Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    96s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/06/2024, 06:01 UTC

General

  • Target

    a41a425b9aa3dcb50ea244ff90cef59d_JaffaCakes118.exe

  • Size

    331KB

  • MD5

    a41a425b9aa3dcb50ea244ff90cef59d

  • SHA1

    2d1c8cfba8e5ef11a2a5144346f8102c3c9db805

  • SHA256

    928d06ae692be5a216946aa53308e34b920cdd65eb1eb1f7aad9d4edf779c8b6

  • SHA512

    6b82375eb4645cc8e615c4699fb4eeada8b4a0f50b89bd512810c9c1d643977ae1e5472ee2ea2d8cfb69133381120267db5cd863a10746843bed79e0d5a88334

  • SSDEEP

    6144:R6tnHIghzbAam9iliAotWWfUwwQWzyq2L9OATfzSskQBi:+HrhzW3Jq49zfGQBi

Malware Config

Signatures

  • BetaBot

    Beta Bot is a Trojan that infects computers and disables Antivirus.

  • Modifies firewall policy service 2 TTPs 4 IoCs
  • Sets file execution options in registry 2 TTPs 4 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer Protected Mode 1 TTPs 4 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 29 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a41a425b9aa3dcb50ea244ff90cef59d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a41a425b9aa3dcb50ea244ff90cef59d_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3240
    • C:\Users\Admin\AppData\Local\Temp\a41a425b9aa3dcb50ea244ff90cef59d_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\a41a425b9aa3dcb50ea244ff90cef59d_JaffaCakes118.exe"
      2⤵
      • Sets file execution options in registry
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Suspicious behavior: MapViewOfSection
      • Suspicious behavior: RenamesItself
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5064
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        3⤵
        • Modifies firewall policy service
        • Sets file execution options in registry
        • Checks BIOS information in registry
        • Adds Run key to start application
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Checks processor information in registry
        • Enumerates system info in registry
        • Modifies Internet Explorer Protected Mode
        • Modifies Internet Explorer Protected Mode Banner
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3688
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3688 -s 1152
          4⤵
          • Program crash
          PID:2808
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 3688 -ip 3688
    1⤵
      PID:4376

    Network

    • flag-us
      DNS
      8.8.8.8.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      8.8.8.8.in-addr.arpa
      IN PTR
    • flag-us
      DNS
      8.8.8.8.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      8.8.8.8.in-addr.arpa
      IN PTR
    • flag-us
      DNS
      8.8.8.8.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      8.8.8.8.in-addr.arpa
      IN PTR
    • flag-us
      DNS
      8.8.8.8.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      8.8.8.8.in-addr.arpa
      IN PTR
    • flag-us
      DNS
      8.8.8.8.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      8.8.8.8.in-addr.arpa
      IN PTR
    No results found
    • 8.8.8.8:53
      8.8.8.8.in-addr.arpa
      dns
      330 B
      5

      DNS Request

      8.8.8.8.in-addr.arpa

      DNS Request

      8.8.8.8.in-addr.arpa

      DNS Request

      8.8.8.8.in-addr.arpa

      DNS Request

      8.8.8.8.in-addr.arpa

      DNS Request

      8.8.8.8.in-addr.arpa

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3240-18-0x0000000074990000-0x0000000074F41000-memory.dmp

      Filesize

      5.7MB

    • memory/3240-1-0x0000000074990000-0x0000000074F41000-memory.dmp

      Filesize

      5.7MB

    • memory/3240-2-0x0000000074990000-0x0000000074F41000-memory.dmp

      Filesize

      5.7MB

    • memory/3240-3-0x0000000074992000-0x0000000074993000-memory.dmp

      Filesize

      4KB

    • memory/3240-0-0x0000000074992000-0x0000000074993000-memory.dmp

      Filesize

      4KB

    • memory/3688-23-0x00000000008D0000-0x000000000098C000-memory.dmp

      Filesize

      752KB

    • memory/3688-22-0x0000000000F30000-0x0000000001363000-memory.dmp

      Filesize

      4.2MB

    • memory/3688-21-0x0000000000F30000-0x0000000001364000-memory.dmp

      Filesize

      4.2MB

    • memory/3688-19-0x0000000000F30000-0x0000000001364000-memory.dmp

      Filesize

      4.2MB

    • memory/5064-6-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/5064-12-0x00000000012D0000-0x0000000001336000-memory.dmp

      Filesize

      408KB

    • memory/5064-16-0x00000000012D0000-0x0000000001336000-memory.dmp

      Filesize

      408KB

    • memory/5064-15-0x00000000030B0000-0x00000000030BC000-memory.dmp

      Filesize

      48KB

    • memory/5064-14-0x0000000003080000-0x0000000003081000-memory.dmp

      Filesize

      4KB

    • memory/5064-11-0x00000000772B4000-0x00000000772B5000-memory.dmp

      Filesize

      4KB

    • memory/5064-10-0x0000000002F00000-0x0000000002F0D000-memory.dmp

      Filesize

      52KB

    • memory/5064-9-0x00000000012D0000-0x0000000001336000-memory.dmp

      Filesize

      408KB

    • memory/5064-7-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/5064-4-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/5064-27-0x00000000012D0000-0x0000000001336000-memory.dmp

      Filesize

      408KB

    • memory/5064-26-0x0000000000400000-0x0000000000435000-memory.dmp

      Filesize

      212KB

    • memory/5064-25-0x00000000030A0000-0x00000000030A1000-memory.dmp

      Filesize

      4KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.