Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/07/2024, 07:25

General

  • Target

    40ba02479582b5786b9b9ef9ec046c3d_JaffaCakes118.exe

  • Size

    368KB

  • MD5

    40ba02479582b5786b9b9ef9ec046c3d

  • SHA1

    44f6ad2a100b75a2f973db55c4446f29c180091d

  • SHA256

    c25a625b234374536e091088a8fab298f91c7bfbe81d03f3a75e872fbcb8e2c9

  • SHA512

    09bf8e52b7b7297b3228599ea7a09b13a23e9e2c7a72861ced753ccf6132c36e61c166888c1769ebd08046b741a5a890805f1ee213d20bd11caa710f06dd4a33

  • SSDEEP

    6144:chWA+iAT9ZVDT8LSSjEal+wADzFrsGbChzZIlbpxCvhVnWHza6hgkhGRDEBhYhNo:UWArABHkfQD5wYChtITxCbnWTaQgkMDI

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\40ba02479582b5786b9b9ef9ec046c3d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\40ba02479582b5786b9b9ef9ec046c3d_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    PID:4852
  • C:\Program Files (x86)\Remote\Rileotd.exe
    "C:\Program Files (x86)\Remote\Rileotd.exe"
    1⤵
    • Deletes itself
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:208
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" %1
      2⤵
        PID:2800

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Remote\Rileotd.exe

      Filesize

      368KB

      MD5

      40ba02479582b5786b9b9ef9ec046c3d

      SHA1

      44f6ad2a100b75a2f973db55c4446f29c180091d

      SHA256

      c25a625b234374536e091088a8fab298f91c7bfbe81d03f3a75e872fbcb8e2c9

      SHA512

      09bf8e52b7b7297b3228599ea7a09b13a23e9e2c7a72861ced753ccf6132c36e61c166888c1769ebd08046b741a5a890805f1ee213d20bd11caa710f06dd4a33

    • memory/208-7-0x0000000000CA0000-0x0000000000CA1000-memory.dmp

      Filesize

      4KB

    • memory/208-9-0x0000000000400000-0x00000000004BA000-memory.dmp

      Filesize

      744KB

    • memory/208-11-0x0000000000CA0000-0x0000000000CA1000-memory.dmp

      Filesize

      4KB

    • memory/208-13-0x0000000000400000-0x00000000004BA000-memory.dmp

      Filesize

      744KB

    • memory/208-16-0x0000000000400000-0x00000000004BA000-memory.dmp

      Filesize

      744KB

    • memory/208-17-0x0000000000400000-0x00000000004BA000-memory.dmp

      Filesize

      744KB

    • memory/208-21-0x0000000000400000-0x00000000004BA000-memory.dmp

      Filesize

      744KB

    • memory/4852-0-0x0000000000400000-0x00000000004BA000-memory.dmp

      Filesize

      744KB

    • memory/4852-1-0x0000000000AA0000-0x0000000000AA1000-memory.dmp

      Filesize

      4KB

    • memory/4852-8-0x0000000000400000-0x00000000004BA000-memory.dmp

      Filesize

      744KB