Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/07/2024, 07:21

General

  • Target

    27b564b7c8a50ea2975d2cff34da831f_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    27b564b7c8a50ea2975d2cff34da831f

  • SHA1

    f8ce8fad3125b1b9367a8b6ed5d57617dd14e3ac

  • SHA256

    49a6c4d6c69d05d64d386ec8ea58af560188d658a79e3c66d5530e3962947ca3

  • SHA512

    bcae6fa0c828d6d12f8b3a40e34f9a26167035c040c5ee8606a3bf7874ec775ba113584e279aabd5a8608bd87d219608ebfaeb6e2d4c492bd6acdc8951889a08

  • SSDEEP

    24576:r7dbpEjLSm2V2W9MMlAB5ccBK3I6jn0FZGG:r7hGi5vABqlI6T0F

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\27b564b7c8a50ea2975d2cff34da831f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\27b564b7c8a50ea2975d2cff34da831f_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2576-0-0x00000000022D0000-0x00000000022D1000-memory.dmp

    Filesize

    4KB

  • memory/2576-8-0x0000000002C90000-0x0000000002C91000-memory.dmp

    Filesize

    4KB

  • memory/2576-10-0x0000000000400000-0x000000000051B000-memory.dmp

    Filesize

    1.1MB

  • memory/2576-11-0x0000000000400000-0x000000000051B000-memory.dmp

    Filesize

    1.1MB

  • memory/2576-12-0x00000000022D0000-0x00000000022D1000-memory.dmp

    Filesize

    4KB

  • memory/2576-13-0x0000000002C90000-0x0000000002C91000-memory.dmp

    Filesize

    4KB

  • memory/2576-14-0x0000000000400000-0x000000000051B000-memory.dmp

    Filesize

    1.1MB

  • memory/2576-15-0x0000000000400000-0x000000000051B000-memory.dmp

    Filesize

    1.1MB

  • memory/2576-16-0x0000000000400000-0x000000000051B000-memory.dmp

    Filesize

    1.1MB

  • memory/2576-17-0x0000000000400000-0x000000000051B000-memory.dmp

    Filesize

    1.1MB

  • memory/2576-18-0x0000000000400000-0x000000000051B000-memory.dmp

    Filesize

    1.1MB

  • memory/2576-19-0x0000000000400000-0x000000000051B000-memory.dmp

    Filesize

    1.1MB

  • memory/2576-20-0x0000000000400000-0x000000000051B000-memory.dmp

    Filesize

    1.1MB

  • memory/2576-21-0x0000000000400000-0x000000000051B000-memory.dmp

    Filesize

    1.1MB

  • memory/2576-22-0x0000000000400000-0x000000000051B000-memory.dmp

    Filesize

    1.1MB

  • memory/2576-23-0x0000000000400000-0x000000000051B000-memory.dmp

    Filesize

    1.1MB

  • memory/2576-24-0x0000000000400000-0x000000000051B000-memory.dmp

    Filesize

    1.1MB

  • memory/2576-25-0x0000000000400000-0x000000000051B000-memory.dmp

    Filesize

    1.1MB