Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/06/2024, 17:15

General

  • Target

    8ed377a4bb27a896cc51df618d9a1f4b_JaffaCakes118.exe

  • Size

    81KB

  • MD5

    8ed377a4bb27a896cc51df618d9a1f4b

  • SHA1

    e6e0b772640ad52baa806e16911d2cf0093ce3e1

  • SHA256

    b094894ed1294c4f137ef2f4985d0d7cdaaf897daf282615780814f1aa41a958

  • SHA512

    eac4b792e89c344ec21f7842664d13dc56f260cc4a5b333c2306ee42ad41b333db02260b61f6e5446dd695506e9b5ebcef3c228dcb80608ecb5dbc476947a80e

  • SSDEEP

    1536:xFqsQSZRzMfmCj/5gXVV66VyUD6CS3f1Tqo:TnZRzImCr5glVLgUDBk1uo

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 13 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ed377a4bb27a896cc51df618d9a1f4b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8ed377a4bb27a896cc51df618d9a1f4b_JaffaCakes118.exe"
    1⤵
    • Adds policy Run key to start application
    • Sets service image path in registry
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    PID:4856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\userun32.exe

    Filesize

    81KB

    MD5

    cb812981b2087e31f2d4f4a1e78b6087

    SHA1

    6d502ed215f6b4b9fa165087aef11b0463b383ad

    SHA256

    a4a7695cdc24fabf0d3018b7692a9d1a512a4a37b4ea0270477a217df9034c4a

    SHA512

    44b008ce2f62b617a4f56f15859274a2842897c518fac8c869e24ab4ff6fc7e88713ea39f0748f5fbeafc4a161a265373a75e5a8b5ec2ce1e4021fc85d2793c3

  • memory/4856-0-0x0000000000400000-0x000000000049A000-memory.dmp

    Filesize

    616KB

  • memory/4856-17-0x0000000000400000-0x000000000049A000-memory.dmp

    Filesize

    616KB

  • memory/4856-18-0x0000000000400000-0x000000000049A000-memory.dmp

    Filesize

    616KB