Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/05/2024, 14:30

General

  • Target

    7d4c32d6cb113aedc60e6f6225a171f1_JaffaCakes118.exe

  • Size

    10.1MB

  • MD5

    7d4c32d6cb113aedc60e6f6225a171f1

  • SHA1

    c6ee7bdf6a5d0949bfdf0a0e9e35bd5068f729f6

  • SHA256

    049fc2018c02cf02f7b40a234544f1531f1bcb0c97b3b3ed3cb6bfbdce52d845

  • SHA512

    4ddf6ad0b04873c296db1492b55d11beb81baef6d5c9e4e6f588a26de60bc2b6ec3187a8ec788bf56e13cf14d37718a6b56129cea1c6289b5557e07722f89038

  • SSDEEP

    196608:GfbBUgj3wTAH0JzQyohFnQqKHWWmV82gMNnZ3XEW7teOyFa6IMyDjRLaF1yp8:GTBUG4JzQyUGmwEnVXFMfOmTyO

Score
10/10

Malware Config

Signatures

  • Zeus
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d4c32d6cb113aedc60e6f6225a171f1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7d4c32d6cb113aedc60e6f6225a171f1_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Users\Admin\AppData\Local\Temp\is-9ENFS.tmp\7d4c32d6cb113aedc60e6f6225a171f1_JaffaCakes118.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-9ENFS.tmp\7d4c32d6cb113aedc60e6f6225a171f1_JaffaCakes118.tmp" /SL5="$901CE,10176139,286720,C:\Users\Admin\AppData\Local\Temp\7d4c32d6cb113aedc60e6f6225a171f1_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:5032
      • C:\Users\Admin\AppData\Local\Temp\is-L6A2J.tmp\cmpinstall.exe
        "C:\Users\Admin\AppData\Local\Temp\is-L6A2J.tmp\cmpinstall.exe" /uid=7d4c32d6cb113aedc60e6f6225a171f1_JaffaCakes118
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3524
        • C:\Users\Admin\AppData\Local\Temp\is-1NQKI.tmp\cmpinstall.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-1NQKI.tmp\cmpinstall.tmp" /SL5="$60116,239625,121344,C:\Users\Admin\AppData\Local\Temp\is-L6A2J.tmp\cmpinstall.exe" /uid=7d4c32d6cb113aedc60e6f6225a171f1_JaffaCakes118
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:888
          • C:\Users\Admin\AppData\Local\Temp\is-L6A2J.tmp\cmpinstall.exe
            "C:\Users\Admin\AppData\Local\Temp\is-L6A2J.tmp\cmpinstall.exe" /VERYSILENT /uid=7d4c32d6cb113aedc60e6f6225a171f1_JaffaCakes118
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:5088
            • C:\Users\Admin\AppData\Local\Temp\is-QD9SI.tmp\cmpinstall.tmp
              "C:\Users\Admin\AppData\Local\Temp\is-QD9SI.tmp\cmpinstall.tmp" /SL5="$90118,239625,121344,C:\Users\Admin\AppData\Local\Temp\is-L6A2J.tmp\cmpinstall.exe" /VERYSILENT /uid=7d4c32d6cb113aedc60e6f6225a171f1_JaffaCakes118
              6⤵
              • Drops startup file
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              PID:2308
      • C:\Users\Admin\AppData\Local\Temp\is-L6A2J.tmp\ccsetup.exe
        "C:\Users\Admin\AppData\Local\Temp\is-L6A2J.tmp\ccsetup.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1604
        • C:\Windows\system32\pcaui.exe
          "C:\Windows\system32\pcaui.exe" -g {11111111-1111-1111-1111-111111111111} -x {d5ceeb93-9830-4406-a772-e167287b96c4} -a "CCleaner" -v "Piriform Ltd" -s "This app can't run because it causes security or performance issues on Windows. A new version may be available. Check with your software provider for an updated version that runs on this version of Windows." -n 2 -f 2021048 -k 0 -e "C:\Users\Admin\AppData\Local\Temp\is-L6A2J.tmp\ccsetup.exe"
          4⤵
            PID:2852

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\is-1NQKI.tmp\cmpinstall.tmp

      Filesize

      1.1MB

      MD5

      90fc739c83cd19766acb562c66a7d0e2

      SHA1

      451f385a53d5fed15e7649e7891e05f231ef549a

      SHA256

      821bd11693bf4b4b2b9f3c196036e1f4902abd95fb26873ea6c43e123b8c9431

      SHA512

      4cb11ad48b7585ef1b70fac9e3c25610b2f64a16358cd51e32adcb0b17a6ab1c934aeb10adaa8e9ddf69b2e2f1d18fe2e87b49b39f89b05ea13aa3205e41296c

    • C:\Users\Admin\AppData\Local\Temp\is-9ENFS.tmp\7d4c32d6cb113aedc60e6f6225a171f1_JaffaCakes118.tmp

      Filesize

      1.3MB

      MD5

      86d64857e181ff96c9f427e1828ee811

      SHA1

      dfef85e6cd197d29590148d9a1d2b760a9a71377

      SHA256

      1addb55def9d6bc9fcc5314227332f5db7e06858b59d0edf9e1c63d5bd872c2f

      SHA512

      515bb44bf87aa52184ee8022d0c494f943727dbb5a56557757e7cf40584b255ffb2587bb80d7744d5b53b12b9e49d4d81cecc84e1d7b4a55bfe716488914ff87

    • C:\Users\Admin\AppData\Local\Temp\is-L6A2J.tmp\ccsetup.exe

      Filesize

      9.0MB

      MD5

      46fa3b1351774f0180914ddb3f30b48b

      SHA1

      347705a7cd4a4c20f0d4159fa1ff1589fa0fa9f5

      SHA256

      3e0b1faf12fc72445e48251731bc6f4b4687b1f154a9a66890040f8091655339

      SHA512

      e504bdd49947cf85e28a7343f06bcf71b59ddb4d28853dd72c41e0ba3a1cae6d40f54ebc0973e26708c0ee6780828baea51db23b786257e259ffffe8e5240552

    • C:\Users\Admin\AppData\Local\Temp\is-L6A2J.tmp\cmpinstall.exe

      Filesize

      621KB

      MD5

      4ef65d56e02cb28ff30d222357a98763

      SHA1

      409be6ca2bf87c95464179c70cff89bda9c10839

      SHA256

      f93ddbc3af2a4dca4993d7821f6cf1d85ea9316c4e7dca85f543dd37860644c7

      SHA512

      9c72fde7ff008373b06e2759399351f6929c96d20312f8da5633de01b2a3ad947e87e4865341ba393273227667dbc29a8f34b49dccd9276e08d085e1230c82b7

    • C:\Users\Admin\AppData\Roaming\MicrosoftUpdate\chromecommon.dll

      Filesize

      192KB

      MD5

      e1c39d194d339aa6a4b4055b74daadc8

      SHA1

      b223e0e148cd3e639ca513532bccdb48a566f55c

      SHA256

      2f468922b993086c065a4b0a0b438daa15b88005f531ae7c1c809b612c746d37

      SHA512

      05d483d3c1aac443e171f9093bc2d59bfc442af1b3902cc2877291aca84116320f84b607b32404b5c4babbf4a8b1a7290ab38ab182e1286e1baf5bdfbf242741

    • memory/888-22-0x0000000000400000-0x000000000052D000-memory.dmp

      Filesize

      1.2MB

    • memory/888-36-0x0000000000400000-0x000000000052D000-memory.dmp

      Filesize

      1.2MB

    • memory/2024-77-0x0000000000400000-0x0000000000450000-memory.dmp

      Filesize

      320KB

    • memory/2024-0-0x0000000000400000-0x0000000000450000-memory.dmp

      Filesize

      320KB

    • memory/2024-2-0x0000000000401000-0x0000000000412000-memory.dmp

      Filesize

      68KB

    • memory/2308-78-0x0000000000400000-0x000000000052D000-memory.dmp

      Filesize

      1.2MB

    • memory/3524-11-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3524-14-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/3524-39-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/5032-6-0x0000000000400000-0x0000000000555000-memory.dmp

      Filesize

      1.3MB

    • memory/5032-75-0x0000000000400000-0x0000000000555000-memory.dmp

      Filesize

      1.3MB

    • memory/5088-33-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/5088-80-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB