Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/07/2024, 08:31

General

  • Target

    3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe

  • Size

    16KB

  • MD5

    3866845a5ec9b47ce2df51025a1bfa0b

  • SHA1

    69cfb0d7f84e81b4fc491808413642beffea350b

  • SHA256

    524b29eb85a279afeca8b7d0d6fd7cdd24d18e7c1a311a95d9b3f8a652cef8ff

  • SHA512

    b17561816f811e41a71592809d13feb86e99a9c5a71199caff1316360244c84866af749535ed3d2f25c9349c6a1d6f36011dad22d0462eacbeb9a3ed40eccc1b

  • SSDEEP

    384:Tz1snRhQX9V+hfSIMJnWOLCM0g1De5073V/u8FXu20nLjJi:F0M9charbGM0g1De5073VG8420nc

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Modifies registry class 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3866845a5ec9b47ce2df51025a1bfa0b_JaffaCakes118.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\F4D.tmp.bat
      2⤵
        PID:4400

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\F4D.tmp.bat

      Filesize

      207B

      MD5

      90c15833d1e13bfe9fabaae00133d15d

      SHA1

      4559d77cf9fa5f9d36a5bad1ce8c51be39a8a55d

      SHA256

      b14d69da28f9395382524d6d585cf61c901f5ecc1ca0c9697ed835530a250015

      SHA512

      a56fb90e77f88793c1415167800b3de0dcd745f625a7686ea03f1a86c04c270f3f7c608eb06274c2959c13b6cae5591051b4ce201393b298b4e5ad448be7dcff

    • C:\Windows\SysWOW64\qrsqxeee.dll

      Filesize

      2.3MB

      MD5

      2f858ff5b919009ddc724e808bc4cd28

      SHA1

      45718eb8c8b00116630bbc087997b161e01be461

      SHA256

      388bb1bb3828a2f5227bb117c91526d0b124bfbb9d9f39af0f983943d81da09c

      SHA512

      76c1b42a9ff56cc7b9326d2bb9068e4126672b1423b0f0d8f62dcb68b6f86134151a82180bbad3e8e9533a4b338381e0a66d1f7828d8d0a835c3c6eba778da53

    • memory/1256-9-0x0000000010000000-0x000000001006C000-memory.dmp

      Filesize

      432KB

    • memory/1256-13-0x0000000010000000-0x000000001006C000-memory.dmp

      Filesize

      432KB