Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    13s
  • max time network
    16s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/07/2024, 17:39

Errors

Reason
Machine shutdown

General

  • Target

    2d3cbf910df43264235e8a4d43bd7557_JaffaCakes118.exe

  • Size

    244KB

  • MD5

    2d3cbf910df43264235e8a4d43bd7557

  • SHA1

    dd4345ab1d5efee41909f9e125b398e041e30264

  • SHA256

    ead0fc1c3c02bdad700377ea7a370168961c0ab8bf3446354f6ddc12935e869b

  • SHA512

    de6a72a32b6be0048ea3f5d3f80432e92083def8bb0a82946f6433dabbcdf024afe2d24f173e672b353713ffab03c0afa932f9153dae0dc5e4450f219af9c5ac

  • SSDEEP

    3072:IwJInJ1CeJ3ixPRUNk9ay+GFuzakZRNmGCKsLo7i8Q:ILnJSxPLtu2kZtCKsLo7i

Malware Config

Signatures

  • Server Software Component: Terminal Services DLL 1 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 5 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d3cbf910df43264235e8a4d43bd7557_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2d3cbf910df43264235e8a4d43bd7557_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2092
    • C:\Users\Admin\AppData\Local\Temp\vcj.exe
      "C:\Users\Admin\AppData\Local\Temp\vcj.exe"
      2⤵
      • Server Software Component: Terminal Services DLL
      • Executes dropped EXE
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1088
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s Iprip
    1⤵
    • Server Software Component: Terminal Services DLL
    • Impair Defenses: Safe Mode Boot
    • Loads dropped DLL
    • Adds Run key to start application
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:4080
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa39b6055 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:3580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\vcj.exe

    Filesize

    20KB

    MD5

    6c213102c8a7077330bf72e3030c1592

    SHA1

    04ed32f30010cae5c074405621dca033c8940133

    SHA256

    1f558cfa0fc8a53e1df635ddf977aec2c84616cdd267be1e9adf402347ba8b2e

    SHA512

    4a64a1796df186545107b5adf9a92508e2e5a817c31592ffaefe695bcd24e70f9c125859d7f1ada23d9831d5b72c0b9bd749e5e82c4bf94d2b7307311cd2fcd5

  • C:\Windows\SysWOW64\fsutk.dll

    Filesize

    116KB

    MD5

    a97ed0aae01704cf4b94d0f87225d36a

    SHA1

    d32a4f47f220cb0117d8a52d8b4adc51f73fb6d2

    SHA256

    e08c53c88af1d368b8f841d5c5649a9b185fde1498aebdbf942ef729a1799ed6

    SHA512

    b1e2a704c893b2095e96d20bf2e2c650156cb39816ddbf977888298aedb8a75998ce4ff9d094e83fb53542aaedfbad4e6d44ae9d80acfb1712b2015f4c75991b

  • \??\c:\$Recycle.bin\int.dat

    Filesize

    220KB

    MD5

    6ee0d65d54a3e80541b16e442a87e9f2

    SHA1

    b8ffde1b95125b2f1a185051cf22499683d16b6f

    SHA256

    e11ee5583fa78fa73f0119dc3896d889087669b61d8e3121df68fdb451b09fb8

    SHA512

    e61aaa9f332fb06e90d95c6f4f3011d2ae9e60fb66ed3080ab29ddb417a9315c7768b544e1a8cb212408563d37d98b5ab530153e9c27cd65dd8b7ac33f978d0a

  • \??\c:\windows\SysWOW64\liprip.dll

    Filesize

    84KB

    MD5

    a991a222878d998a8093851a804a5384

    SHA1

    49b407c9254daa433b2d5c2d919667a18bfb22f5

    SHA256

    0825cdd78ab935be92b1a1133447f6d75a0cf0d8315d8abf99541a8158dd170d

    SHA512

    52e35242df28fd10ae2f69b0782e9a9dcc0600f6510ddaf464fcad529a3e42d0b29c0cbe9244a5d04390be8c23c378fdb509623639ff93c2b85dfb94a2bc671f

  • memory/4080-17-0x0000000001980000-0x00000000019A0000-memory.dmp

    Filesize

    128KB