Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/07/2024, 23:12

General

  • Target

    4bd2c52e186724048297272d7136fc61_JaffaCakes118.exe

  • Size

    798KB

  • MD5

    4bd2c52e186724048297272d7136fc61

  • SHA1

    659f0c54a828e323929270316d7d09454f06ffb9

  • SHA256

    50b1460ce4a4ce2ca237c33574e5c0a1c5ea2507126f9609eccf946adb208c63

  • SHA512

    0b47e325eee4a35c977d1c3257adc795b000feb7bab9a0e524ce5fa19f438a58dd9508688dea926df87de041e04495eb3f7f04fa5691741effccbec26b4c5f70

  • SSDEEP

    12288:KbUcFcNsToul44cHeFywvx4SVdbuH8eypCmRq9Cy7ngOBMUcJyR9MqnJ6NDezdYd:KYVxd4jFdd3q9CsMha9MLuYZMRZa1

Score
8/10

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 9 IoCs
  • Program crash 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4bd2c52e186724048297272d7136fc61_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4bd2c52e186724048297272d7136fc61_JaffaCakes118.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Adds Run key to start application
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4524
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe"
      2⤵
        PID:3052
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4524 -s 592
        2⤵
        • Program crash
        PID:556
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4524 -s 584
        2⤵
        • Program crash
        PID:1796
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4524 -ip 4524
      1⤵
        PID:2876
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4524 -ip 4524
        1⤵
          PID:1980

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4524-0-0x0000000000400000-0x00000000005A945D-memory.dmp

          Filesize

          1.7MB

        • memory/4524-1-0x00000000004E2000-0x00000000005AA000-memory.dmp

          Filesize

          800KB

        • memory/4524-2-0x0000000010410000-0x000000001043E000-memory.dmp

          Filesize

          184KB

        • memory/4524-9-0x0000000000700000-0x000000000072E000-memory.dmp

          Filesize

          184KB

        • memory/4524-3-0x0000000010410000-0x000000001043E000-memory.dmp

          Filesize

          184KB

        • memory/4524-10-0x0000000000700000-0x000000000072E000-memory.dmp

          Filesize

          184KB

        • memory/4524-20-0x0000000000700000-0x000000000072E000-memory.dmp

          Filesize

          184KB

        • memory/4524-23-0x0000000000700000-0x000000000072E000-memory.dmp

          Filesize

          184KB

        • memory/4524-25-0x0000000000400000-0x00000000005A945D-memory.dmp

          Filesize

          1.7MB