Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/07/2024, 19:28

General

  • Target

    2d8d1633510a9eb0b8495953e2697461_JaffaCakes118.exe

  • Size

    175KB

  • MD5

    2d8d1633510a9eb0b8495953e2697461

  • SHA1

    cb6f307755eb5130b7b4e092057ea7a0d934726f

  • SHA256

    7fa993c16abce154e66fedcc34a1cc425bbd6fb415b18ea62a42c816612f25ed

  • SHA512

    da83f74629794e9ff71f7bece9b5b6d00bb0d5467083368af92140fe11225a369a547e8c122aa0fffe896d77db7db8bf6b1ad6f41fb08315103bdc016c07c6cd

  • SSDEEP

    3072:9hr1wTT9cHlar+puWV8KsB7dIjxFlihpL3LPje6Per9qMCD6zJK2Uc1jXsZwe6zp:9hWn9FrRo8KiSjxu1LPjerx9JzVUcheQ

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 27 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d8d1633510a9eb0b8495953e2697461_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2d8d1633510a9eb0b8495953e2697461_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

    Filesize

    527KB

    MD5

    c4742c49f275903e66496e24e18b90da

    SHA1

    2263b113c189c7052a5be6dfc68538f021b2372a

    SHA256

    3137e63d3a85c9f9109043e4b1f5005d508a681bc2526d8d3bdeeb97dc316c4c

    SHA512

    ecca5ccbeeb422de865a1e9ac8e43727d3e12655a01076c5a685010782790a8b143f375ae3ef4d6aadd0849d9f79fd10ab47c8330f69354bd05899986470afb5

  • C:\Windows\SysWOW64\msiexec.vir

    Filesize

    162KB

    MD5

    ec562f4e670b168812d750342624eff9

    SHA1

    85e76aee91870bc473116febf0eb56af3c57d561

    SHA256

    cea239beee5bf2871bcd4ace17e3363c84d3abaa14bda26fdb2744b8dfed58e1

    SHA512

    bf311f051c0adf1565323f7074ea63dd50fbb0d3774047f2f38e425da5e4006198530cf89f2e2ff4633c4ecdeacb38ffc265fe37b6816aab88f6cea62e87353e

  • memory/3036-0-0x0000000000400000-0x000000000046D000-memory.dmp

    Filesize

    436KB

  • memory/3036-1-0x00000000001E0000-0x00000000001E1000-memory.dmp

    Filesize

    4KB

  • memory/3036-19-0x0000000000400000-0x000000000046D000-memory.dmp

    Filesize

    436KB