Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/06/2024, 22:37

General

  • Target

    0b02461f9881ecbda018c5930d5512f2_JaffaCakes118.exe

  • Size

    90KB

  • MD5

    0b02461f9881ecbda018c5930d5512f2

  • SHA1

    c4f4967214c6d1e2aae3bfb88d782c89eaef49b6

  • SHA256

    7ca10c12791a1ae8a62d2cc498f8118c7da8321dcd9a14ea62cdb5eacc72f564

  • SHA512

    5c809bde3288e20ce5f31ddf0aa1e5427b2cf901a488b5d092d2a7880551afc8d43ab3aabb6c02db883473c466e8e24023089000dc92974ccbf9af1159619252

  • SSDEEP

    1536:jelFlxHjq4KoCo4MChztGFS9EeNpR9Lu2Fqt7VsSnjUBXVVIL2l67FI+L:jelFlxHjq4PCorCmFSue3RVbItr+mNF/

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b02461f9881ecbda018c5930d5512f2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0b02461f9881ecbda018c5930d5512f2_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:216
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Qnf..bat" > nul 2> nul
      2⤵
        PID:3296

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Qnf..bat

      Filesize

      238B

      MD5

      a774d10a8827e04dbd37eb1d144f321c

      SHA1

      379a22c505866ee40cb9f909437103739151e1cf

      SHA256

      345e514db3f179a4088e5590ed05996440bdef011262b235f233d849397e0aec

      SHA512

      cc86f9867f9b909015004a74faa42ebc21453e8a8bb60e8f729bb609a6ed067c42475f86385f6051b8549a26d7540f8d7db921f43fce88c091e21931f37b546c

    • memory/216-0-0x0000000000402000-0x0000000000403000-memory.dmp

      Filesize

      4KB

    • memory/216-1-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/216-2-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/216-4-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB