Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/07/2024, 22:15

General

  • Target

    322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe

  • Size

    747KB

  • MD5

    322fb9825ef9cb13d6486654fe2b846f

  • SHA1

    6b35c9af64204cd71f123d1efb38e4039d6dfe26

  • SHA256

    12dae350239569e85555f1fdd052d263526e8e5c67b12a1b6a65ee3c4d9af3d2

  • SHA512

    cc781799aff15986d0208d2a109615269b8dd1f051f3483179d9f97603b652642e1cc1329d168f9ddf4514271195f44850bb6545b484afe43e09c404cae81f4c

  • SSDEEP

    12288:U8F2GlKL2ioCvszUyYoCt3DIi0S80hrRZaqWR40rHeluaL0dUiuRm2Bao5:U8EGALzohzUy2NJvhjyR4kKJRi0+4

Score
7/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 3 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\322fb9825ef9cb13d6486654fe2b846f_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Windows\SysWOW64\PrstService.exe
      C:\Windows\system32\PrstService.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1608
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:512
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:512 CREDAT:17410 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:3216
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\delus.bat
      2⤵
        PID:2664

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\WZ04RUV6\suggestions[1].en-US

      Filesize

      17KB

      MD5

      5a34cb996293fde2cb7a4ac89587393a

      SHA1

      3c96c993500690d1a77873cd62bc639b3a10653f

      SHA256

      c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

      SHA512

      e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

    • C:\Users\Admin\AppData\Local\Temp\E_4\Exmlrpc.fne

      Filesize

      34KB

      MD5

      387cf1d2f17aff6967f3107773764513

      SHA1

      b971bcd44988bee744f8133acb032e07d9dcd1db

      SHA256

      74c55aaee905be674763d679ca05a6baaf93f456b5d8935d6293e523766968c6

      SHA512

      19a4fb39b2f9863c92d76016290e701fd6bb1aa5d889896666922fd862d5b72b95a97aa27d3d0b3218233ba9dbcb3db147efbf9e61e5be853d4d3672e87bfd5c

    • C:\Users\Admin\AppData\Local\Temp\E_4\dp1.fne

      Filesize

      56KB

      MD5

      6649262561fba5d19f8b99dd251b5d02

      SHA1

      286e2ab6bc2220b3c9a83720c4c612623210e10f

      SHA256

      824afe6bde1c2890077e9a40c4261a77a1d736429709a45d68ed508581e74771

      SHA512

      688bd75b1e9661f425a21577063362e609ce496880a4780012317d56075095e5804fb7b849b32fbbea06fbbff5d47a5534113b6613f1a236b2a76cd043bba7ef

    • C:\Users\Admin\AppData\Local\Temp\E_4\krnln.fnr

      Filesize

      406KB

      MD5

      e79169d47394020f7c893abb840b61bb

      SHA1

      c5b9c2cbef3d5458b52ebb67461e84432673fb1b

      SHA256

      11c25cdeb02ac401d913dc48b935a087e32c2d9b7b7c4a5cfdf36e4947e959dc

      SHA512

      21ca64559082a31e46e28513de762fa2239c521f60b3485bf99926f895f0bf6f63fe2162c3e2eb25705efad22d351e24b8283442f4954ac88bc8c56ef5dc529a

    • C:\Windows\SysWOW64\PrstService.exe

      Filesize

      747KB

      MD5

      322fb9825ef9cb13d6486654fe2b846f

      SHA1

      6b35c9af64204cd71f123d1efb38e4039d6dfe26

      SHA256

      12dae350239569e85555f1fdd052d263526e8e5c67b12a1b6a65ee3c4d9af3d2

      SHA512

      cc781799aff15986d0208d2a109615269b8dd1f051f3483179d9f97603b652642e1cc1329d168f9ddf4514271195f44850bb6545b484afe43e09c404cae81f4c

    • \??\c:\delus.bat

      Filesize

      230B

      MD5

      881079fdf538000b6156d02a83cc2429

      SHA1

      faa14b89ec39c3ee7789bf688481ff0321b024f8

      SHA256

      53eb1fb8a38d3104769c827b2665d723c4450a21e639887170554e28c6e2a501

      SHA512

      d3c7819a7608c997c0eeceb5ab8e32e074ea5ec16578d88966b58a9f6120a5fcbbcb0f2bc1a66dc9cba40e19f8ac66a60056b0813fcc4bc61850efb1d31609d3

    • memory/1608-26-0x0000000000600000-0x0000000000624000-memory.dmp

      Filesize

      144KB

    • memory/1608-47-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/1608-48-0x0000000010000000-0x000000001012A000-memory.dmp

      Filesize

      1.2MB

    • memory/1680-31-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/1680-30-0x0000000010000000-0x000000001012A000-memory.dmp

      Filesize

      1.2MB

    • memory/1680-0-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/1680-5-0x0000000010000000-0x000000001012A000-memory.dmp

      Filesize

      1.2MB