Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/07/2024, 01:34

General

  • Target

    2e8c01b600871b96dc93153c151535aa_JaffaCakes118.exe

  • Size

    32KB

  • MD5

    2e8c01b600871b96dc93153c151535aa

  • SHA1

    1fda4fc1f7d3ba727b9aec648a793b0784fa373e

  • SHA256

    cfcc10ca56c34c60869898fc8b4bbc204eead0b32836333a4e860720cbd5b62d

  • SHA512

    ac1ac063bbc39a26b361b19a202973df4c66ad39d26d855ab8bc21a8e0e6403f8c3625ad538a88b3d1a95f4b79386a332bffebaaeef19c045c3ecf8adad4bf58

  • SSDEEP

    384:UfnOG4WkYbPyrwMX8YhP6UYDTfjlZpuYra6/5:4OjlwMX8YhiUw/L955

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e8c01b600871b96dc93153c151535aa_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2e8c01b600871b96dc93153c151535aa_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Suspicious use of WriteProcessMemory
    PID:712
    • C:\Users\Admin\AppData\Local\Temp\2e8c01b600871b96dc93153c151535aa_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\2e8c01b600871b96dc93153c151535aa_JaffaCakes118.exe" s
      2⤵
        PID:1548
      • C:\Users\Admin\AppData\Local\Temp\2e8c01b600871b96dc93153c151535aa_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\2e8c01b600871b96dc93153c151535aa_JaffaCakes118.exe" s
        2⤵
          PID:4264
        • C:\Users\Admin\AppData\Local\Temp\2e8c01b600871b96dc93153c151535aa_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\2e8c01b600871b96dc93153c151535aa_JaffaCakes118.exe" s
          2⤵
            PID:1720
          • C:\Users\Admin\AppData\Local\Temp\2e8c01b600871b96dc93153c151535aa_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\2e8c01b600871b96dc93153c151535aa_JaffaCakes118.exe" s
            2⤵
              PID:812
            • C:\Users\Admin\AppData\Local\Temp\2e8c01b600871b96dc93153c151535aa_JaffaCakes118.exe
              "C:\Users\Admin\AppData\Local\Temp\2e8c01b600871b96dc93153c151535aa_JaffaCakes118.exe" s
              2⤵
                PID:2884

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DUC20.exe

              Filesize

              32KB

              MD5

              2e8c01b600871b96dc93153c151535aa

              SHA1

              1fda4fc1f7d3ba727b9aec648a793b0784fa373e

              SHA256

              cfcc10ca56c34c60869898fc8b4bbc204eead0b32836333a4e860720cbd5b62d

              SHA512

              ac1ac063bbc39a26b361b19a202973df4c66ad39d26d855ab8bc21a8e0e6403f8c3625ad538a88b3d1a95f4b79386a332bffebaaeef19c045c3ecf8adad4bf58

            • memory/712-4-0x0000000000400000-0x0000000000409000-memory.dmp

              Filesize

              36KB

            • memory/812-14-0x0000000000400000-0x0000000000409000-memory.dmp

              Filesize

              36KB

            • memory/1548-3-0x0000000000400000-0x0000000000409000-memory.dmp

              Filesize

              36KB

            • memory/1720-11-0x0000000000400000-0x0000000000409000-memory.dmp

              Filesize

              36KB

            • memory/2884-18-0x0000000000400000-0x0000000000409000-memory.dmp

              Filesize

              36KB

            • memory/4264-7-0x0000000000400000-0x0000000000409000-memory.dmp

              Filesize

              36KB