Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/06/2024, 23:58

General

  • Target

    04ccf0e82bcef6ac962066582de10cf8_JaffaCakes118.exe

  • Size

    1.3MB

  • MD5

    04ccf0e82bcef6ac962066582de10cf8

  • SHA1

    ca26d12266bb197e350e6d7b142f85b5c4bb721b

  • SHA256

    92e2fc19cc1cf1cf17e0746ffe625103d1285af13870a0848afd8482ee2f6518

  • SHA512

    e875f9bd2441ac8e117ff44d5610980ed93882c038962784aa13e86b0bb8c9eb56d77143eb278c1b15d22382fa1625c523a80a8974f8240624535893e69b1a9c

  • SSDEEP

    24576:qfTqlXxhVv0SC/4VbALSIv+mbEclKxNvXbzugMquaSmQTYeH1UJK0Sd:qLSJv0SCABA+W+mbdlKXaNLaM5Vc9U

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 25 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 17 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04ccf0e82bcef6ac962066582de10cf8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\04ccf0e82bcef6ac962066582de10cf8_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2360
  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /Automation -Embedding
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2360-0-0x0000000000790000-0x0000000000791000-memory.dmp

    Filesize

    4KB

  • memory/2360-49-0x0000000000790000-0x0000000000791000-memory.dmp

    Filesize

    4KB

  • memory/2360-42-0x0000000000400000-0x00000000005A9000-memory.dmp

    Filesize

    1.7MB

  • memory/3316-26-0x00007FFCB9910000-0x00007FFCB9B05000-memory.dmp

    Filesize

    2.0MB

  • memory/3316-37-0x00007FFC77820000-0x00007FFC77830000-memory.dmp

    Filesize

    64KB

  • memory/3316-24-0x00007FFC79990000-0x00007FFC799A0000-memory.dmp

    Filesize

    64KB

  • memory/3316-25-0x00007FFC79990000-0x00007FFC799A0000-memory.dmp

    Filesize

    64KB

  • memory/3316-21-0x00007FFC79990000-0x00007FFC799A0000-memory.dmp

    Filesize

    64KB

  • memory/3316-27-0x00007FFCB9910000-0x00007FFCB9B05000-memory.dmp

    Filesize

    2.0MB

  • memory/3316-28-0x00007FFCB9910000-0x00007FFCB9B05000-memory.dmp

    Filesize

    2.0MB

  • memory/3316-29-0x00007FFCB9910000-0x00007FFCB9B05000-memory.dmp

    Filesize

    2.0MB

  • memory/3316-30-0x00007FFCB9910000-0x00007FFCB9B05000-memory.dmp

    Filesize

    2.0MB

  • memory/3316-31-0x00007FFCB9910000-0x00007FFCB9B05000-memory.dmp

    Filesize

    2.0MB

  • memory/3316-32-0x00007FFC77820000-0x00007FFC77830000-memory.dmp

    Filesize

    64KB

  • memory/3316-35-0x00007FFCB9910000-0x00007FFCB9B05000-memory.dmp

    Filesize

    2.0MB

  • memory/3316-36-0x00007FFCB9910000-0x00007FFCB9B05000-memory.dmp

    Filesize

    2.0MB

  • memory/3316-23-0x00007FFCB99AD000-0x00007FFCB99AE000-memory.dmp

    Filesize

    4KB

  • memory/3316-34-0x00007FFCB9910000-0x00007FFCB9B05000-memory.dmp

    Filesize

    2.0MB

  • memory/3316-33-0x00007FFCB9910000-0x00007FFCB9B05000-memory.dmp

    Filesize

    2.0MB

  • memory/3316-38-0x00007FFCB9910000-0x00007FFCB9B05000-memory.dmp

    Filesize

    2.0MB

  • memory/3316-39-0x00007FFCB9910000-0x00007FFCB9B05000-memory.dmp

    Filesize

    2.0MB

  • memory/3316-22-0x00007FFC79990000-0x00007FFC799A0000-memory.dmp

    Filesize

    64KB

  • memory/3316-20-0x00007FFC79990000-0x00007FFC799A0000-memory.dmp

    Filesize

    64KB

  • memory/3316-50-0x00007FFCB9910000-0x00007FFCB9B05000-memory.dmp

    Filesize

    2.0MB

  • memory/3316-77-0x00007FFC79990000-0x00007FFC799A0000-memory.dmp

    Filesize

    64KB

  • memory/3316-76-0x00007FFC79990000-0x00007FFC799A0000-memory.dmp

    Filesize

    64KB

  • memory/3316-75-0x00007FFC79990000-0x00007FFC799A0000-memory.dmp

    Filesize

    64KB

  • memory/3316-74-0x00007FFC79990000-0x00007FFC799A0000-memory.dmp

    Filesize

    64KB

  • memory/3316-78-0x00007FFCB9910000-0x00007FFCB9B05000-memory.dmp

    Filesize

    2.0MB