Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/04/2024, 20:58

General

  • Target

    039c40e72a78fb12566fc9cb3deac1cc_JaffaCakes118.exe

  • Size

    1.0MB

  • MD5

    039c40e72a78fb12566fc9cb3deac1cc

  • SHA1

    601cbce091f3239bce6a72102922830c6b84383e

  • SHA256

    cf50b85ce6529e189b6641d62b8920eb574531c95360f7d083091e7f4cde68c6

  • SHA512

    5b13bf40241ade99dff429397b9febbae23e9db27ef6326f1f6bcb27e3102a313a7c75fc0b7aa2d8b30f0f062782b4e434074831f8dc5bb5a2ccdd51e353bb38

  • SSDEEP

    12288:cTBHBsMHBGWXuHE7J/zBC1R85BrbWHj9fzT7/et2WN6CuBwuGDocbAci:cTjs3WXYE1rBCU5Brb4fjmtxN6C0co

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\039c40e72a78fb12566fc9cb3deac1cc_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\039c40e72a78fb12566fc9cb3deac1cc_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:944
    • C:\Users\Admin\AppData\Local\Temp\039c40e72a78fb12566fc9cb3deac1cc_jaffacakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\039c40e72a78fb12566fc9cb3deac1cc_jaffacakes118.exe" C:\Users\Admin\AppData\Local\Temp\039c40e72a78fb12566fc9cb3deac1cc_JaffaCakes118.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2840
    • C:\Program Files (x86)\Adobe\acrotray.exe
      "C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\039c40e72a78fb12566fc9cb3deac1cc_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2932
      • C:\Program Files (x86)\Adobe\acrotray.exe
        "C:\Program Files (x86)\Adobe\acrotray.exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\039c40e72a78fb12566fc9cb3deac1cc_JaffaCakes118.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2044
      • C:\Program Files (x86)\Adobe\acrotray .exe
        "C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\039c40e72a78fb12566fc9cb3deac1cc_JaffaCakes118.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:860
        • C:\Program Files (x86)\Adobe\acrotray .exe
          "C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\039c40e72a78fb12566fc9cb3deac1cc_JaffaCakes118.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1728
  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
    1⤵
      PID:1956
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4876
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4876 CREDAT:17410 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4796
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4876 CREDAT:82950 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3104
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4876 CREDAT:17412 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1832

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Adobe\acrotray .exe

      Filesize

      1.1MB

      MD5

      9e46d0a61d9ca70f1fe944665981ff8b

      SHA1

      6c7530ac87193c1ce8a66806abd05ae2a142daf9

      SHA256

      d8a0f55d7eb78cec028db8efd24aaf4a401ade500ca58ef7ffd9a7295bb54b4c

      SHA512

      a31ac219e81ec51e6cb5d74da99205b19dd1b5885b022dbc86a157eb1e650c7c6d18c8751d64ea6d1249d36d5f687fdd2216dd0d29a36497d6900da33ceaa172

    • C:\Program Files (x86)\Adobe\acrotray.exe

      Filesize

      1.1MB

      MD5

      3b23d385acbe937b7867bce71e0ea3cd

      SHA1

      7e1252a8d43e648367d51f51c8791e6bf9fd1a4e

      SHA256

      2a9343710bffc54888ed43781854f36172b1a78de5905dcd15ff0849a5dae855

      SHA512

      9f24e1be92832743f118be96cf538292fb68ddbf0c053ed6d1786de02acb931686ce0a27cca05a9762401b0fef33fc0bf4cd7f9d32a70764a25665930ad1c864

    • memory/944-0-0x0000000010000000-0x0000000010010000-memory.dmp

      Filesize

      64KB