Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    52s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/06/2024, 09:24

General

  • Target

    199cb8e6eb2bb90fda99332c069e74c0_JaffaCakes118.exe

  • Size

    65KB

  • MD5

    199cb8e6eb2bb90fda99332c069e74c0

  • SHA1

    41f0fb1a077f13c1b23a507d1017ed852ed26a12

  • SHA256

    c607ef21fc83a313f2700a295e09ec256160671505f91aaaa301a81498428b17

  • SHA512

    58b33dd67f7257fcc04a4966d6546ca12e94bc1c957bc9b81e73b71a6ffefca0482eaa31c25056b6c04becbd12c891a9210bc6fd5af5983050053eb9571c5488

  • SSDEEP

    1536:Qte3KCHs91pmU+q4n++RCMDW4XPxGUl9O:Qt2PMOU+8SXJGUl9O

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:616
    • C:\Users\Admin\AppData\Local\Temp\199cb8e6eb2bb90fda99332c069e74c0_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\199cb8e6eb2bb90fda99332c069e74c0_JaffaCakes118.exe"
      1⤵
      • Modifies WinLogon for persistence
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4564

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/616-35-0x000000003DBF0000-0x000000003DC07000-memory.dmp

      Filesize

      92KB

    • memory/616-25-0x000000003DBB0000-0x000000003DBC7000-memory.dmp

      Filesize

      92KB

    • memory/616-81-0x000000003DD10000-0x000000003DD27000-memory.dmp

      Filesize

      92KB

    • memory/616-75-0x000000003DCF0000-0x000000003DD07000-memory.dmp

      Filesize

      92KB

    • memory/616-73-0x000000003DCD0000-0x000000003DCE7000-memory.dmp

      Filesize

      92KB

    • memory/616-10-0x0000000000400000-0x0000000000417000-memory.dmp

      Filesize

      92KB

    • memory/616-15-0x000000003DB70000-0x000000003DB87000-memory.dmp

      Filesize

      92KB

    • memory/616-41-0x000000003DC10000-0x000000003DC27000-memory.dmp

      Filesize

      92KB

    • memory/616-42-0x000000003DC10000-0x000000003DC27000-memory.dmp

      Filesize

      92KB

    • memory/616-32-0x000000003DBD0000-0x000000003DBE7000-memory.dmp

      Filesize

      92KB

    • memory/616-65-0x000000003DCB0000-0x000000003DCC7000-memory.dmp

      Filesize

      92KB

    • memory/616-60-0x000000003DC90000-0x000000003DCA7000-memory.dmp

      Filesize

      92KB

    • memory/616-22-0x000000003DB90000-0x000000003DBA7000-memory.dmp

      Filesize

      92KB

    • memory/616-46-0x000000003DC30000-0x000000003DC47000-memory.dmp

      Filesize

      92KB

    • memory/616-51-0x000000003DC50000-0x000000003DC67000-memory.dmp

      Filesize

      92KB

    • memory/616-55-0x000000003DC70000-0x000000003DC87000-memory.dmp

      Filesize

      92KB

    • memory/4564-0-0x0000000000400000-0x000000000044B000-memory.dmp

      Filesize

      300KB

    • memory/4564-1-0x000000007FE40000-0x000000007FE41000-memory.dmp

      Filesize

      4KB

    • memory/4564-4-0x0000000000400000-0x000000000044B000-memory.dmp

      Filesize

      300KB

    • memory/4564-5-0x0000000000400000-0x000000000044B000-memory.dmp

      Filesize

      300KB

    • memory/4564-2-0x0000000000400000-0x0000000000417000-memory.dmp

      Filesize

      92KB

    • memory/4564-3762-0x0000000000400000-0x000000000044B000-memory.dmp

      Filesize

      300KB

    • memory/4564-3763-0x0000000000400000-0x000000000044B000-memory.dmp

      Filesize

      300KB