Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/04/2024, 14:29

General

  • Target

    eb4726176b7d6def7512e21d02ed6c6b_JaffaCakes118.exe

  • Size

    14.8MB

  • MD5

    eb4726176b7d6def7512e21d02ed6c6b

  • SHA1

    09c1de26004401ab735ff0017ccc3c056bdb0097

  • SHA256

    24a82936420cde7f9dfb7e95ad21dd82ec4e08098154d213efaf98e3022cf9b1

  • SHA512

    8206fa8a83c24cf58032f34bec6ca0a0892b5db182eee3caab992c41ddf2ee4bef99f8b219e12d36ec8449470e067f8207237d8c023452493c9745da46db8523

  • SSDEEP

    393216:2Pzn/SFKehyVIpQq362HTeLIfYw3W5gWd3lNw0:2rSphyCO52zeLIfj6jj

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb4726176b7d6def7512e21d02ed6c6b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eb4726176b7d6def7512e21d02ed6c6b_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:3948
    • C:\Users\Admin\AppData\Local\Temp\1foi5gek.izy\eb4726176b7d6def7512e21d02ed6c6b_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\1foi5gek.izy\eb4726176b7d6def7512e21d02ed6c6b_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4948
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
        dw20.exe -x -s 1720
        3⤵
        • Drops file in Windows directory
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious use of AdjustPrivilegeToken
        PID:4860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\eb4726176b7d6def7512e21d02ed6c6b_JaffaCakes118.exe.log

    Filesize

    312B

    MD5

    d4b49ac61a6cac139f96450777c10204

    SHA1

    92089d33442c9e2eaceac3ed8db6a7168f938e5a

    SHA256

    807bdfa62a4312030c1ed54981674cff77f6108e6b4957754cabb810098ce082

    SHA512

    eb13a0e7f0d4b44db7e8d0625ba1ee6a036083c39c24b85493d3ec9074ada03eb7003b97bd92ed5f2baaf26295a4690303332593c4776e75da5bc3b6adbc3ea6

  • C:\Users\Admin\AppData\Local\Temp\1foi5gek.izy\eb4726176b7d6def7512e21d02ed6c6b_JaffaCakes118.exe

    Filesize

    14.7MB

    MD5

    ed394f4207825fede2cd78231cc375b8

    SHA1

    9a2694464a4d813f677c1edb5e1864c0c7d41f7c

    SHA256

    6741aa059caf95e1f40ebb9bfabe137bdd94896c59102d80713e6a1b8a6d7ff7

    SHA512

    dbb44538f0043a8fc5c92a817f3bb10e777277e2960ffeb02045b5e5f9602588b29f251e1b5984f7981d442208ca49d6b5b4b5b063149bf09b1fb38e14271dbe

  • memory/3948-0-0x0000000074680000-0x0000000074C31000-memory.dmp

    Filesize

    5.7MB

  • memory/3948-1-0x0000000074680000-0x0000000074C31000-memory.dmp

    Filesize

    5.7MB

  • memory/3948-2-0x0000000000950000-0x0000000000960000-memory.dmp

    Filesize

    64KB

  • memory/3948-21-0x0000000074680000-0x0000000074C31000-memory.dmp

    Filesize

    5.7MB

  • memory/4948-20-0x0000000000710000-0x0000000000800000-memory.dmp

    Filesize

    960KB

  • memory/4948-23-0x0000000000660000-0x000000000069D000-memory.dmp

    Filesize

    244KB

  • memory/4948-19-0x0000000000900000-0x0000000000901000-memory.dmp

    Filesize

    4KB

  • memory/4948-17-0x0000000000710000-0x0000000000800000-memory.dmp

    Filesize

    960KB

  • memory/4948-16-0x0000000000710000-0x0000000000800000-memory.dmp

    Filesize

    960KB

  • memory/4948-24-0x0000000074DF0000-0x0000000075005000-memory.dmp

    Filesize

    2.1MB

  • memory/4948-25-0x0000000074650000-0x0000000074C01000-memory.dmp

    Filesize

    5.7MB

  • memory/4948-28-0x0000000074650000-0x0000000074C01000-memory.dmp

    Filesize

    5.7MB

  • memory/4948-29-0x0000000002700000-0x0000000002710000-memory.dmp

    Filesize

    64KB

  • memory/4948-27-0x0000000075490000-0x0000000075A43000-memory.dmp

    Filesize

    5.7MB

  • memory/4948-30-0x00000000769D0000-0x0000000076C51000-memory.dmp

    Filesize

    2.5MB

  • memory/4948-31-0x0000000075A50000-0x0000000075B33000-memory.dmp

    Filesize

    908KB

  • memory/4948-32-0x0000000073370000-0x00000000733CB000-memory.dmp

    Filesize

    364KB

  • memory/4948-34-0x0000000072AC0000-0x0000000072AC8000-memory.dmp

    Filesize

    32KB

  • memory/4948-41-0x0000000072750000-0x00000000727DD000-memory.dmp

    Filesize

    564KB

  • memory/4948-46-0x0000000000710000-0x0000000000800000-memory.dmp

    Filesize

    960KB

  • memory/4948-47-0x0000000074DF0000-0x0000000075005000-memory.dmp

    Filesize

    2.1MB

  • memory/4948-48-0x0000000075B90000-0x0000000075BB4000-memory.dmp

    Filesize

    144KB

  • memory/4948-49-0x0000000076290000-0x000000007630B000-memory.dmp

    Filesize

    492KB

  • memory/4948-50-0x0000000075C90000-0x0000000075DB0000-memory.dmp

    Filesize

    1.1MB

  • memory/4948-51-0x0000000076450000-0x000000007650F000-memory.dmp

    Filesize

    764KB

  • memory/4948-52-0x0000000075EA0000-0x0000000075F15000-memory.dmp

    Filesize

    468KB

  • memory/4948-53-0x00000000761D0000-0x000000007628F000-memory.dmp

    Filesize

    764KB

  • memory/4948-54-0x0000000075490000-0x0000000075A43000-memory.dmp

    Filesize

    5.7MB

  • memory/4948-55-0x0000000074D90000-0x0000000074DE2000-memory.dmp

    Filesize

    328KB

  • memory/4948-56-0x0000000074C30000-0x0000000074CBD000-memory.dmp

    Filesize

    564KB

  • memory/4948-57-0x0000000076380000-0x00000000763C5000-memory.dmp

    Filesize

    276KB

  • memory/4948-58-0x0000000074C20000-0x0000000074C2F000-memory.dmp

    Filesize

    60KB

  • memory/4948-59-0x0000000074C10000-0x0000000074C18000-memory.dmp

    Filesize

    32KB

  • memory/4948-60-0x0000000074650000-0x0000000074C01000-memory.dmp

    Filesize

    5.7MB

  • memory/4948-61-0x00000000769D0000-0x0000000076C51000-memory.dmp

    Filesize

    2.5MB

  • memory/4948-63-0x00000000733D0000-0x0000000073444000-memory.dmp

    Filesize

    464KB

  • memory/4948-65-0x0000000072AC0000-0x0000000072AC6000-memory.dmp

    Filesize

    24KB

  • memory/4948-64-0x0000000073370000-0x00000000733CB000-memory.dmp

    Filesize

    364KB

  • memory/4948-66-0x0000000076310000-0x0000000076373000-memory.dmp

    Filesize

    396KB

  • memory/4948-67-0x00000000760C0000-0x00000000761BA000-memory.dmp

    Filesize

    1000KB

  • memory/4948-68-0x0000000072750000-0x00000000727DD000-memory.dmp

    Filesize

    564KB

  • memory/4948-69-0x0000000072660000-0x0000000072743000-memory.dmp

    Filesize

    908KB

  • memory/4948-70-0x0000000072630000-0x000000007265B000-memory.dmp

    Filesize

    172KB

  • memory/4948-71-0x00000000724E0000-0x00000000725A8000-memory.dmp

    Filesize

    800KB

  • memory/4948-72-0x00000000724A0000-0x00000000724D2000-memory.dmp

    Filesize

    200KB

  • memory/4948-73-0x0000000075040000-0x0000000075046000-memory.dmp

    Filesize

    24KB

  • memory/4948-74-0x0000000000710000-0x0000000000800000-memory.dmp

    Filesize

    960KB

  • memory/4948-88-0x0000000074650000-0x0000000074C01000-memory.dmp

    Filesize

    5.7MB

  • memory/4948-102-0x0000000000710000-0x0000000000800000-memory.dmp

    Filesize

    960KB

  • memory/4948-103-0x0000000000710000-0x0000000000800000-memory.dmp

    Filesize

    960KB

  • memory/4948-104-0x0000000002700000-0x0000000002710000-memory.dmp

    Filesize

    64KB

  • memory/4948-105-0x0000000000660000-0x000000000069D000-memory.dmp

    Filesize

    244KB

  • memory/4948-106-0x0000000074650000-0x0000000074C01000-memory.dmp

    Filesize

    5.7MB

  • memory/4948-107-0x0000000002700000-0x0000000002710000-memory.dmp

    Filesize

    64KB

  • memory/4948-144-0x0000000000710000-0x0000000000800000-memory.dmp

    Filesize

    960KB

  • memory/4948-145-0x0000000000660000-0x000000000069D000-memory.dmp

    Filesize

    244KB

  • memory/4948-146-0x0000000074650000-0x0000000074C01000-memory.dmp

    Filesize

    5.7MB