Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/06/2024, 12:26

General

  • Target

    9827dfd7e331a7a56a2452c12043b0c4_JaffaCakes118.exe

  • Size

    1.8MB

  • MD5

    9827dfd7e331a7a56a2452c12043b0c4

  • SHA1

    561af7a190a427d65d8b297aa6bb7a696d59c963

  • SHA256

    71313eff23b29c4e3f2820a0a4198e976d952943369677cdde0634b832e7c5b4

  • SHA512

    dd49c2642b02b3c171de9073ab3d138542fcac09f055e1a619f280b2bb724c37bd572ce810a86f83ca67ecc125488af483cc0b47bc3dfb82b1b402500d94d86a

  • SSDEEP

    24576:0PIR4nvIiX7CqLcepYkgwxbCaxVfDf/bHueaC8DcrJzxGGF8aXW27IYODOhdlIPg:0PzF8O+57s5TYniy4gF9/yZ9rRhiGGR6

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9827dfd7e331a7a56a2452c12043b0c4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9827dfd7e331a7a56a2452c12043b0c4_JaffaCakes118.exe"
    1⤵
    • Checks BIOS information in registry
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4544-0-0x0000000000400000-0x0000000000620000-memory.dmp

    Filesize

    2.1MB

  • memory/4544-2-0x0000000002570000-0x00000000026CA000-memory.dmp

    Filesize

    1.4MB

  • memory/4544-8-0x0000000002570000-0x00000000026CA000-memory.dmp

    Filesize

    1.4MB

  • memory/4544-10-0x0000000000400000-0x0000000000620000-memory.dmp

    Filesize

    2.1MB

  • memory/4544-11-0x0000000000400000-0x0000000000620000-memory.dmp

    Filesize

    2.1MB

  • memory/4544-14-0x0000000002570000-0x00000000026CA000-memory.dmp

    Filesize

    1.4MB

  • memory/4544-13-0x0000000000400000-0x0000000000620000-memory.dmp

    Filesize

    2.1MB

  • memory/4544-12-0x0000000000400000-0x0000000000620000-memory.dmp

    Filesize

    2.1MB

  • memory/4544-19-0x0000000002570000-0x00000000026CA000-memory.dmp

    Filesize

    1.4MB

  • memory/4544-21-0x0000000000400000-0x0000000000620000-memory.dmp

    Filesize

    2.1MB

  • memory/4544-23-0x0000000002570000-0x00000000026CA000-memory.dmp

    Filesize

    1.4MB