Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/05/2024, 19:16

General

  • Target

    2158c62145486564696c924d8ced1241_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    2158c62145486564696c924d8ced1241

  • SHA1

    474d1c5aacf28a0dfb345c021ad386e524323ea1

  • SHA256

    cca1de03b965083dcea059431c8f2419b7f1f33275539983d44f0d3cacbf1c40

  • SHA512

    520b8fd3edf2dc3c6c8623b4f76aad2aff275e563d093d1ff4543e806a622430629f43810c1e134dc11f0d9676e8c1a0ff416c1af28cb9f33b7eaa82cdd78294

  • SSDEEP

    12288:vsM+aTA3c+FK1vrlVYBVignBtZnfVq4cz1i5pP9kPQKjh:UV4W8hqBYgnBLfVqx1Wjk3t

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2158c62145486564696c924d8ced1241_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2158c62145486564696c924d8ced1241_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Suspicious use of WriteProcessMemory
    PID:2428
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -noframemerging
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1780
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1780 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1184
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4164 --field-trial-handle=2280,i,11703952675008463361,17436195144517971517,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3272

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      471B

      MD5

      cf184a85bb889ee72130f32f3de611f7

      SHA1

      500de7c317290cd07a6ad8773cdc75623a0549ac

      SHA256

      09f37ae0bf919e075441a0c5d52a18208ed3133c777d78271a1f7fdabef6ab15

      SHA512

      754309fc8b3135cac46adfb778e86c813ecfff3415cdcf5d6530827214f14e079a7a07546df99a518284fbc98e333f16023fc1ca52d8c1877e44cfe558520ccb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      404B

      MD5

      a51b06a1a2e2af6097e70b0eafe931a4

      SHA1

      e7ecfd7a3a98f9fdc78f568bb77d529c3966f31b

      SHA256

      1894cd52073e90d8954b5e876915a617da8ca312ab7b4c5b183f16022340a683

      SHA512

      8a98455d001a7053eaa79f23c6694e87a3c34750772b96a68d75333f60f2cd470db7ffeaab9e60c00044d5bdc0e4f4e2bf76e60d10566807f2d5baaa4cd68a56

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\X0OFMNIL\suggestions[1].en-US

      Filesize

      17KB

      MD5

      5a34cb996293fde2cb7a4ac89587393a

      SHA1

      3c96c993500690d1a77873cd62bc639b3a10653f

      SHA256

      c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

      SHA512

      e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee