Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/06/2024, 08:54

General

  • Target

    078f6c4adcea80cd47412fc3ed066c0b_JaffaCakes118.exe

  • Size

    989KB

  • MD5

    078f6c4adcea80cd47412fc3ed066c0b

  • SHA1

    d01483c81ca96fc29026d944b19c6e2aa18eb9a4

  • SHA256

    a1e79973551133833f062e6ec2ba8a48b9ebe1fc2383d20e5b3943758169b254

  • SHA512

    a1ed26b83efe81b9b7b47bf545b69213ae4f6fcdd9a0245fc5aabbf15118d69592e4fdea56d72fb0f0d78794624a00998032167b6bf8c564a6a1567c67a322c0

  • SSDEEP

    24576:8JKHP49941fK2hM5ls1iYgBrSGIQm+aOQ+8ampnNZgIe0Gs637TxRtId:8Uw+fKVlDpc

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies registry class 24 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\078f6c4adcea80cd47412fc3ed066c0b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\078f6c4adcea80cd47412fc3ed066c0b_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4040
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 "C:\Program Files\Hotspot Shield\HssIE\HssIE.dll" -s
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:5484
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5484 -s 632
        3⤵
        • Program crash
        PID:4276
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\qpg.bat
      2⤵
        PID:3296
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5484 -ip 5484
      1⤵
        PID:3632

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\Hotspot Shield\HssIE\HssIE.dll

        Filesize

        511KB

        MD5

        17e8f6bd91e2adcd7e8015015fcd54b6

        SHA1

        d1b1bfd4cd9aad0388efbff1aa16cb1111b9b451

        SHA256

        8f98c68c1ffce60d3a5ab1dc50114777df63b455b5dc12b289a4fa1c47400142

        SHA512

        1b1923b0392e307a9884e41b1f1c41362e4ecb33243f3db2929495356c752e8faf7437ada692c23a63465601bfb3882af65dd067b4bce3cfab19d095b3692e21

      • C:\Users\Admin\AppData\Local\Temp\qpg.bat

        Filesize

        212B

        MD5

        60f889ffb438fa9ad4eba1a8862dce56

        SHA1

        8c408132bbeb6fcc8c2f504c1548360ed230d242

        SHA256

        97c7a5f6d6e5ad2dde6fbaf6c47a1f433bb1cc5fb9e25cf712594c7d9f89b917

        SHA512

        228db42a90e1fae0767778b2a7fd9679bf37572665e2f6458dedefb94320c9d8adb6055ef2001f3a03dc1e7cdca0b87a1f27d4bc945d200e5904f6248dd83df3

      • memory/4040-0-0x0000000002250000-0x0000000002251000-memory.dmp

        Filesize

        4KB

      • memory/4040-4-0x0000000000400000-0x00000000004FE000-memory.dmp

        Filesize

        1016KB

      • memory/4040-13-0x0000000000400000-0x00000000004FE000-memory.dmp

        Filesize

        1016KB

      • memory/4040-16-0x0000000000400000-0x00000000004FE000-memory.dmp

        Filesize

        1016KB