Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    139s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/07/2024, 08:22

General

  • Target

    5b273c748c7a6da56add5f1b76f95e04_JaffaCakes118.exe

  • Size

    632KB

  • MD5

    5b273c748c7a6da56add5f1b76f95e04

  • SHA1

    f25bf78fd9403bf6fd16e46fe84338c5e12dea24

  • SHA256

    d5efe0fe632eabf451257128d1f762b6e1859b7cf24f19d4334f189365ca9c3b

  • SHA512

    b88582758c2672e7afbccfe0817292521e54a8693187ef006b1a587da4b9771819b6531f9b8317d8ec76b8b94acfaf7843a751f79cad92b93c8153ae01dce6b1

  • SSDEEP

    12288:htOAoMlw3L2KE2HuO6mF3Z4mxxGDqVTVOCepC:WLswVOxmQmXlVTzek

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b273c748c7a6da56add5f1b76f95e04_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5b273c748c7a6da56add5f1b76f95e04_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4456
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\uninstal.bat
      2⤵
        PID:1036
    • C:\Windows\SysWOW64\rdrgdse.exe
      C:\Windows\SysWOW64\rdrgdse.exe
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      PID:4800

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\rdrgdse.exe

      Filesize

      632KB

      MD5

      5b273c748c7a6da56add5f1b76f95e04

      SHA1

      f25bf78fd9403bf6fd16e46fe84338c5e12dea24

      SHA256

      d5efe0fe632eabf451257128d1f762b6e1859b7cf24f19d4334f189365ca9c3b

      SHA512

      b88582758c2672e7afbccfe0817292521e54a8693187ef006b1a587da4b9771819b6531f9b8317d8ec76b8b94acfaf7843a751f79cad92b93c8153ae01dce6b1

    • C:\Windows\uninstal.bat

      Filesize

      218B

      MD5

      c8637a57170d9d8e16b3fbe5b03e98cc

      SHA1

      c682ef9a26a21d2397cf9d36a1fe89d7df785a68

      SHA256

      1294599256ef5178e7d8c5b737dc2b85cea663ecb7700d6b18aff6ff7e76382d

      SHA512

      6795d5811c2ccccf080d81c734cd2c804574055eaa5b48991f504c667d04e8c87fdbdd7518d3e9e9d8c223f8bd4a3972ad2f1eb1d5720d75beca031c4e9ba9a0

    • memory/4456-18-0x00000000034E0000-0x00000000034E1000-memory.dmp

      Filesize

      4KB

    • memory/4456-4-0x0000000002550000-0x0000000002551000-memory.dmp

      Filesize

      4KB

    • memory/4456-13-0x00000000035C0000-0x00000000035C1000-memory.dmp

      Filesize

      4KB

    • memory/4456-12-0x00000000034C0000-0x00000000034C3000-memory.dmp

      Filesize

      12KB

    • memory/4456-10-0x00000000024F0000-0x00000000024F1000-memory.dmp

      Filesize

      4KB

    • memory/4456-9-0x0000000002560000-0x0000000002561000-memory.dmp

      Filesize

      4KB

    • memory/4456-8-0x0000000002530000-0x0000000002531000-memory.dmp

      Filesize

      4KB

    • memory/4456-7-0x0000000002540000-0x0000000002541000-memory.dmp

      Filesize

      4KB

    • memory/4456-6-0x00000000024D0000-0x00000000024D1000-memory.dmp

      Filesize

      4KB

    • memory/4456-5-0x00000000024E0000-0x00000000024E1000-memory.dmp

      Filesize

      4KB

    • memory/4456-3-0x0000000002500000-0x0000000002501000-memory.dmp

      Filesize

      4KB

    • memory/4456-17-0x00000000034F0000-0x00000000034F1000-memory.dmp

      Filesize

      4KB

    • memory/4456-11-0x00000000034D0000-0x00000000034D1000-memory.dmp

      Filesize

      4KB

    • memory/4456-0-0x0000000000400000-0x000000000051C000-memory.dmp

      Filesize

      1.1MB

    • memory/4456-2-0x0000000002520000-0x0000000002521000-memory.dmp

      Filesize

      4KB

    • memory/4456-15-0x00000000022A0000-0x00000000022A1000-memory.dmp

      Filesize

      4KB

    • memory/4456-14-0x0000000000C70000-0x0000000000C71000-memory.dmp

      Filesize

      4KB

    • memory/4456-19-0x00000000026E0000-0x00000000026E1000-memory.dmp

      Filesize

      4KB

    • memory/4456-16-0x0000000003500000-0x0000000003501000-memory.dmp

      Filesize

      4KB

    • memory/4456-1-0x0000000002320000-0x0000000002374000-memory.dmp

      Filesize

      336KB

    • memory/4456-32-0x0000000002320000-0x0000000002374000-memory.dmp

      Filesize

      336KB

    • memory/4456-31-0x0000000000400000-0x000000000051C000-memory.dmp

      Filesize

      1.1MB

    • memory/4800-28-0x0000000000DA0000-0x0000000000DF4000-memory.dmp

      Filesize

      336KB

    • memory/4800-27-0x0000000000400000-0x000000000051C000-memory.dmp

      Filesize

      1.1MB

    • memory/4800-24-0x0000000000400000-0x000000000051C000-memory.dmp

      Filesize

      1.1MB

    • memory/4800-25-0x0000000000DA0000-0x0000000000DF4000-memory.dmp

      Filesize

      336KB