b1f427fccd10038eb430bc81625acb456b6b1d2684919cb7e5aabaa92ee84ef104becfab8c0

  • SSDEEP

    1536:F88ZJY3rsc4Hza1z+A+9gvn5IDyLLLRfdk1sw5jq2zeOXWBN5RTYXuQbXz8:F88ncrh1K93yLLLRSZ5jZGP5pe

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e39bc371b904aec26b48a16e86671735_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e39bc371b904aec26b48a16e86671735_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1368
    • C:\Users\Admin\AppData\Local\Temp\e39bc371b904aec26b48a16e86671735_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\e39bc371b904aec26b48a16e86671735_JaffaCakes118.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Adds Run key to start application
      PID:4320
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 344
      2⤵
      • Program crash
      PID:1488
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1368 -ip 1368
    1⤵
      PID:3148

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1368-0-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/1368-5-0x0000000000400000-0x0000000000434000-memory.dmp

      Filesize

      208KB

    • memory/4320-1-0x0000000000400000-0x0000000000417000-memory.dmp

      Filesize

      92KB

    • memory/4320-3-0x0000000000400000-0x0000000000417000-memory.dmp

      Filesize

      92KB

    • memory/4320-4-0x0000000000400000-0x0000000000417000-memory.dmp

      Filesize

      92KB