Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/07/2024, 13:18

General

  • Target

    34e11c1efa77bd921c49ce029eefe514_JaffaCakes118.exe

  • Size

    189KB

  • MD5

    34e11c1efa77bd921c49ce029eefe514

  • SHA1

    36ce4e2d54727551c7653eeefb08fd8466f16293

  • SHA256

    67e5d5b3aa1118b003dbc0e3ea64095c657745c6b6a1f757312e16f6299d09a0

  • SHA512

    c515eaa5d6471066e0c3cd6ef12dd97dd17e505bea77ed0ca994bf79e4a0f828c1be141f624609133f6bbbd2340b0f308438ea92bf6bc8a9823bff08374ea138

  • SSDEEP

    3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e85:o68i3odBiTl2+TCU/3

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\34e11c1efa77bd921c49ce029eefe514_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\34e11c1efa77bd921c49ce029eefe514_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:212
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\bugMAKER.bat
      2⤵
      • Checks computer location settings
      • Suspicious use of SetWindowsHookEx
      PID:4080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\bugMAKER.bat

    Filesize

    90B

    MD5

    dfa0b7934173bcc9ec499683b5f67168

    SHA1

    1f21d3be96a154e8ffb3947552920cd5f102db4d

    SHA256

    f1a3e96047ebbde4d1c77cc533d29a13cc13a08451b6917ad746d9ea87b80d3c

    SHA512

    30df9eed9f2f4d3ed4a07274357ba01424f5804db86e0c7ae978ecef52ddaeba8d3b65ee78eb9daf7c98b1cd8b568d69ec95f02c27b492f5f1d439c1e9410855

  • memory/212-24-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB