Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/04/2024, 15:12

General

  • Target

    fa9370886cc5c749589fa4a55b870eb0_JaffaCakes118.exe

  • Size

    87KB

  • MD5

    fa9370886cc5c749589fa4a55b870eb0

  • SHA1

    7cc51a9ae62aefe8cbb8203f297944d98b1458e7

  • SHA256

    7dd94c976cf289ac0d029ef633a4147f8082eb13c7d4d2e08bfd7d5306421866

  • SHA512

    8308b3d2671a420af89afbb04f3c44de3b95d08c767b04f15946e2b9900cefc13bfbae526c992190201f164d425d339e7bb015e5314ab852cbfe581bb7df250a

  • SSDEEP

    1536:/gLy33m8yP8nduycysTbkq0/B8CPMSdXmyx6PNgsMbwayX8TmBa:d28jnAy+PkmSd2XPN80ayMz

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Drops file in System32 directory 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa9370886cc5c749589fa4a55b870eb0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fa9370886cc5c749589fa4a55b870eb0_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2820
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\system32\2487.exe eee
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2832
      • C:\Windows\SysWOW64\2487.exe
        C:\Windows\system32\2487.exe eee
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:1484
    • C:\Windows\SysWOW64\813E.exe
      C:\Windows\system32\813E.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1268
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\Windows\system32\2487.exe eee
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4376
        • C:\Windows\SysWOW64\2487.exe
          C:\Windows\system32\2487.exe eee
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:2956

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\SFG3KXO7\3YN7QNL1.htm

    Filesize

    396KB

    MD5

    00726dae7c79af41282ab5b1618de4f1

    SHA1

    e8310a295dcdae4623aa6aa6d993ae13af45e882

    SHA256

    1266434a6edc7e4e056ae58093c40ea9945f94f276a4830e3ac2d687c87ced6e

    SHA512

    11e6ea14cfc666ae38486f38d5a967c88b6f72ad0a8e0b23b48520acd987db6e6adfc4c899449658487b7973e91b61bcbf31ee07c20a83016e2922967754a932

  • C:\Windows\SysWOW64\2487.exe

    Filesize

    112KB

    MD5

    bedbab658f51bc2ea133c201f038abeb

    SHA1

    726be2646f932aebe6f1a7a9244bc5f1ca4b3b99

    SHA256

    1a2669ebe24db5b34a7d1fc9e9379136de5221addac9aa069be8f49a7fd3613f

    SHA512

    2ce7d74e0fa3f147563a5717047719103e4e87100ed25a1a16f45cd372260944350ac2eeec6261d31b24858dbeff89154f9c6e435326b667f6963fd7067b3d81

  • C:\Windows\SysWOW64\813E.exe

    Filesize

    87KB

    MD5

    fa9370886cc5c749589fa4a55b870eb0

    SHA1

    7cc51a9ae62aefe8cbb8203f297944d98b1458e7

    SHA256

    7dd94c976cf289ac0d029ef633a4147f8082eb13c7d4d2e08bfd7d5306421866

    SHA512

    8308b3d2671a420af89afbb04f3c44de3b95d08c767b04f15946e2b9900cefc13bfbae526c992190201f164d425d339e7bb015e5314ab852cbfe581bb7df250a

  • C:\Windows\SysWOW64\MSWINSCK.OCX

    Filesize

    105KB

    MD5

    9484c04258830aa3c2f2a70eb041414c

    SHA1

    b242a4fb0e9dcf14cb51dc36027baff9a79cb823

    SHA256

    bf7e47c16d7e1c0e88534f4ef95e09d0fd821ed1a06b0d95a389b35364b63ff5

    SHA512

    9d0e9f0d88594746ba41ea4a61a53498619eda596e12d8ec37d01cfe8ceb08be13e3727c83d630a6d9e6d03066f62444bb94ea5a0d2ed9d21a270e612db532a0

  • memory/1268-20-0x00000000001C0000-0x00000000001C2000-memory.dmp

    Filesize

    8KB

  • memory/1268-33-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2820-0-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2820-1-0x00000000001D0000-0x00000000001D2000-memory.dmp

    Filesize

    8KB

  • memory/2820-31-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB