Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    134s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/07/2024, 14:03

General

  • Target

    229de532314f23eac3bf6e977ee4f9fe_JaffaCakes118.exe

  • Size

    75KB

  • MD5

    229de532314f23eac3bf6e977ee4f9fe

  • SHA1

    c625beca5a2df7ba9cb62f36ad866b75488de074

  • SHA256

    093bd19789e92ff9270976c39e4585ce0ffdaad33efd80fc17b77f45acc61faf

  • SHA512

    569586d115b56e853612277694ecb0455e98b0a7b599ebaeea6567c595f658bf781a89a21c04e848c5e9c468d2c22c6a65b4b131ec5bd43fd667f8995488d672

  • SSDEEP

    1536:O96bq+91nioxizwg8LAlqVTY3cHIaJQ3sXcEscy1RUGo1NeeY:wx2Ri8gkZwI5JQ3P351RPorY

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\229de532314f23eac3bf6e977ee4f9fe_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\229de532314f23eac3bf6e977ee4f9fe_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4072
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\360RES~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\360RES~1.EXE
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4296
      • C:\Program Files\Internet Explorer\juwnny.exe
        "C:\Program Files\Internet Explorer\juwnny.exe"
        3⤵
        • Executes dropped EXE
        PID:5040
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /C del C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\360RES~1.EXE > nul
        3⤵
          PID:5036
    • C:\Program Files\Internet Explorer\juwnny.exe
      "C:\Program Files\Internet Explorer\juwnny.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3440
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        2⤵
          PID:1760
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3440 -s 604
          2⤵
          • Program crash
          PID:4612
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3440 -ip 3440
        1⤵
          PID:5112

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\Internet Explorer\juwnny.exe

          Filesize

          30.4MB

          MD5

          1c4339cf51e3562ed20923225c0ed81b

          SHA1

          c386425e917c8cb33640b60a0d03814ed0d56b10

          SHA256

          c44d7ed9b300dd1b514e4575322a04a2570aa02c4414a8f9491777973376830b

          SHA512

          4a15638e2103bb937f6ec0b11f1cc063ae93dd3af7737a29e37b5dd2161321fbb5acd231a45263b8d97838ba9a7432d32169b796f91cc7e3cf76f9a6dcb95252

        • C:\Program Files\Internet Explorer\juwnny.exe

          Filesize

          3.7MB

          MD5

          05f157b138f34a69526b5c9bc273969b

          SHA1

          a3df20d02cb5053cd041ac24188b3bfc3005d837

          SHA256

          58ee8cc5ae5849a73f82d5e676acfe456aa1993d225dae997c1101b91de7ba69

          SHA512

          1cb67c6ee3ce283112f877395d670430329d371f3c91915eaf26759eddf650032017c28260da810d1404233e7c578a52130b0475cc0e4ac9af3bde235f4adb28

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\360RES~1.EXE

          Filesize

          72KB

          MD5

          5605b899606ca775dd8a6e94e618dae9

          SHA1

          457107597e33810622fcab56372475aa14e91c90

          SHA256

          2fa34e298812aa994c787e2d33ae1091e99d93e1eed08a11afa538abb3292296

          SHA512

          c126057b1a7161ccef97eef495b237a052af766707abfa96ceb4dee56a3d347fc3867afd90181b8897d2e0d17c9bfb98a1362a06add58fe5138793eb4fca3b40

        • memory/3440-25-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/3440-27-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/4072-0-0x0000000001000000-0x000000000101E000-memory.dmp

          Filesize

          120KB

        • memory/4072-23-0x0000000001000000-0x000000000101E000-memory.dmp

          Filesize

          120KB

        • memory/4296-6-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/4296-21-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/5040-19-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/5040-26-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB