Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/07/2024, 18:14

General

  • Target

    2922f9040088cb86f7d8f13f2ef96bc8_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    2922f9040088cb86f7d8f13f2ef96bc8

  • SHA1

    8403ca7464c6f76a1c61e2b65336baf95e33107b

  • SHA256

    1ba42797d3deb98718cc45e2a49820b09a33a3780064fd016c883fd7a1b04e6f

  • SHA512

    231f138271273d742298594a77b92dcb7f1d26754338d8326485039d66a7e682b30fcc5dc410ffbc2a8c1a8a1a612740ca62222097af95e89fef7e5bf65adb20

  • SSDEEP

    24576:0lKfoV9Ih72HgbL+bBD4yyLWF2+4WzA70fA6IzwJ87g:CvIsOL+bRRfg+qUOM

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies Control Panel 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2922f9040088cb86f7d8f13f2ef96bc8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2922f9040088cb86f7d8f13f2ef96bc8_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1916
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CHEVRO~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CHEVRO~1.EXE
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Suspicious use of SetWindowsHookEx
      PID:4236

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CHEVRO~1.EXE

    Filesize

    1.3MB

    MD5

    9297b95c3ca8cb556ee433faa7eb7e80

    SHA1

    3a9516a30ca01c24cd45b646d9dd821d93096649

    SHA256

    ed3ef489be3ca9b35a92ecdfe8d015fed2e8a732b1eb0ee74c063ab1c6ae565e

    SHA512

    74a952cb087d5379aab8994fd962e4db6049644092dcf83613cd333d56511305fb8b1dc96a2f194d4e00622b99422fa124f3fd221922b34ff57e8ff6865deef0

  • memory/4236-7-0x0000000000400000-0x00000000004D5000-memory.dmp

    Filesize

    852KB

  • memory/4236-11-0x0000000000400000-0x00000000004D5000-memory.dmp

    Filesize

    852KB

  • memory/4236-13-0x0000000000400000-0x00000000004D5000-memory.dmp

    Filesize

    852KB