Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/04/2024, 10:13

General

  • Target

    f7c7f796efa9d426820550fe7436fdac_JaffaCakes118.exe

  • Size

    3.5MB

  • MD5

    f7c7f796efa9d426820550fe7436fdac

  • SHA1

    4a3902551497203b2f335cc0375c3a4dd6c4fed0

  • SHA256

    4783556e306a33d0f2b82a4b252d64947c84af40d8219cc9c24892552f6f4d8c

  • SHA512

    f7df1cf6067aab2818f6b2739f11707ec03141bbc1b87a62c9e1c34f91af00620f63c174388736557d83135ce1b4f42593a590622112928383c0b88244bffcfd

  • SSDEEP

    98304:I/qAVyk9q/MtommYK9zKAc0MymmYK9zKAc0M:xswxmmYK9+AcdymmYK9+Acd

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7c7f796efa9d426820550fe7436fdac_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f7c7f796efa9d426820550fe7436fdac_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4948
    • C:\Users\Admin\AppData\Local\Temp\EA21.tmp
      "C:\Users\Admin\AppData\Local\Temp\EA21.tmp" --pingC:\Users\Admin\AppData\Local\Temp\f7c7f796efa9d426820550fe7436fdac_JaffaCakes118.exe E02C00A5383EE402D95A9FD7B9BD30FF12ED32B10191CDE72884CF5DAD084213E9EFBFDBFD9185DF3EAC415EABCADE0846C07F910C38F7FC5E3C228498A7A617
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:3292
      • C:\Users\Admin\AppData\Local\Temp\f7c7f796efa9d426820550fe7436fdac_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\f7c7f796efa9d426820550fe7436fdac_JaffaCakes118.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3952
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4124 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4144

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\EA21.tmp

      Filesize

      3.5MB

      MD5

      00cbcb2d16bee70602c1bc7f4b3fdf16

      SHA1

      9e370146933a8f909a5b0aed2b89ff5093117a12

      SHA256

      c01a892f926d58c42c13c61198d39c47db4ccae1685613ee35943943078e2c5f

      SHA512

      9b85f37ee4e1b4636640613a71f04564eca9a917f0258b099a2db87d184295611dbc9e48f810ba10ac01dcb7e639958c47d3b22760d5e42d5e7242eae5cc53b5

    • C:\Users\Admin\AppData\Local\Temp\f7c7f796efa9d426820550fe7436fdac_JaffaCakes118.exe

      Filesize

      1.1MB

      MD5

      cd75d3e263ff0d1d13aad24cdb9f2593

      SHA1

      cbcf46c2524176ce03cbfdb69017788282e495a5

      SHA256

      ccac4ef83f1484c207be895e40037f23138d911c1ec537ffd6577ef789c974c4

      SHA512

      16c489e2a2337bb7d23b5d6507d769a62d2c4ffd6b30c237752ab38c935eb92dcf74c75b972279f95617d82de69f25c53db819ddc1e543e35d89ad0956c3df87

    • memory/3952-15-0x0000000000C90000-0x00000000010A3000-memory.dmp

      Filesize

      4.1MB

    • memory/3952-16-0x00000000016B0000-0x00000000016B3000-memory.dmp

      Filesize

      12KB

    • memory/3952-22-0x0000000000C90000-0x00000000010A3000-memory.dmp

      Filesize

      4.1MB

    • memory/3952-62-0x0000000000C90000-0x00000000010A3000-memory.dmp

      Filesize

      4.1MB

    • memory/3952-63-0x00000000016B0000-0x00000000016B3000-memory.dmp

      Filesize

      12KB