Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240319-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/04/2024, 01:07

General

  • Target

    ec5e7e3130e74b990c0be814058118bf_JaffaCakes118.exe

  • Size

    45KB

  • MD5

    ec5e7e3130e74b990c0be814058118bf

  • SHA1

    7e735e485321f9260007b1fe86b81ad514374987

  • SHA256

    b38a4554e2730f5a5b5d42d277908de268e2a1b7297347296e34fdecbaa81d0d

  • SHA512

    a03111c766d4c00560b1b4b635c57f6c05a704dc44c30f86315a1894c57a8e4c0852fc4f05a85184eb682fbea81ec9239098384ea569835800a26f93f5194ad4

  • SSDEEP

    768:Y1QNQMBO3Mqe9KZb0LB+8vGMRXyonbcuyD7UURfUJLJAnbcuyD7U:aQGeO3MB9KeY8vGMRXfnouy8z4nouy8

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies Internet Explorer settings 1 TTPs 11 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec5e7e3130e74b990c0be814058118bf_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ec5e7e3130e74b990c0be814058118bf_JaffaCakes118.exe"
    1⤵
    • Adds policy Run key to start application
    • Loads dropped DLL
    • Installs/modifies Browser Helper Object
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1580
    • C:\Users\Admin\AppData\Local\Temp\sbsm.exe
      C:\Users\Admin\AppData\Local\Temp\sbsm.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:3188
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3464 --field-trial-handle=2268,i,4334050275411101233,11484630688883830558,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3980

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\sbmdl.dll

      Filesize

      10KB

      MD5

      d8722caacb60c2c3405320541dcd9242

      SHA1

      438fa00ccfc621ac59094ad5037c823ebbe1be53

      SHA256

      9bb01dcf2caea54ed2506d90b44dbafb75d436c5e1ec10540d60abace87601bf

      SHA512

      9387a62278a8c9e4bbbc737956800447a7609f043b84974a57f63e427816e6736f16c3dd8150b564a386331f00917e83f78ded4e98f932e19c4caac1842ae489

    • C:\Users\Admin\AppData\Local\Temp\sbsm.exe

      Filesize

      5KB

      MD5

      fe1e8993dbb83d60527b486a462392f5

      SHA1

      d08dac8a5bd208a73a5cc2053a15103ce6f46fd8

      SHA256

      284db6666091c2922d05651e46057a8960bd3e555e9f1a9ab623ad771aebf4f6

      SHA512

      2fc991dbca9a3f0db7a0b5d18c4045165ed345984c0f67801be4124455b33b5498968311044897910cd80dd6ad33dad2e4face3af0ca795d6be883c1be31fa89

    • memory/1580-0-0x0000000000400000-0x000000000040D000-memory.dmp

      Filesize

      52KB

    • memory/1580-5-0x0000000010000000-0x000000001000A000-memory.dmp

      Filesize

      40KB

    • memory/1580-10-0x0000000000400000-0x000000000040D000-memory.dmp

      Filesize

      52KB

    • memory/1580-11-0x0000000010000000-0x000000001000A000-memory.dmp

      Filesize

      40KB