Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/05/2024, 05:17

General

  • Target

    83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe

  • Size

    789KB

  • MD5

    83240a5b529691ae7f4c4d19eea3bd43

  • SHA1

    d157c49756024d1fb0a3ae2f146facbda7aae45a

  • SHA256

    b5f524fb3ed8f651f1ef5549af543a4a6944dd12074ad91298ea8361769656ce

  • SHA512

    f03167fa1f3804862ded22884746eedde136d1694862cd0f84fd849a552486a2385264ad6f06c08020e836550a245b1d398ed015109df8c716df4d1e52ccdce7

  • SSDEEP

    12288:mtobbXN42nHq+EgqfRAUEcB3gOE6DZlZUXavlXluE70pFdZigcyrG4EEu44Fv:mt8RHjEgYAw1hZlZTWQu7igcyKPEuj9

Score
5/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1780
    • C:\Users\Admin\AppData\Local\Temp\nsb82B.tmp\internal83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\nsb82B.tmp\internal83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe /baseInstaller='C:/Users/Admin/AppData/Local/Temp/83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe' /fallbackfolder='C:/Users/Admin/AppData/Local/Temp/nsb82B.tmp/fallbackfiles/'
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:5076
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4735.bat" "C:\Users\Admin\AppData\Local\Temp\E5712F45190F4D5B9862762DDF01FBEE\""
        3⤵
          PID:1124
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3976 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:4052

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\$Recycle.Bin\S-1-5-21-3808065738-1666277613-1125846146-1000\$IB04LMO

        Filesize

        98B

        MD5

        8bfb880e59bc4cdb111da27545ff0657

        SHA1

        d02b97db2c158d2038aee45b9b95f7219556fafd

        SHA256

        a48aa387a8bf62023a734098153e3fc852ec2ec8c571a05a92737b00fc4fb186

        SHA512

        9938cde98798e52c315fa215d438ebb356eadf75c8a65f37cb0b8efab19a177e6b5ee7c6f0e33f06b89ceabc982ed136a85b9d92d8dfec814224c85077b23990

      • C:\$Recycle.Bin\S-1-5-21-3808065738-1666277613-1125846146-1000\$IDENI2R

        Filesize

        98B

        MD5

        9d5a441fb9e4322d65c6336d7c2e7f0d

        SHA1

        2c26cb1927c334b833c268308ff0bc7b57e40ef3

        SHA256

        05ac6297cfb8fb5036b731b58e6f4a85c6436cc9cdf123b1bd58c7733293132b

        SHA512

        c87efd21f7adfae41b2381ea78d45c8bab905774063cafe42cf3697fe78096cd09cb3ff378384e26078d9a2a3b3bdd56d0d510410d568dbb591b045f204a0132

      • C:\Users\Admin\AppData\Local\Temp\4735.bat

        Filesize

        212B

        MD5

        668767f1e0c7ff2b3960447e259e9f00

        SHA1

        32d8abf834cce72f5e845175a0af2513b00504d8

        SHA256

        cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d

        SHA512

        c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680

      • C:\Users\Admin\AppData\Local\Temp\E5712F45190F4D5B9862762DDF01FBEE\E5712F45190F4D5B9862762DDF01FBEE_LogFile.txt

        Filesize

        9KB

        MD5

        f470a1cf2a758a22da486aab36eb0a08

        SHA1

        3b5c28039bac6f49d25e2dd1ba9ee440ea89bdb3

        SHA256

        3896a277e504f7ba9a9be2fc755807e680f7fd0a605c086e30287da76345dccf

        SHA512

        9db0de3301d807c4ef34f47afc8a653384947f78f12dd684065dd06f75a99f7d1cf214c10611d1df8b2c5d9142155b791010c0c0534a4226fec54b0003979c5b

      • C:\Users\Admin\AppData\Local\Temp\E5712F45190F4D5B9862762DDF01FBEE\E5712F~1.TXT

        Filesize

        111KB

        MD5

        e61de3a7331ba6741a775a42fe9db4f4

        SHA1

        5111f03e43d6b0f0d4329c6337b31ba46e5311a2

        SHA256

        18844e5d9fcc9b8666198bed385d5498767816d7ec2bd5b3d86e23dd7106bd7f

        SHA512

        bffc02325edf14786124809b58a19c0b073e028c3b39b887be7f1026ef4cfa03f8098a707d2b142bb5f94806f83fd86a073a6ad5072b356e6eb4f204db8251d3

      • C:\Users\Admin\AppData\Local\Temp\nsb82B.tmp\StdUtils.dll

        Filesize

        14KB

        MD5

        21010df9bc37daffcc0b5ae190381d85

        SHA1

        a8ba022aafc1233894db29e40e569dfc8b280eb9

        SHA256

        0ebd62de633fa108cf18139be6778fa560680f9f8a755e41c6ab544ab8db5c16

        SHA512

        95d3dbba6eac144260d5fcc7fcd5fb3afcb59ae62bd2eafc5a1d2190e9b44f8e125290d62fef82ad8799d0072997c57b2fa8a643aba554d0a82bbd3f8eb1403e

      • C:\Users\Admin\AppData\Local\Temp\nsb82B.tmp\internal83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118.exe

        Filesize

        1.8MB

        MD5

        9ab5db4bb5971035b4d287d64f9676b5

        SHA1

        33d17f016339572dd05c124d6243fffefd0cd039

        SHA256

        f2126481c02d2a5af29e56023902a0897d05867c1caaf8079cf6e1f05dd9b209

        SHA512

        d36262fdd4d8bd083d8537f0698c423240c9e42b2dc0048e2470d87411f295d6e3428587b76b0486875495d502f1f31f9edf3eb6fdb914f13421b7f29fa5f066

      • C:\Users\Admin\AppData\Local\Temp\nsb82B.tmp\internal83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118_icon.ico

        Filesize

        17KB

        MD5

        055c2cb77fa2edc2802b7fd397b9c213

        SHA1

        e6bf5af3427539bf609cfb8904b35803a06104d3

        SHA256

        78d0ed2288334f341225acee3d6200d01bb0bb80b873c448ab151d0661817bf2

        SHA512

        7dc2930b9ac4843cca0a073a9195ab0cfb684b29c13622d0f934fb4b4a45af0fbb3a033f6ba31216214a9cbc1966436c36dd065c44b014c5c2a03dfd0b005a65

      • C:\Users\Admin\AppData\Local\Temp\nsb82B.tmp\internal83240a5b529691ae7f4c4d19eea3bd43_JaffaCakes118_splash.png

        Filesize

        12KB

        MD5

        fe272d040e82704707b19bfbf29d65ca

        SHA1

        460de628ea63986a7e6390a1623d8ba32dc82aee

        SHA256

        1cb036da61dc7b1ad62280681c724d74cbcc313d530a799728a4d38b4e2b1983

        SHA512

        8a03f9f3ce7af53b2f119f9bd001ff3fd39f879de88723306e2a6c7e8cae679d2095be6d4520ea24035c86140ef01a178a0b2535674be5c39b8b2dde4d082b1b

      • memory/1780-49-0x0000000000400000-0x000000000043B000-memory.dmp

        Filesize

        236KB

      • memory/1780-298-0x0000000000400000-0x000000000043B000-memory.dmp

        Filesize

        236KB

      • memory/5076-81-0x0000000003BC0000-0x0000000003BC1000-memory.dmp

        Filesize

        4KB

      • memory/5076-214-0x0000000003BC0000-0x0000000003BC1000-memory.dmp

        Filesize

        4KB