Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    50s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/05/2024, 11:50

General

  • Target

    0bb8eb516bce14354d8e0884feb299d3_JaffaCakes118.exe

  • Size

    732KB

  • MD5

    0bb8eb516bce14354d8e0884feb299d3

  • SHA1

    8308c07af4242a1d5f452564cdd636c04a357727

  • SHA256

    764d1d0a2611acaec7add8d634bd038cbafbbba2f584cef5442ff182f6323094

  • SHA512

    754599bfcf83eec91170b747c056bb27824b8ef567678a6947206b77a27875e9e56bb77378a468309e6f391dbd6671c823a17041466ffd2dd5a626458ec3d775

  • SSDEEP

    12288:j0gsaGle5IGICmMwHW0MB3ybbhGNWVCOlO/ohLftqacu3pS:wvaUG+9e3yGN6vcu3

Score
7/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 11 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\0bb8eb516bce14354d8e0884feb299d3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0bb8eb516bce14354d8e0884feb299d3_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    PID:1120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsp470C.tmp\IS.dll

    Filesize

    94KB

    MD5

    194dcc4b0a5ad6b6f7c1f166d96c4476

    SHA1

    fb0390ac1e04a66f284adbd0af6e809bf5b0792e

    SHA256

    643e7fd4591d117c43515efc93d4ddbaf0879b14403531147f4c34a49275ffd6

    SHA512

    4161da2fddcd0561237082c639716aca566a7755dd0589c5b5d63d436dbb7df5838d2a7c8c11cbd74346d678cdb4c5b8022f78855f6a9613b17be9a47487af51

  • C:\Users\Admin\AppData\Local\Temp\nsp470C.tmp\NET.dll

    Filesize

    92KB

    MD5

    63834ec07c42859db4ebef4947046d50

    SHA1

    ea9551cba09926ae639c0ba93479049fc060af4c

    SHA256

    1bd3438268e3a8e6060ec607e503714805657d01b3a35fea289f2624ff3265c0

    SHA512

    972b8ecfa0ba2bae2f7ed269f66a11a90dfc45435f916bfee58ce493fb244b0b077412260390cf43adf64098f2771daabdd3541e2350137f450423d8c119503e

  • C:\Users\Admin\AppData\Local\Temp\nsp470C.tmp\System.dll

    Filesize

    11KB

    MD5

    bf712f32249029466fa86756f5546950

    SHA1

    75ac4dc4808ac148ddd78f6b89a51afbd4091c2e

    SHA256

    7851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af

    SHA512

    13f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4

  • C:\Users\Admin\AppData\Local\Temp\nsp470C.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    4ccc4a742d4423f2f0ed744fd9c81f63

    SHA1

    704f00a1acc327fd879cf75fc90d0b8f927c36bc

    SHA256

    416133dd86c0dff6b0fcaf1f46dfe97fdc85b37f90effb2d369164a8f7e13ae6

    SHA512

    790c5eb1f8b297e45054c855b66dfc18e9f3f1b1870559014dbefa3b9d5b6d33a993a9e089202e70f51a55d859b74e8605c6f633386fd9189b6f78941bf1bfdb

  • C:\Users\Admin\AppData\Local\Temp\nsp470C.tmp\nsJSON.dll

    Filesize

    7KB

    MD5

    78b913fcd04259634a5e901c616e6074

    SHA1

    ad5e1c651851a1125bcad79b01ccdcfa45df4799

    SHA256

    e3ce60666bb88c2412615ef9f432ec24e219532dee5cc1c7aebc65ed9ec94d59

    SHA512

    cbe07179dd93011f3d9a8f83541961ff34fb83d96658ac82a433ef0aa3399b183eaec3e6a49ec1c1e478d1eada2d3ebc78ffb1ae0574984ae66a7a9cab5d59e5

  • C:\Users\Admin\AppData\Local\Temp\nsp470C.tmp\nsResize.dll

    Filesize

    4KB

    MD5

    a8655e0ca9e079edc631838273afc087

    SHA1

    20c4468e90f961c499870cfa6a179c82f6d72675

    SHA256

    eeb2705599c3075e652762e74c88d3cb482e01ad8cae65f02022f91aebf13cb5

    SHA512

    383201fc7f0d15f0d02ae638e411becac61eb5f475020220035ba6df560aee23cbb90082e6827aeaba434e150c08df87914e3cea308ed197f86d560eacc369e1

  • memory/1120-58-0x0000000073FC0000-0x0000000073FC9000-memory.dmp

    Filesize

    36KB

  • memory/1120-55-0x0000000073FC0000-0x0000000073FC9000-memory.dmp

    Filesize

    36KB

  • memory/1120-21-0x00000000750B0000-0x00000000750BA000-memory.dmp

    Filesize

    40KB

  • memory/1120-57-0x0000000073FC0000-0x0000000073FC9000-memory.dmp

    Filesize

    36KB

  • memory/1120-56-0x0000000073FC0000-0x0000000073FC9000-memory.dmp

    Filesize

    36KB

  • memory/1120-53-0x0000000073FC0000-0x0000000073FC9000-memory.dmp

    Filesize

    36KB

  • memory/1120-54-0x0000000073FC0000-0x0000000073FC9000-memory.dmp

    Filesize

    36KB

  • memory/1120-61-0x0000000073FC0000-0x0000000073FC9000-memory.dmp

    Filesize

    36KB

  • memory/1120-62-0x0000000073FC0000-0x0000000073FC9000-memory.dmp

    Filesize

    36KB

  • memory/1120-66-0x0000000073FC0000-0x0000000073FC9000-memory.dmp

    Filesize

    36KB

  • memory/1120-65-0x0000000073FC0000-0x0000000073FC9000-memory.dmp

    Filesize

    36KB

  • memory/1120-64-0x0000000073FC0000-0x0000000073FC9000-memory.dmp

    Filesize

    36KB

  • memory/1120-63-0x0000000073FC0000-0x0000000073FC9000-memory.dmp

    Filesize

    36KB