Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/07/2024, 12:38

General

  • Target

    306760d2c97dabe6bd64a0920cc7bb83_JaffaCakes118.exe

  • Size

    487KB

  • MD5

    306760d2c97dabe6bd64a0920cc7bb83

  • SHA1

    712e1d1bf52c110952a3fbfcb614b0864eae97ab

  • SHA256

    fa5edc960cd8117171cd6e3a16cbbcfa7fb6252bfd2fe498f92ed43f50ab7de8

  • SHA512

    12dd29912021228d2d9fba8b3738f136952f01d0320ecf56528de0e88cacf1d53e631616b58a3c42f78a24d0c77e724e21e4de3ccc7bf52873b116586d57c33f

  • SSDEEP

    12288:OczJJhqrVPa3V4axl9DRLt0pBf1e51O6H5SV9zFhit:OczJqVS3aaxl7Re9+sXhit

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\306760d2c97dabe6bd64a0920cc7bb83_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\306760d2c97dabe6bd64a0920cc7bb83_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3216
    • C:\Users\Admin\AppData\Local\Temp\server_n.exe
      "C:\Users\Admin\AppData\Local\Temp\server_n.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3512
      • C:\Users\Admin\AppData\Roaming\mservice32.exe
        "C:\Users\Admin\AppData\Roaming\mservice32.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        PID:4156
  • C:\Windows\system32\WerFault.exe
    "C:\Windows\system32\WerFault.exe" -k -lc NDIS NDIS-20240709-1405.dmp
    1⤵
      PID:1512

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\server_n.exe

      Filesize

      917KB

      MD5

      5e848b9fb9375bb0aa52b95ae538fa3c

      SHA1

      2e590e81408b7c9af0486e62630eb68464286867

      SHA256

      f75857122e53cded85b5827384a4b769b273c7f2a1c3edd0fcff7ffdb222103b

      SHA512

      2df691e38e450a4251dbe2a6d9d0b8930b0d3ecb163a898f4bcd55f60da019a9a7d7095e6070b9b7206589125a0ac5463a305e427114425be762fe8fa9c39af7

    • memory/3512-9-0x0000000000820000-0x0000000000821000-memory.dmp

      Filesize

      4KB

    • memory/3512-15-0x0000000000400000-0x00000000004F1000-memory.dmp

      Filesize

      964KB

    • memory/4156-16-0x00000000006A0000-0x00000000006A1000-memory.dmp

      Filesize

      4KB

    • memory/4156-17-0x0000000000400000-0x00000000004F1000-memory.dmp

      Filesize

      964KB

    • memory/4156-19-0x00000000006A0000-0x00000000006A1000-memory.dmp

      Filesize

      4KB

    • memory/4156-20-0x0000000000400000-0x00000000004F1000-memory.dmp

      Filesize

      964KB