Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/06/2024, 14:13

General

  • Target

    0e60642f21f5e25d644a032eb085b9f6_JaffaCakes118.exe

  • Size

    1.5MB

  • MD5

    0e60642f21f5e25d644a032eb085b9f6

  • SHA1

    a1e41e9576a20dd5f29f5ad1b6a246b287e9063c

  • SHA256

    ec959d30cbd501b5e81246cc8b3e9ad171e4cf7b629a40fdae8acbd09a292bff

  • SHA512

    d534b6f2bbccfbbfc2640589595afcf27b8f01e87f23edffa6df74f42ae16585e554c8a24e1765d8a4e4f82381738d698f8d2d44badfd330b71096b3f3b91625

  • SSDEEP

    49152:j2XGhfikdOXuiej91aKz0BtFgQn+cM9a3NuZI:jiGNiPuXnzA5ys30Z

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e60642f21f5e25d644a032eb085b9f6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0e60642f21f5e25d644a032eb085b9f6_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1988
    • C:\Users\Admin\AppData\Roaming\Microsoft\setup.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\setup.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:536
      • C:\Users\Admin\AppData\Roaming\chaosupgrade.exe
        "C:\Users\Admin\AppData\Roaming\chaosupgrade.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:4132
      • C:\Users\Admin\AppData\Roaming\ctfmon.exe
        "C:\Users\Admin\AppData\Roaming\ctfmon.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:1400
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c syscheck.bat
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1116
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run /V ctfmon.exe /D "\"C:\Users\Admin\AppData\Roaming\ctfmon.exe \"" /f
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4700
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run /V ctfmon.exe /D "\"C:\Users\Admin\AppData\Roaming\ctfmon.exe \"" /f
            5⤵
            • Adds policy Run key to start application
            • Modifies registry key
            PID:2672
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4124,i,5711962389779687290,1245653010537220991,262144 --variations-seed-version --mojo-platform-channel-handle=4040 /prefetch:8
    1⤵
      PID:2776

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\syscheck.bat

      Filesize

      172B

      MD5

      61d21ff42e2378738c7acb939aecf1fa

      SHA1

      006283f8e5d75f493f3ebc1d3d02eb383cb18b9e

      SHA256

      1ad4c1a258c9415f9bcb623a78e77b5e857d1fc1be33f46db030daeae7e58719

      SHA512

      8179ede61d292461e5002986f1ed06508ce5ca23fbfc19dd363cb56da65306c8c57a45c024c3ea1d0c5a0819223be334a4a3b51c9500f2eb8180201358cf9093

    • C:\Users\Admin\AppData\Roaming\Microsoft\setup.exe

      Filesize

      1.1MB

      MD5

      146d21bc5a15ce02b9b95be81c219431

      SHA1

      15a7d389e56fec684def71fc0915337d368c8cf6

      SHA256

      d375580e1d06bc00ed24f2c765e9fe2e75770657c5c0578b3911d5285d2a1fc4

      SHA512

      902a38371cbd506e5c9c2d79065b143287b200c5ed755ffbea6a528bb87d7574394ca5a3e1141d3b24d2144f0f327f381e568dfb7df0f0d589641329614f285d

    • C:\Users\Admin\AppData\Roaming\chaosupgrade.exe

      Filesize

      120KB

      MD5

      9762cb860159a9838b065a03cb5d60a3

      SHA1

      355639e16156bea80c86f6dd4e9facf2607cce06

      SHA256

      2cd47869927ba0f0c214727bca2ed98814b37959b60b7dc0103c54a7e6e68fad

      SHA512

      f5f17866c6fd5ff476d4e013dfaa762b278838706e218142505e8c671ec1742cc9f67729235d5029ce86f329b54b7caaff0bd0218ff354604908ea9f26c40341

    • C:\Users\Admin\AppData\Roaming\ctfmon.exe

      Filesize

      237KB

      MD5

      f0832f8fa95fbf622e21da79f12a3739

      SHA1

      b4967afbd5e66e3c19c10549f2358d9770a78764

      SHA256

      fa123e6f6e8611e6630afeedcbbafd153326d11cf341044d8c5a81e6f5875305

      SHA512

      cd774e349979b03732ae0e22fc0409099bdad41d79292ae673cf78d7a877d1c40fee7698051180e50163d0c2108b4ccf295fc2ed126ae5f0772d56acf8638b55

    • C:\Users\Admin\AppData\Roaming\ntdata.dll

      Filesize

      285KB

      MD5

      fe2232f82e4beb5ae483da8e699e1a51

      SHA1

      ed2131d0f70e709f8791bfff64d2b8a4cb658ed5

      SHA256

      0cb462094392aeb31dd7588d95de2577efd0987315be0ce84a531c26bee3b49e

      SHA512

      df9ab5afb94cff850dd5c4b4ba0cfcd77d4a5887ac85a60db223eba8c5d1d64467d77c6133b8e1f5ca795deae3623717ff4cc669919d9f96ef6df193187fcc0b

    • C:\Users\Admin\AppData\Roaming\ntldr.dll

      Filesize

      148KB

      MD5

      921f473593f90a40253b31bd5d6c876e

      SHA1

      3ad2fb71ff8ccde1e68e908b55b11227619e3fa5

      SHA256

      223c12f4c8c6c1c7c75b3a542e173aed16bd171c4f98903c584dc93dfd025602

      SHA512

      f7b147c1313a1f6b6108a9feebdb4b32dffadadd3c9a60a22914d437e1378b95f1d7f468b6b3b95d7e95eebd500b8bb6c64a410e4d6d0d8f9e6f761592c29c86

    • memory/536-50-0x0000000003190000-0x00000000031DC000-memory.dmp

      Filesize

      304KB

    • memory/536-11-0x00000000006F0000-0x00000000006F1000-memory.dmp

      Filesize

      4KB

    • memory/536-51-0x0000000000400000-0x0000000000522000-memory.dmp

      Filesize

      1.1MB

    • memory/536-52-0x0000000003190000-0x00000000031DC000-memory.dmp

      Filesize

      304KB

    • memory/1400-69-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/1400-43-0x00000000023D0000-0x00000000023FA000-memory.dmp

      Filesize

      168KB

    • memory/1400-114-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/1400-34-0x00000000008B0000-0x00000000008FC000-memory.dmp

      Filesize

      304KB

    • memory/1400-99-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/1400-84-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/1400-70-0x00000000008B0000-0x00000000008FC000-memory.dmp

      Filesize

      304KB

    • memory/1400-71-0x00000000023D0000-0x00000000023FA000-memory.dmp

      Filesize

      168KB

    • memory/1988-9-0x0000000004000000-0x0000000004188000-memory.dmp

      Filesize

      1.5MB

    • memory/1988-0-0x0000000002060000-0x0000000002061000-memory.dmp

      Filesize

      4KB

    • memory/4132-68-0x0000000003B90000-0x0000000003BBA000-memory.dmp

      Filesize

      168KB

    • memory/4132-67-0x00000000021A0000-0x00000000021EC000-memory.dmp

      Filesize

      304KB

    • memory/4132-55-0x0000000003B90000-0x0000000003BBA000-memory.dmp

      Filesize

      168KB

    • memory/4132-46-0x00000000021A0000-0x00000000021EC000-memory.dmp

      Filesize

      304KB