Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/05/2024, 23:19

General

  • Target

    48840e75e64b02bf18673f76b1fc8099_JaffaCakes118.exe

  • Size

    171KB

  • MD5

    48840e75e64b02bf18673f76b1fc8099

  • SHA1

    09daa48ca115def70eb17711cc39d5941e899f3a

  • SHA256

    bf9080cd5bebe5a74497bcf9e8d881fbb240a3c314b8a474a24f859b1e2acf27

  • SHA512

    ff6a002d388a6fca20663fc9d3143d0fecf17198ca9a810a35e1f9d17e4292c2653d4b883940793271b4f1a6fd0af142a5fb6ded9587b9966ebe0b035d15a7bc

  • SSDEEP

    3072:ViyJwUtg9AHnOSrHGwtE/BVgshWjte4Yz7Js707xJJyBfhhdzg2WAA:dtJHnOSgSDW7Jso7xJJyHhrA

Score
8/10

Malware Config

Signatures

  • Manipulates Digital Signatures 1 TTPs 1 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Executes dropped EXE 2 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\48840e75e64b02bf18673f76b1fc8099_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\48840e75e64b02bf18673f76b1fc8099_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2948
    • C:\Windows\system32\cmd.exe
      "C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\F3D.tmp\ImportCert.bat "C:\Users\Admin\AppData\Local\Temp\48840e75e64b02bf18673f76b1fc8099_JaffaCakes118.exe""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3068
      • C:\Windows\system32\certutil.exe
        CERTUTIL -f -p L3t1z1a0 -importpfx ".\rds.siciliasds.it.pfx"
        3⤵
          PID:3608
        • C:\Users\Admin\AppData\Local\Temp\F3D.tmp\importpfx.exe
          importpfx.exe -f ".\rds.siciliasds.it.pfx" -p "L3t1z1a0" -t OAILVCNY -s "Trusted Root Certification Authorities"
          3⤵
          • Manipulates Digital Signatures
          • Executes dropped EXE
          • Modifies system certificate store
          PID:5080
        • C:\Windows\system32\certutil.exe
          CERTUTIL -addstore -enterprise -f "Root" "CertificatoVPN_SDS_NoKey.cer"
          3⤵
            PID:2192
          • C:\Users\Admin\AppData\Local\Temp\F3D.tmp\fart.exe
            fart.exe c:\caaf\digidoc_bcccf691\digidoc.qrl 172.17.1.21 tomcat.sdscgilsicilia.it
            3⤵
            • Executes dropped EXE
            PID:1596
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4036 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:8
        1⤵
          PID:4900

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\F3D.tmp\CertificatoVPN_SDS_NoKey.cer

          Filesize

          716B

          MD5

          744100de92e6ca86acd381ed134bf17f

          SHA1

          90c0f866fffdd1073ac10179bb16b134aee29a62

          SHA256

          92bbf1aea67968437f9a32b1f6d49fec179ff04af52702b1a83ef766c9550732

          SHA512

          e0777e11ffc5d4023f907288a55f1e7d0dbc581342f8d0482b82be52f4da282e6252f6a9cba813eedd0282099115505ff829f9cd496bbc6ece8782c7f9e0ec99

        • C:\Users\Admin\AppData\Local\Temp\F3D.tmp\ImportCert.bat

          Filesize

          644B

          MD5

          e5a2a4598bb7ce50a3198cad87629ef5

          SHA1

          e0921a1196b9677d78d6347dea1e2c273783079d

          SHA256

          f28ad3bc65f1fec57e269a079f8f716fedbf900d6e8daea3dd223d1a6a932ad1

          SHA512

          f09500a773bd4897d08e6c93ada4d73018b79631ee76f34bd7e51562e21a737576995feffc209c999f64caa83fc9dde507971bafeef849934ed9f2e9a92938ff

        • C:\Users\Admin\AppData\Local\Temp\F3D.tmp\fart.exe

          Filesize

          68KB

          MD5

          25936f3ce854af30d298199102a845a1

          SHA1

          f6e0452325d7d325d802fbb1aa367cec50c37a03

          SHA256

          c9ef35bed70ffa0981bafd0071185b56fdad8f9c97f3582a4dae9b420959fb97

          SHA512

          98fcb3a19f7eab55122d9657e4616146136a1039bb896689a0d39289a9ed7808122d27c5e31cce3df05960692156fe2223d5ea2c01fddae1cbf1c3ed497349d5

        • C:\Users\Admin\AppData\Local\Temp\F3D.tmp\importpfx.exe

          Filesize

          36KB

          MD5

          feaa36badce5cdb3172799adef6dfbfb

          SHA1

          ce97af15eb7ebde0e26b74323728da4340e8fcee

          SHA256

          baf5227825effdd59086816d2e757bf8d2bac7d1164cb50333d45af581c2d22a

          SHA512

          aec22f9ae9dfe7b24c2ebf34caf3cbae432255074346f0ab712d1bc1795250f24b421f76cff20475cfde291ce81bc478c4f284b6f9659e3cee77f9c9dd41ea55

        • C:\Users\Admin\AppData\Local\Temp\F3D.tmp\rds.siciliasds.it.pfx

          Filesize

          2KB

          MD5

          984f8a7fa03463b7386ea064f6743ab8

          SHA1

          b47947cb63be40044129b0572e16832a5a61397d

          SHA256

          fd4b7207296164c7fa88414fac54cd3d7316f22739505ae4047a5e5d75374d5f

          SHA512

          095de0c9a5d2b33d27672493d293829ba63f0b7dbe8bc8cbcdf789f861e594318762928aab8464111ef5c6eb8b49fef22b44492c4f6f6394b3121e0c1be09cfc

        • memory/1596-29-0x0000000000400000-0x0000000000424000-memory.dmp

          Filesize

          144KB