Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/07/2024, 22:32

General

  • Target

    69373e49bc2f9152251f8565537f9d2c_JaffaCakes118.exe

  • Size

    403KB

  • MD5

    69373e49bc2f9152251f8565537f9d2c

  • SHA1

    a815fecdc520f79726f497d02f9f7f8c497fe4cb

  • SHA256

    088971c0e4e8794d4a71107dcf41b6d15f8f3d639bfc56e31f219e0e336e9845

  • SHA512

    374fd7ed20399b7eeccb8b691559dd4badf8a93dc99241f76cbf26dc3d3c6f664dad1dac132c022dbc7ddfbccafb9b843a27d598d215ab2aea0963abfe9cc047

  • SSDEEP

    12288:xVV9bIozGWoE2psDBt9fKst0SVVyIW+4IR:ntYPsn9fK8nyJ+X

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\69373e49bc2f9152251f8565537f9d2c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\69373e49bc2f9152251f8565537f9d2c_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3616
    • C:\Users\Admin\AppData\Local\Temp\GYMGJB.exe
      "C:\Users\Admin\AppData\Local\Temp\GYMGJB.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2416
    • C:\Users\Admin\AppData\Local\Temp\ÂÌÉ«Õ÷;_6.exe
      "C:\Users\Admin\AppData\Local\Temp\ÂÌÉ«Õ÷;_6.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1156
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1156 -s 452
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:4952
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1156 -ip 1156
    1⤵
      PID:1152

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\GYMGJB.exe

      Filesize

      180KB

      MD5

      3130e4ac837108cc538a5af967b76831

      SHA1

      bd36f0a2c9be48968ec309b492396eef95c874f4

      SHA256

      e6fc2933563a7de6a3cda84f765e5262c7a9313b07675f8d0a031bdc5648d0b6

      SHA512

      cd5c23684048c1d1bf2f5e89753d230dd6511a8871e42d5b3eaca6e0b5ad67752e7116a78f58fb019518dd6c5680fab2a17bb2f12580a4531adad78816de4a1a

    • C:\Users\Admin\AppData\Local\Temp\nriAB82.tmp

      Filesize

      172KB

      MD5

      685f1cbd4af30a1d0c25f252d399a666

      SHA1

      6a1b978f5e6150b88c8634146f1406ed97d2f134

      SHA256

      0e478c95a7a07570a69e6061e7c1da9001bccad9cc454f2ed4da58824a13e0f4

      SHA512

      6555ad6b4f4f26105ca8aad64501d74519a3e091f559b4b563d6ffb20a2ddfcde65e4fe94971a9bc65e86db577f2548ca00f9920d341c8ea808b04c0947d61d9

    • C:\Users\Admin\AppData\Local\Temp\ÂÌÉ«Õ÷;_6.exe

      Filesize

      197KB

      MD5

      4fb5439a3978bf91ff777f59396cb38e

      SHA1

      c47fb4a19ebbac58f9bc5ac77d087a94f7d2721e

      SHA256

      cfe87e7fd281691c4eb53532a2cc843fef06e4bc0d1d96559251900c4b864a8a

      SHA512

      f6c16ef96eb3e1a472254cb17c1b3d66391ad11ef7e32632557525b53033028e18252b6269969761d1428d4a4191a5385c901b2463d86510cb7fd41cc994ba96

    • memory/1156-22-0x0000000000400000-0x0000000000413000-memory.dmp

      Filesize

      76KB

    • memory/1156-31-0x0000000000790000-0x0000000000803000-memory.dmp

      Filesize

      460KB

    • memory/1156-37-0x0000000000400000-0x0000000000413000-memory.dmp

      Filesize

      76KB

    • memory/2416-33-0x0000000002430000-0x0000000002431000-memory.dmp

      Filesize

      4KB

    • memory/2416-32-0x0000000002440000-0x00000000024B3000-memory.dmp

      Filesize

      460KB

    • memory/2416-38-0x0000000000400000-0x000000000047A000-memory.dmp

      Filesize

      488KB

    • memory/2416-40-0x0000000002430000-0x0000000002431000-memory.dmp

      Filesize

      4KB

    • memory/3616-0-0x0000000000400000-0x00000000004665C3-memory.dmp

      Filesize

      409KB

    • memory/3616-20-0x0000000000400000-0x00000000004665C3-memory.dmp

      Filesize

      409KB