Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/04/2024, 18:19

General

  • Target

    0a4f561363f0bae19ade6bf4c2703eb0_JaffaCakes118.exe

  • Size

    7.3MB

  • MD5

    0a4f561363f0bae19ade6bf4c2703eb0

  • SHA1

    01b3c08dbde0e7812eec213a4a3516c5e488808c

  • SHA256

    48a5dd4f19318e47e5316e29629a6bb3f4d0613fb0f54ce58a409f8a46d0d548

  • SHA512

    15c768c0cb2190c62cba93a32104e30e690189adafc88b69a7f6e264e66693d7939499af5f29314811ba80c5dde93a27ba495a2187ffbef2b2f6e676b7d46526

  • SSDEEP

    98304:JGxVzrQ6viczbMAIgXSYn0UL2AzZfzpvLhpLB1uV9+S99U:JMVzs6qczbJXSYnZFZbpvbLB10n99U

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 5 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Drops autorun.inf file 1 TTPs 3 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in Program Files directory 39 IoCs
  • Modifies Internet Explorer start page 1 TTPs 5 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a4f561363f0bae19ade6bf4c2703eb0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0a4f561363f0bae19ade6bf4c2703eb0_JaffaCakes118.exe"
    1⤵
    • Drops autorun.inf file
    • Drops file in Program Files directory
    • Modifies Internet Explorer start page
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    PID:3868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506

    Filesize

    330B

    MD5

    a280f860eaf2878636387dd4cbbdaa7a

    SHA1

    dc944cde0539e70b2b0e87c2eec0cce543d4f713

    SHA256

    e69f68823d3dc4631cb76bb76702f8f82c2912484598133a50ee051dcbb5d2d4

    SHA512

    bf6eb2663e27f0752417a01a6a09d86783799cc06864b8cdcb640de3d8ca2adfad0be5ccce91e1175b726d2f9bc3c9d3aa57a7f6c0b8dd4b7c1ccc6a6c440b5b

  • F:\Install.exe

    Filesize

    7.3MB

    MD5

    0a4f561363f0bae19ade6bf4c2703eb0

    SHA1

    01b3c08dbde0e7812eec213a4a3516c5e488808c

    SHA256

    48a5dd4f19318e47e5316e29629a6bb3f4d0613fb0f54ce58a409f8a46d0d548

    SHA512

    15c768c0cb2190c62cba93a32104e30e690189adafc88b69a7f6e264e66693d7939499af5f29314811ba80c5dde93a27ba495a2187ffbef2b2f6e676b7d46526

  • memory/3868-61-0x0000000000400000-0x00000000010B6000-memory.dmp

    Filesize

    12.7MB

  • memory/3868-56-0x0000000000400000-0x00000000010B6000-memory.dmp

    Filesize

    12.7MB

  • memory/3868-57-0x0000000000400000-0x00000000010B6000-memory.dmp

    Filesize

    12.7MB

  • memory/3868-60-0x0000000000400000-0x00000000010B6000-memory.dmp

    Filesize

    12.7MB

  • memory/3868-0-0x0000000000400000-0x00000000010B6000-memory.dmp

    Filesize

    12.7MB

  • memory/3868-1-0x00000000001E0000-0x00000000001F0000-memory.dmp

    Filesize

    64KB

  • memory/3868-64-0x0000000000060000-0x0000000000062000-memory.dmp

    Filesize

    8KB

  • memory/3868-67-0x00000000001F0000-0x0000000000200000-memory.dmp

    Filesize

    64KB

  • memory/3868-69-0x0000000005540000-0x0000000005541000-memory.dmp

    Filesize

    4KB

  • memory/3868-68-0x0000000000400000-0x00000000010B6000-memory.dmp

    Filesize

    12.7MB

  • memory/3868-70-0x0000000000400000-0x00000000010B6000-memory.dmp

    Filesize

    12.7MB