Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/04/2024, 07:37

General

  • Target

    f78ce516718cb7fc9ffa1c04dbea3595_JaffaCakes118.exe

  • Size

    6.1MB

  • MD5

    f78ce516718cb7fc9ffa1c04dbea3595

  • SHA1

    cf90acdc6c34e3576d1c29bee1d83c2862a756fd

  • SHA256

    6ccbedb7e89b7077f1b26ef73f26d364e788d06fc8410a24a4ade46a8c76683a

  • SHA512

    01c57526f4fd5c9bdbb4fe7bcd3cc7d973ef89747510c8400881dd1021d20a1b33845f4076f574e7a9dc3d932bcd77e73921594e1eeed6d13146f26b4debb267

  • SSDEEP

    196608:ON8jjoG1vhhff4xuvVf5lNTvN41xKkFi1zw9x7:ON8dnAuv9NaLKk0Nwz7

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f78ce516718cb7fc9ffa1c04dbea3595_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f78ce516718cb7fc9ffa1c04dbea3595_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1532
    • C:\Users\Admin\AppData\Local\Temp\advo0s1t.pzj\f78ce516718cb7fc9ffa1c04dbea3595_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\advo0s1t.pzj\f78ce516718cb7fc9ffa1c04dbea3595_JaffaCakes118.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1176
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
        dw20.exe -x -s 1924
        3⤵
        • Drops file in Windows directory
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious use of AdjustPrivilegeToken
        PID:4788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\f78ce516718cb7fc9ffa1c04dbea3595_JaffaCakes118.exe.log

    Filesize

    312B

    MD5

    d4b49ac61a6cac139f96450777c10204

    SHA1

    92089d33442c9e2eaceac3ed8db6a7168f938e5a

    SHA256

    807bdfa62a4312030c1ed54981674cff77f6108e6b4957754cabb810098ce082

    SHA512

    eb13a0e7f0d4b44db7e8d0625ba1ee6a036083c39c24b85493d3ec9074ada03eb7003b97bd92ed5f2baaf26295a4690303332593c4776e75da5bc3b6adbc3ea6

  • C:\Users\Admin\AppData\Local\Temp\advo0s1t.pzj\7z.dll

    Filesize

    893KB

    MD5

    04ad4b80880b32c94be8d0886482c774

    SHA1

    344faf61c3eb76f4a2fb6452e83ed16c9cce73e0

    SHA256

    a1e1d1f0fff4fcccfbdfa313f3bdfea4d3dfe2c2d9174a615bbc39a0a6929338

    SHA512

    3e3aaf01b769471b18126e443a721c9e9a0269e9f5e48d0a10251bc1ee309855bd71ede266caa6828b007359b21ba562c2a5a3469078760f564fb7bd43acabfb

  • C:\Users\Admin\AppData\Local\Temp\advo0s1t.pzj\f78ce516718cb7fc9ffa1c04dbea3595_JaffaCakes118.exe

    Filesize

    6.0MB

    MD5

    d6d709d5f6f647215ee4e420769a9f93

    SHA1

    c730f16ef31b7b33aee4f33f1286e2c59cd1c510

    SHA256

    13471c52af6d30f22624fcadc72fc19df03d1c92d68098edbdb11de25b20244a

    SHA512

    ca2dfaec25b8d1b43e789ce44e178dbde6ccec9f9c5e5547373cc69d3caee2805b21ad9e5b4b7ee3e0e50043bd0c77d4592fde80d822f93454f2cc9982af69a4

  • memory/1176-170-0x0000000074F60000-0x0000000074F6F000-memory.dmp

    Filesize

    60KB

  • memory/1176-179-0x0000000075860000-0x0000000075866000-memory.dmp

    Filesize

    24KB

  • memory/1176-22-0x0000000075550000-0x0000000075765000-memory.dmp

    Filesize

    2.1MB

  • memory/1176-15-0x0000000000D50000-0x0000000000DE6000-memory.dmp

    Filesize

    600KB

  • memory/1176-171-0x0000000074F50000-0x0000000074F58000-memory.dmp

    Filesize

    32KB

  • memory/1176-286-0x0000000074990000-0x0000000074F41000-memory.dmp

    Filesize

    5.7MB

  • memory/1176-285-0x0000000002F70000-0x0000000002FAD000-memory.dmp

    Filesize

    244KB

  • memory/1176-26-0x0000000074990000-0x0000000074F41000-memory.dmp

    Filesize

    5.7MB

  • memory/1176-17-0x00000000013A0000-0x00000000013A1000-memory.dmp

    Filesize

    4KB

  • memory/1176-25-0x0000000075D40000-0x00000000762F3000-memory.dmp

    Filesize

    5.7MB

  • memory/1176-27-0x0000000074990000-0x0000000074F41000-memory.dmp

    Filesize

    5.7MB

  • memory/1176-29-0x0000000003700000-0x0000000003710000-memory.dmp

    Filesize

    64KB

  • memory/1176-28-0x00000000768F0000-0x0000000076B71000-memory.dmp

    Filesize

    2.5MB

  • memory/1176-30-0x00000000764D0000-0x00000000765B3000-memory.dmp

    Filesize

    908KB

  • memory/1176-31-0x00000000736B0000-0x000000007370B000-memory.dmp

    Filesize

    364KB

  • memory/1176-18-0x0000000000D50000-0x0000000000DE6000-memory.dmp

    Filesize

    600KB

  • memory/1176-40-0x0000000003700000-0x0000000003710000-memory.dmp

    Filesize

    64KB

  • memory/1176-41-0x0000000003700000-0x0000000003710000-memory.dmp

    Filesize

    64KB

  • memory/1176-74-0x0000000003700000-0x0000000003710000-memory.dmp

    Filesize

    64KB

  • memory/1176-158-0x0000000000D50000-0x0000000000DE6000-memory.dmp

    Filesize

    600KB

  • memory/1176-160-0x0000000075C30000-0x0000000075C54000-memory.dmp

    Filesize

    144KB

  • memory/1176-159-0x0000000075550000-0x0000000075765000-memory.dmp

    Filesize

    2.1MB

  • memory/1176-161-0x0000000076450000-0x00000000764CB000-memory.dmp

    Filesize

    492KB

  • memory/1176-162-0x0000000075B10000-0x0000000075C30000-memory.dmp

    Filesize

    1.1MB

  • memory/1176-163-0x0000000076390000-0x000000007644F000-memory.dmp

    Filesize

    764KB

  • memory/1176-165-0x00000000759C0000-0x0000000075A7F000-memory.dmp

    Filesize

    764KB

  • memory/1176-166-0x0000000075D40000-0x00000000762F3000-memory.dmp

    Filesize

    5.7MB

  • memory/1176-14-0x0000000000D50000-0x0000000000DE6000-memory.dmp

    Filesize

    600KB

  • memory/1176-21-0x0000000002F70000-0x0000000002FAD000-memory.dmp

    Filesize

    244KB

  • memory/1176-169-0x0000000075C60000-0x0000000075CA5000-memory.dmp

    Filesize

    276KB

  • memory/1176-23-0x0000000074990000-0x0000000074F41000-memory.dmp

    Filesize

    5.7MB

  • memory/1176-172-0x0000000074990000-0x0000000074F41000-memory.dmp

    Filesize

    5.7MB

  • memory/1176-173-0x00000000768F0000-0x0000000076B71000-memory.dmp

    Filesize

    2.5MB

  • memory/1176-167-0x00000000750A0000-0x00000000750F2000-memory.dmp

    Filesize

    328KB

  • memory/1176-164-0x00000000766C0000-0x0000000076735000-memory.dmp

    Filesize

    468KB

  • memory/1176-174-0x00000000764D0000-0x00000000765B3000-memory.dmp

    Filesize

    908KB

  • memory/1176-175-0x0000000073710000-0x0000000073784000-memory.dmp

    Filesize

    464KB

  • memory/1176-176-0x00000000736B0000-0x000000007370B000-memory.dmp

    Filesize

    364KB

  • memory/1176-177-0x0000000076B80000-0x0000000076C16000-memory.dmp

    Filesize

    600KB

  • memory/1176-168-0x0000000074F70000-0x0000000074FFD000-memory.dmp

    Filesize

    564KB

  • memory/1176-178-0x0000000072E90000-0x0000000072E96000-memory.dmp

    Filesize

    24KB

  • memory/1176-180-0x0000000076E90000-0x0000000076EF3000-memory.dmp

    Filesize

    396KB

  • memory/1176-181-0x0000000072BD0000-0x0000000072CB3000-memory.dmp

    Filesize

    908KB

  • memory/1176-182-0x0000000072BA0000-0x0000000072BCB000-memory.dmp

    Filesize

    172KB

  • memory/1176-183-0x0000000072A50000-0x0000000072B18000-memory.dmp

    Filesize

    800KB

  • memory/1176-184-0x0000000072A10000-0x0000000072A42000-memory.dmp

    Filesize

    200KB

  • memory/1176-185-0x0000000000D50000-0x0000000000DE6000-memory.dmp

    Filesize

    600KB

  • memory/1176-186-0x0000000000D50000-0x0000000000DE6000-memory.dmp

    Filesize

    600KB

  • memory/1176-187-0x0000000002F70000-0x0000000002FAD000-memory.dmp

    Filesize

    244KB

  • memory/1176-188-0x0000000000D50000-0x0000000000DE6000-memory.dmp

    Filesize

    600KB

  • memory/1176-215-0x0000000003700000-0x0000000003710000-memory.dmp

    Filesize

    64KB

  • memory/1176-216-0x0000000072840000-0x00000000728CD000-memory.dmp

    Filesize

    564KB

  • memory/1176-217-0x0000000003700000-0x0000000003710000-memory.dmp

    Filesize

    64KB

  • memory/1176-218-0x0000000003700000-0x0000000003710000-memory.dmp

    Filesize

    64KB

  • memory/1176-219-0x0000000003700000-0x0000000003710000-memory.dmp

    Filesize

    64KB

  • memory/1176-284-0x0000000000D50000-0x0000000000DE6000-memory.dmp

    Filesize

    600KB

  • memory/1532-1-0x00000000016E0000-0x00000000016F0000-memory.dmp

    Filesize

    64KB

  • memory/1532-0-0x0000000074990000-0x0000000074F41000-memory.dmp

    Filesize

    5.7MB

  • memory/1532-2-0x0000000074990000-0x0000000074F41000-memory.dmp

    Filesize

    5.7MB

  • memory/1532-19-0x0000000074990000-0x0000000074F41000-memory.dmp

    Filesize

    5.7MB