Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

23/05/2024, 18:29

240523-w4w7ssbh59

Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240508-en
  • resource tags

    arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    24/05/2024, 15:36

General

  • Target

    6bdea523ddaabc94af229d4ee7e22d49_JaffaCakes118.js

  • Size

    74KB

  • MD5

    6bdea523ddaabc94af229d4ee7e22d49

  • SHA1

    f5f88b136a7ff380d753e2de901fc7f54e2a16a4

  • SHA256

    5a64b0a16eaa89f61694c209d9f7b83f6ed6d2c0dc13a85f500d1019b7004f9d

  • SHA512

    6abc16dd890422457560fe2c89fd03025bef92118cc4a6e6c100ebe5fa2f705918c8a0c69240af7a62c674c00d3edf09e4125fa01ee086ed03940902d4c6e36c

  • SSDEEP

    1536:gPMd4PsBxwxQ9vMJZLHAxYpxzVde3kRCqgdHXDp7l7o+7LSj5+fPC8ql1040wkb4:qsLqgdHXDp7l7o+7LSjkfPC8ql1040wf

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\6bdea523ddaabc94af229d4ee7e22d49_JaffaCakes118.js
    1⤵
      PID:2832
    • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
      "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:936
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
      1⤵
        PID:1228
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,Control_RunDLL C:\Windows\System32\srchadmin.dll ,
        1⤵
          PID:1364
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\ExpandUnlock.mpv2"
          1⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:2624

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

          Filesize

          10KB

          MD5

          e9aa12ff0be6d995ed86f8cf88678158

          SHA1

          e5ee38fc2ebef0fcbc3059dee29b39f7daf21931

          SHA256

          f35cd8ef03ac924a59943c5dfffc31ab67a8b5aff272e9f47ff776aabc7ee561

          SHA512

          95a67acd2a4784b87d73910c1f1f590937c9d9b901e98448556a37eb8137ae5f458f1c673d65a46cf7d6b90bee5fe6b102ce3eeac9e819062cd9c5c2418bcbfc

        • memory/2624-25-0x00007FFF5BEE0000-0x00007FFF5BF14000-memory.dmp

          Filesize

          208KB

        • memory/2624-24-0x00007FF78C430000-0x00007FF78C528000-memory.dmp

          Filesize

          992KB

        • memory/2624-26-0x00007FFF4A5F0000-0x00007FFF4A8A6000-memory.dmp

          Filesize

          2.7MB

        • memory/2624-27-0x00007FFF483F0000-0x00007FFF494A0000-memory.dmp

          Filesize

          16.7MB