Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/06/2024, 03:06

General

  • Target

    0c3564dd11e8727a368b0d653654a4b3_JaffaCakes118.exe

  • Size

    118KB

  • MD5

    0c3564dd11e8727a368b0d653654a4b3

  • SHA1

    c2e05fd725e0e1065ffce1d4947414ccb013f06c

  • SHA256

    1ad79c7025a0a4b2fdb6ee1a50e29eb4637e7eeef733562a232a97a853a44c77

  • SHA512

    fb2541565f2735be03e9f016ce9951b2e141d763fedc7ea45d6279363b0cd73ff332ee1067fa1f956ce23cb1e845c77b5db40cf27361ddc960c0a7e98d6153ec

  • SSDEEP

    1536:ZEtB+OyZe0eKfApBLPtFyIWxprOqk44pj3q9w1K1sBNm68emWVo8k1EPX2EShSTr:ZEtB9Se/D5Wxprtcj6im6Dm879X2ExhZ

Score
7/10

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3384
      • C:\Users\Admin\AppData\Local\Temp\0c3564dd11e8727a368b0d653654a4b3_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\0c3564dd11e8727a368b0d653654a4b3_JaffaCakes118.exe"
        2⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4904
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4904 -s 468
          3⤵
          • Program crash
          PID:5048
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 4904 -ip 4904
      1⤵
        PID:1192

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\cvasds0.dll

        Filesize

        97KB

        MD5

        1b4f146ddff09e3a5120e829a409b139

        SHA1

        abe28bfbaa5492b62804cf2664c0aa3cecb658c9

        SHA256

        48699cd35f6397e24404e19d7dd49b45a278c247ec4e34b68b74515b2e3b5f9c

        SHA512

        94b6c5523abc41c7b7958c1a679040e375f37ada04f40dc85fe6f37188a222a4f6d12b59fa2f4bb0d0a05e6c1b6dd6fb79cc9d2670ac74714dcb52203de61100

      • memory/4904-0-0x0000000000400000-0x0000000000475000-memory.dmp

        Filesize

        468KB

      • memory/4904-4-0x0000000000401000-0x0000000000403000-memory.dmp

        Filesize

        8KB

      • memory/4904-9-0x0000000010000000-0x000000001006C000-memory.dmp

        Filesize

        432KB

      • memory/4904-10-0x0000000000400000-0x0000000000475000-memory.dmp

        Filesize

        468KB