Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/04/2024, 18:43

General

  • Target

    f8892f9730f13b42121361fbd357732d_JaffaCakes118.exe

  • Size

    12KB

  • MD5

    f8892f9730f13b42121361fbd357732d

  • SHA1

    2c20c5526adb21dd065f48c6effa220b551caeb7

  • SHA256

    4edc47bf1cfebabc1e4803e438b1beb3853f3d928a20e0ec507455d300a8d875

  • SHA512

    a4aa3abe63795f42363a0dc55452fca24351593465d696358ff70ae09992045b91dc9ae173d4e2eea6915fa824ee8db32e670f95aa2f0ea4224c6bdf31781dd6

  • SSDEEP

    192:WF14nGKN7d5QstF9851DKOX1A+b15T2qf4FAwUUTZ1yXTV4aiuNcylN7Smpcjy:SNKN7MSF9kw4A+b11pwTWX545SpfSmWm

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f8892f9730f13b42121361fbd357732d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f8892f9730f13b42121361fbd357732d_JaffaCakes118.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1144
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\D8CC.tmp.bat
      2⤵
        PID:2916

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\D8CC.tmp.bat

      Filesize

      207B

      MD5

      601ca62d99e1478198078c0913a59ef9

      SHA1

      66027fda1522afb8263296d0485b9204740df9f7

      SHA256

      c29b41356422ac5e0fb21068eda6c96a6699cb1c34e6ce2ef98448a2ed7249f1

      SHA512

      9aadc67928559789a39cebb6cfddf7bdf0859a2a4f5c6c61043efd99b09fe68e9384fb3ca99e66db46a567b3b58c785eb505060e9bb23ae9d9f081eaa43cbc3d

    • C:\Windows\SysWOW64\slbiopfs2.nls

      Filesize

      428B

      MD5

      249d36eaf9e5cc7ffeb4082829b4af78

      SHA1

      1f102e3e0833707f2a74d26ccae0ee62c0cd5550

      SHA256

      8fa5788b5e59ebee1b408e357b22b85b70381a1498286a2579ece01cf6e0e055

      SHA512

      3430350b1bfa9161850e4433baa54cbcf0f9d9431ebeab21820df21c94ff55b71f8e9b20c6680a6837deb6c490acf1732ab4a70573c4b6cdf575456c5093e7cd

    • C:\Windows\SysWOW64\slbiopfs2.tmp

      Filesize

      644KB

      MD5

      514b03a2d2955ad2d3559fbad10760aa

      SHA1

      0608c3a6e0b82e74d47e8a920a2080b2f6d70042

      SHA256

      eb1028407c84c97876cf6e6c3360216e7d45cda6dd22737b25f118ddd3eddf9f

      SHA512

      6ca99e94c2c976eaee0f4998d3ca2848dda90ba30b48996605aa4d1b0937947c73319c5eada61e20e9a1d1f8a05ce4c83b131614f0bac16fd72870797f1ef7d1

    • memory/1144-17-0x0000000020000000-0x0000000020008000-memory.dmp

      Filesize

      32KB

    • memory/1144-22-0x0000000020000000-0x0000000020008000-memory.dmp

      Filesize

      32KB