Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/04/2024, 19:44

General

  • Target

    e84294ec1372ff50f87f0292d93a0447_JaffaCakes118.exe

  • Size

    867KB

  • MD5

    e84294ec1372ff50f87f0292d93a0447

  • SHA1

    5b1ce3dfdb2f35d7f0b386e4d607e4e341edb28e

  • SHA256

    b441d70043458ea02a33d185ba174b8f12e772d27d1c68514a16890d7dbb8180

  • SHA512

    8144ff3bdf85a48063d3c8b2f37cd6926b09798f3bb146941cc53d68906439ce95857cfe0473860075897f6f69732d7036c3dfea561a3d53f114890219bcced7

  • SSDEEP

    12288:UlUUxvOae0+98PYVQ2V7qL7sb4lDY1qd8XmtXaoRGpK0VEary4d:U/08PWkp6Eem8oRGpK0VEqy4d

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e84294ec1372ff50f87f0292d93a0447_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e84294ec1372ff50f87f0292d93a0447_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3548
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3532
      • C:\Users\Admin\AppData\Local\Temp\36EF.tmp
        C:\Users\Admin\AppData\Local\Temp\36EF.tmp C:\Users\Admin\AppData\Local\Temp
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3944
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpfile0.bat""
          4⤵
            PID:2744

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\36EF.tmp

      Filesize

      53KB

      MD5

      4509361ff09e3c2f1af857ab53236290

      SHA1

      0b0ccddff1229538c8eac12df03b16897c911c66

      SHA256

      310943677b8f610fb1250e8f392a3a76fc9864ac7599861049e37ce4cebc0b53

      SHA512

      1edf0d383dbd066e346587f89841fbed8566f30dafc1f3df51bd67171fe01d6af39605119758e7d943a9eeb02bb67efe1ee77db33ec033c55e2f3c7519ad0c1e

    • C:\Users\Admin\AppData\Local\Temp\tmpfile0.bat

      Filesize

      39KB

      MD5

      5bf83457a4e2a6936ad7b8c6189a3c84

      SHA1

      a27c81614fb5e18170bb1cd169a7d19516370492

      SHA256

      9f7d96545320213689f436fb1d8ec2d582f983723969723169e74b05fc58dc27

      SHA512

      35edc545ad3a4c044c666c4d5361e345b5e9c43cbecaa1ca9df92f7fd1052a4bddc97a999d968d0fe454f1f9366ae78314b918808e8b6247825a9891dee07d0f

    • memory/3532-10-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/3532-3-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/3532-5-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/3532-6-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/3532-21-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/3548-1-0x0000000000C50000-0x0000000000C60000-memory.dmp

      Filesize

      64KB

    • memory/3548-2-0x0000000074840000-0x0000000074DF1000-memory.dmp

      Filesize

      5.7MB

    • memory/3548-19-0x0000000074840000-0x0000000074DF1000-memory.dmp

      Filesize

      5.7MB

    • memory/3548-0-0x0000000074840000-0x0000000074DF1000-memory.dmp

      Filesize

      5.7MB

    • memory/3944-16-0x0000000000400000-0x0000000000407000-memory.dmp

      Filesize

      28KB

    • memory/3944-23-0x0000000000400000-0x0000000000407000-memory.dmp

      Filesize

      28KB