Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/07/2024, 07:18

General

  • Target

    2516267ae2a78d826fbcb2c361c99c09_JaffaCakes118.exe

  • Size

    163KB

  • MD5

    2516267ae2a78d826fbcb2c361c99c09

  • SHA1

    cc7f2e262ad68c9b1c2316b77a67a3e50bd718bf

  • SHA256

    70b427374aef9b5bd59cc771b8abc23fabad2ea6e58a6823f28c739f7a86f675

  • SHA512

    48d2a52efb0fd16a5aaa050283ebc7bb0079737aae065a7eead4ebc7e4f49d43edaa0bd73c733636fee54b279aa69fb9afa4601a9457392fb9e2c64f2990c205

  • SSDEEP

    3072:Ltf18giGtpKIlgTDEfuIEzRdrZ9r8viQ09CmD:tqIlgHEfeZX

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2516267ae2a78d826fbcb2c361c99c09_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2516267ae2a78d826fbcb2c361c99c09_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3224
    • C:\Users\Admin\AppData\Local\C575E8A8-16E2-4C95-AE36-0BA9C90710B0\rundll32.exe
      C:\Users\Admin\AppData\Local\C575E8A8-16E2-4C95-AE36-0BA9C90710B0\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      PID:932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\C575E8A8-16E2-4C95-AE36-0BA9C90710B0\rundll32.exe

    Filesize

    163KB

    MD5

    2516267ae2a78d826fbcb2c361c99c09

    SHA1

    cc7f2e262ad68c9b1c2316b77a67a3e50bd718bf

    SHA256

    70b427374aef9b5bd59cc771b8abc23fabad2ea6e58a6823f28c739f7a86f675

    SHA512

    48d2a52efb0fd16a5aaa050283ebc7bb0079737aae065a7eead4ebc7e4f49d43edaa0bd73c733636fee54b279aa69fb9afa4601a9457392fb9e2c64f2990c205

  • memory/932-10-0x0000000002530000-0x000000000265D000-memory.dmp

    Filesize

    1.2MB

  • memory/932-11-0x0000000000400000-0x000000000052C000-memory.dmp

    Filesize

    1.2MB

  • memory/932-12-0x0000000000400000-0x000000000052C000-memory.dmp

    Filesize

    1.2MB

  • memory/3224-0-0x0000000000400000-0x000000000052C000-memory.dmp

    Filesize

    1.2MB

  • memory/3224-1-0x00000000025A0000-0x00000000026CD000-memory.dmp

    Filesize

    1.2MB

  • memory/3224-2-0x0000000000400000-0x000000000052C000-memory.dmp

    Filesize

    1.2MB

  • memory/3224-9-0x0000000000400000-0x000000000052C000-memory.dmp

    Filesize

    1.2MB