Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/07/2024, 23:04

General

  • Target

    36c24db1ed442d4b41c2b5e18e9d4639_JaffaCakes118.exe

  • Size

    660KB

  • MD5

    36c24db1ed442d4b41c2b5e18e9d4639

  • SHA1

    5d50d595373988b0344c23aecbf85a8010f3e4d2

  • SHA256

    c8314fe861a9939d09bebaf20f069ba64cd25a8a1809402ca36adf20d241f697

  • SHA512

    884034489e000b37da43bae941774f4902bd619c51a10cebf4bab8e1eeada210afd4d733469f8953491f6a177d0e21ef9a670f5bc1e2285e5eea62740ab28e70

  • SSDEEP

    12288:tn7YS4Qn0ViVi9KHUxzJWuR0zzqhvTfv7Vp1cyeLfJAmjmOvKYTg:tnMRsiQ0T9skr7z1VeLpmktU

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36c24db1ed442d4b41c2b5e18e9d4639_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\36c24db1ed442d4b41c2b5e18e9d4639_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2992
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c \DelUS.bat
      2⤵
        PID:4672

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\DelUS.bat

      Filesize

      228B

      MD5

      189a7361c5bf1ec9dbdfcde604a17068

      SHA1

      85646f4b6231c77bad25b96eb43421129e7cd432

      SHA256

      8e010684892ef7d6c86b06c434fc15895b128603cf81ae1971e519bac5f411c3

      SHA512

      28886cccdb56de8538d33c13ccf54fe63b36c7fc2f846b0ccafbf41e72c27026cc7fd4c2fb4f89e59fcd1441ed98ba17dbbeb085456968e3aa5d7be92df2c573

    • C:\Users\Admin\AppData\Local\Temp\nss99EF.tmp\DLLWeb.dll

      Filesize

      28KB

      MD5

      b382d6c8d5c6a437b2064d79b5dee47b

      SHA1

      f8f4eae50d59b3b94762b10984c1fdcf4c08ff47

      SHA256

      bdb051e1d7fd7b062341b8cb2efce180f2fbb83739fd2143262034be0f2396f3

      SHA512

      e6d604d18b28beb30c09d987472540306abd925048f58a3c99a4013d44b9f29112419ca15c1bb7ee1560300bf179f9e98dd7e6db75e5aeb0e44fba47ac2dcc99

    • C:\Users\Admin\AppData\Local\Temp\nss99EF.tmp\SelfDelete.dll

      Filesize

      24KB

      MD5

      7bf1bd7661385621c7908e36958f582e

      SHA1

      43242d7731c097e95fb96753c8262609ff929410

      SHA256

      c0ad2c13d48c9fe62f898da822a5f08be3bf6c4e2c1c7ffdf7634f2ca4a8859e

      SHA512

      8317af5cc3ac802eb095f3fa8cc71daa1265ca58fead031c07872f3d4bb07663a7002ae734fad392a7617f0923fe0caf1f54ed55afdf8516a6a08e202d86fa7f

    • C:\Users\Admin\AppData\Local\Temp\nss99EF.tmp\processes_second.dll

      Filesize

      140KB

      MD5

      f0a1eae66dd2f54fbe26c26db5493a6f

      SHA1

      46d56b4c6694da1ec4d88b0a5b153dad02b5dca7

      SHA256

      8fe4dad8f894bcdb9a83a9d302907de404695be4b50e619afd88f09d72583e69

      SHA512

      e1b3c946e90fc30b6cdf953c8c7e96121b462bf8529099e0587f7f243b9d73eeba52b510dd2598937f188f7a35bc1e3785b7589ec6c249996a5795c10dafd1e7