Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/07/2024, 05:49

General

  • Target

    37eeefc678cbdded1c7798d10c286f18_JaffaCakes118.exe

  • Size

    331KB

  • MD5

    37eeefc678cbdded1c7798d10c286f18

  • SHA1

    dd8673023ae6855c7f7f09aef2b131ed1be685af

  • SHA256

    dded610274cae6b30e5978520f8fd2a9a915e347bf7cd7dab37ff077049d2f5f

  • SHA512

    21f6f17b551b1c2df3687e60906aaf75286900748d26bd5966f6d83273837305755cc7049b15d4207423b90bbb0afb892bd071d766261eb3cf77b18d7d837fe0

  • SSDEEP

    6144:i1glyu6VrzBUNCK70gqMk+qJdh4HzyYtsFM24TyQOGoQbwyUx/F8pKMOO9io:i59BUNCK7l5qJIGYtsSvT0SuCtOS

Score
8/10
upx

Malware Config

Signatures

  • Drops file in Drivers directory 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops autorun.inf file 1 TTPs 18 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Drops file in Windows directory 4 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3528
      • C:\Users\Admin\AppData\Local\Temp\37eeefc678cbdded1c7798d10c286f18_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\37eeefc678cbdded1c7798d10c286f18_JaffaCakes118.exe"
        2⤵
        • Drops file in Drivers directory
        • Drops autorun.inf file
        • Drops file in System32 directory
        • Suspicious use of SetThreadContext
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4492
        • C:\Users\Admin\AppData\Local\Temp\37eeefc678cbdded1c7798d10c286f18_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\37eeefc678cbdded1c7798d10c286f18_JaffaCakes118.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2248
          • C:\Users\Admin\AppData\Local\Temp\37eeefc678cbdded1c7798d10c286f18_JaffaCakes118.exe
            "C:\Users\Admin\AppData\Local\Temp\37eeefc678cbdded1c7798d10c286f18_JaffaCakes118.exe"
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4944

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\XsxWrAM.exe

      Filesize

      331KB

      MD5

      37eeefc678cbdded1c7798d10c286f18

      SHA1

      dd8673023ae6855c7f7f09aef2b131ed1be685af

      SHA256

      dded610274cae6b30e5978520f8fd2a9a915e347bf7cd7dab37ff077049d2f5f

      SHA512

      21f6f17b551b1c2df3687e60906aaf75286900748d26bd5966f6d83273837305755cc7049b15d4207423b90bbb0afb892bd071d766261eb3cf77b18d7d837fe0

    • memory/2248-65-0x0000000000400000-0x0000000000472000-memory.dmp

      Filesize

      456KB

    • memory/2248-67-0x0000000000400000-0x0000000000472000-memory.dmp

      Filesize

      456KB

    • memory/2248-66-0x0000000000400000-0x0000000000472000-memory.dmp

      Filesize

      456KB

    • memory/2248-93-0x0000000000400000-0x0000000000472000-memory.dmp

      Filesize

      456KB

    • memory/3528-96-0x000000007FFD0000-0x000000007FFD1000-memory.dmp

      Filesize

      4KB

    • memory/3528-95-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

      Filesize

      28KB

    • memory/4492-8-0x00000000023E0000-0x00000000023E1000-memory.dmp

      Filesize

      4KB

    • memory/4492-4-0x00000000023E0000-0x00000000023E1000-memory.dmp

      Filesize

      4KB

    • memory/4492-37-0x00000000023D0000-0x00000000023D1000-memory.dmp

      Filesize

      4KB

    • memory/4492-36-0x00000000023D0000-0x00000000023D1000-memory.dmp

      Filesize

      4KB

    • memory/4492-35-0x00000000023D0000-0x00000000023D1000-memory.dmp

      Filesize

      4KB

    • memory/4492-34-0x0000000002370000-0x0000000002371000-memory.dmp

      Filesize

      4KB

    • memory/4492-33-0x00000000022A0000-0x00000000022A1000-memory.dmp

      Filesize

      4KB

    • memory/4492-32-0x00000000023D0000-0x00000000023D1000-memory.dmp

      Filesize

      4KB

    • memory/4492-31-0x00000000023D0000-0x00000000023D1000-memory.dmp

      Filesize

      4KB

    • memory/4492-30-0x00000000023D0000-0x00000000023D1000-memory.dmp

      Filesize

      4KB

    • memory/4492-29-0x00000000023D0000-0x00000000023D1000-memory.dmp

      Filesize

      4KB

    • memory/4492-28-0x00000000023D0000-0x00000000023D1000-memory.dmp

      Filesize

      4KB

    • memory/4492-27-0x00000000023D0000-0x00000000023D1000-memory.dmp

      Filesize

      4KB

    • memory/4492-26-0x00000000023D0000-0x00000000023D1000-memory.dmp

      Filesize

      4KB

    • memory/4492-25-0x00000000023D0000-0x00000000023D1000-memory.dmp

      Filesize

      4KB

    • memory/4492-24-0x00000000023D0000-0x00000000023D1000-memory.dmp

      Filesize

      4KB

    • memory/4492-23-0x00000000023D0000-0x00000000023D1000-memory.dmp

      Filesize

      4KB

    • memory/4492-22-0x00000000023D0000-0x00000000023D1000-memory.dmp

      Filesize

      4KB

    • memory/4492-21-0x00000000023D0000-0x00000000023D1000-memory.dmp

      Filesize

      4KB

    • memory/4492-20-0x00000000023D0000-0x00000000023D1000-memory.dmp

      Filesize

      4KB

    • memory/4492-19-0x00000000023D0000-0x00000000023D1000-memory.dmp

      Filesize

      4KB

    • memory/4492-18-0x00000000023D0000-0x00000000023D1000-memory.dmp

      Filesize

      4KB

    • memory/4492-17-0x00000000023D0000-0x00000000023D1000-memory.dmp

      Filesize

      4KB

    • memory/4492-16-0x00000000023E0000-0x00000000023E1000-memory.dmp

      Filesize

      4KB

    • memory/4492-15-0x00000000023E0000-0x00000000023E1000-memory.dmp

      Filesize

      4KB

    • memory/4492-14-0x00000000023E0000-0x00000000023E1000-memory.dmp

      Filesize

      4KB

    • memory/4492-13-0x00000000023E0000-0x00000000023E1000-memory.dmp

      Filesize

      4KB

    • memory/4492-12-0x00000000023E0000-0x00000000023E1000-memory.dmp

      Filesize

      4KB

    • memory/4492-11-0x00000000023E0000-0x00000000023E1000-memory.dmp

      Filesize

      4KB

    • memory/4492-10-0x00000000023E0000-0x00000000023E1000-memory.dmp

      Filesize

      4KB

    • memory/4492-9-0x00000000023E0000-0x00000000023E1000-memory.dmp

      Filesize

      4KB

    • memory/4492-39-0x00000000023D0000-0x00000000023D1000-memory.dmp

      Filesize

      4KB

    • memory/4492-7-0x00000000023E0000-0x00000000023E1000-memory.dmp

      Filesize

      4KB

    • memory/4492-3-0x00000000023D0000-0x00000000023D1000-memory.dmp

      Filesize

      4KB

    • memory/4492-38-0x00000000023D0000-0x00000000023D1000-memory.dmp

      Filesize

      4KB

    • memory/4492-5-0x00000000023E0000-0x00000000023E1000-memory.dmp

      Filesize

      4KB

    • memory/4492-6-0x00000000023E0000-0x00000000023E1000-memory.dmp

      Filesize

      4KB

    • memory/4492-2-0x00000000023D0000-0x00000000023D1000-memory.dmp

      Filesize

      4KB

    • memory/4492-64-0x0000000002E30000-0x0000000002E31000-memory.dmp

      Filesize

      4KB

    • memory/4492-63-0x0000000002E40000-0x0000000002E41000-memory.dmp

      Filesize

      4KB

    • memory/4492-62-0x0000000002E20000-0x0000000002E21000-memory.dmp

      Filesize

      4KB

    • memory/4492-61-0x0000000002E00000-0x0000000002E01000-memory.dmp

      Filesize

      4KB

    • memory/4492-60-0x0000000002E10000-0x0000000002E11000-memory.dmp

      Filesize

      4KB

    • memory/4492-59-0x0000000002DD0000-0x0000000002DD1000-memory.dmp

      Filesize

      4KB

    • memory/4492-58-0x0000000002DF0000-0x0000000002DF1000-memory.dmp

      Filesize

      4KB

    • memory/4492-57-0x0000000002DB0000-0x0000000002DB1000-memory.dmp

      Filesize

      4KB

    • memory/4492-56-0x0000000002DC0000-0x0000000002DC1000-memory.dmp

      Filesize

      4KB

    • memory/4492-55-0x0000000002D90000-0x0000000002D91000-memory.dmp

      Filesize

      4KB

    • memory/4492-54-0x0000000002DA0000-0x0000000002DA1000-memory.dmp

      Filesize

      4KB

    • memory/4492-53-0x0000000002C60000-0x0000000002C61000-memory.dmp

      Filesize

      4KB

    • memory/4492-52-0x0000000002C70000-0x0000000002C71000-memory.dmp

      Filesize

      4KB

    • memory/4492-51-0x0000000002C40000-0x0000000002C41000-memory.dmp

      Filesize

      4KB

    • memory/4492-50-0x0000000002C50000-0x0000000002C51000-memory.dmp

      Filesize

      4KB

    • memory/4492-49-0x00000000023D0000-0x00000000023D1000-memory.dmp

      Filesize

      4KB

    • memory/4492-48-0x00000000023E0000-0x00000000023E1000-memory.dmp

      Filesize

      4KB

    • memory/4492-47-0x0000000002300000-0x0000000002301000-memory.dmp

      Filesize

      4KB

    • memory/4492-46-0x0000000002310000-0x0000000002311000-memory.dmp

      Filesize

      4KB

    • memory/4492-45-0x00000000023A0000-0x00000000023A1000-memory.dmp

      Filesize

      4KB

    • memory/4492-44-0x00000000007F0000-0x00000000007F1000-memory.dmp

      Filesize

      4KB

    • memory/4492-43-0x00000000007E0000-0x00000000007E1000-memory.dmp

      Filesize

      4KB

    • memory/4492-42-0x0000000002390000-0x0000000002391000-memory.dmp

      Filesize

      4KB

    • memory/4492-89-0x0000000000400000-0x0000000000513000-memory.dmp

      Filesize

      1.1MB

    • memory/4492-0-0x0000000000400000-0x0000000000513000-memory.dmp

      Filesize

      1.1MB

    • memory/4492-1-0x0000000002380000-0x0000000002383000-memory.dmp

      Filesize

      12KB

    • memory/4944-91-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/4944-90-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/4944-92-0x0000000000400000-0x0000000000408960-memory.dmp

      Filesize

      34KB

    • memory/4944-99-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/4944-100-0x0000000000400000-0x0000000000408960-memory.dmp

      Filesize

      34KB