Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    51s
  • max time network
    51s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/06/2024, 11:49 UTC

General

  • Target

    b35a407ddffa60fe714c0696e3023933_JaffaCakes118.exe

  • Size

    574KB

  • MD5

    b35a407ddffa60fe714c0696e3023933

  • SHA1

    39bb4aa11f831044b35f45b3a8b5cb5548d4d23d

  • SHA256

    1684c2d7efc42505f47e901f5293ecf3c181b06bad66760ca8988b7a26af697f

  • SHA512

    36d626270ef1f829d0ab9b399efd884d74b6bd0d817691be1c7f2a7d442a2946d3419a215c22024f95806e0b82ff4b672ba5ce19957e43ffe9b11e37a4d9a779

  • SSDEEP

    12288:lH/w0GViRQcy32a5m9FyA+vqYy0UAZLJYpYz2q+:lfwSQcy3V5m9FytCOZsA4

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b35a407ddffa60fe714c0696e3023933_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b35a407ddffa60fe714c0696e3023933_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Users\Admin\AppData\Local\Temp\bbjcabfedbhd.exe
      C:\Users\Admin\AppData\Local\Temp\bbjcabfedbhd.exe 1-3-4-2-9-8-7-4-4-3-1 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
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2124
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81718538569.txt bios get serialnumber
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4748
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81718538569.txt bios get version
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4348
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81718538569.txt bios get version
        3⤵
          PID:2348
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81718538569.txt bios get version
          3⤵
            PID:4180
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic /output:C:\Users\Admin\AppData\Local\Temp\81718538569.txt bios get version
            3⤵
              PID:516
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 960
              3⤵
              • Program crash
              PID:2844
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2124 -ip 2124
          1⤵
            PID:3036

          Network

          • flag-us
            DNS
            serv.the-app-data.info
            bbjcabfedbhd.exe
            Remote address:
            8.8.8.8:53
            Request
            serv.the-app-data.info
            IN A
          • flag-us
            DNS
            serv.the-app-data.info
            bbjcabfedbhd.exe
            Remote address:
            8.8.8.8:53
            Request
            serv.the-app-data.info
            IN A
          • flag-us
            DNS
            serv.the-app-data.info
            bbjcabfedbhd.exe
            Remote address:
            8.8.8.8:53
            Request
            serv.the-app-data.info
            IN A
          • flag-us
            DNS
            serv.the-app-data.info
            bbjcabfedbhd.exe
            Remote address:
            8.8.8.8:53
            Request
            serv.the-app-data.info
            IN A
          • flag-us
            DNS
            serv.the-app-data.info
            bbjcabfedbhd.exe
            Remote address:
            8.8.8.8:53
            Request
            serv.the-app-data.info
            IN A
          No results found
          • 8.8.8.8:53
            serv.the-app-data.info
            dns
            bbjcabfedbhd.exe
            340 B
            5

            DNS Request

            serv.the-app-data.info

            DNS Request

            serv.the-app-data.info

            DNS Request

            serv.the-app-data.info

            DNS Request

            serv.the-app-data.info

            DNS Request

            serv.the-app-data.info

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\81718538569.txt

            Filesize

            66B

            MD5

            9025468f85256136f923096b01375964

            SHA1

            7fcd174999661594fa5f88890ffb195e9858cc52

            SHA256

            d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

            SHA512

            92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

          • C:\Users\Admin\AppData\Local\Temp\81718538569.txt

            Filesize

            2B

            MD5

            f3b25701fe362ec84616a93a45ce9998

            SHA1

            d62636d8caec13f04e28442a0a6fa1afeb024bbb

            SHA256

            b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

            SHA512

            98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

          • C:\Users\Admin\AppData\Local\Temp\81718538569.txt

            Filesize

            58B

            MD5

            f8e2f71e123c5a848f2a83d2a7aef11e

            SHA1

            5e7a9a2937fa4f06fdf3e33d7def7de431c159b4

            SHA256

            79dae8edfddb5a748fb1ed83c87081b245aeff9178c95dcf5fbaaed6baf82121

            SHA512

            8d34a80d335ee5be5d899b19b385aeaeb6bc5480fd72d3d9e96269da2f544ccc13b30fd23111980de736a612b8beb24ff062f6bed2eb2d252dbe07a2ffeb701e

          • C:\Users\Admin\AppData\Local\Temp\bbjcabfedbhd.exe

            Filesize

            826KB

            MD5

            cb0c60c38ae0020b7468d2265ddd4485

            SHA1

            4ddf8959199eaaa1a74605916cfad59c6d04b34c

            SHA256

            951c8986d5d7544ed0a1b2a5e32b4b1cbe9954c5662a5947dd9f75c6e4a46f15

            SHA512

            fc9781f5378aa5cb5d293c3e5a40617e0c2321e3b8b0a846eac21275ec4a08faf6db96e6b5ea87bb0473d6e8c1d4e55283de7469e69d635f1452c1aae675fb1f

          • C:\Users\Admin\AppData\Local\Temp\nsq49CB.tmp\moo.dll

            Filesize

            108KB

            MD5

            076a3050150c1887d9a5ef76762ff4a4

            SHA1

            225adac93a9de5af6ca5646cdaf66c69c821dee4

            SHA256

            72d94ff0e7b385b21bb5f103f055602b67e3e805408d81859fe5ec93a1dc2c2b

            SHA512

            66be5077dc0380232f5033f101447c08ae0f8c9b5768b2c3a5ecca9b33d4d3932dc4d5fe4167021736884111ef57f1839bd3525ba04968917591f71ee65ac0c8

          • C:\Users\Admin\AppData\Local\Temp\nsq49CB.tmp\nsisunz.dll

            Filesize

            40KB

            MD5

            5f13dbc378792f23e598079fc1e4422b

            SHA1

            5813c05802f15930aa860b8363af2b58426c8adf

            SHA256

            6e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d

            SHA512

            9270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5

          We care about your privacy.

          This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.