Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/07/2024, 08:11

General

  • Target

    66c910db68b98751290cdb4d6835da7f_JaffaCakes118.exe

  • Size

    188KB

  • MD5

    66c910db68b98751290cdb4d6835da7f

  • SHA1

    9a6e817e398795da5fc0de48f30a6f446da5ecc7

  • SHA256

    74a6bf982d64547e7a290503c8bf80708df7f749a35bbb5168b8119b9f950a2e

  • SHA512

    e7ac6f4ca3910ac1538b981f6087bd2507ef7fadbf0db2e86dec557dfb425c60697e780762289b0dd954f7711ec58f3768676a579d99722fc910031b8cdc4cd6

  • SSDEEP

    3072:Z/FDc0Cbdss/q+RxKd9u1Wb/4/8uL6suQ14Zvop4lhdPupdoK0QCcLq2XrDmQt:fc4+RId9ui/4UuOjQuomhupdoK0QCcLX

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Modifies registry class 60 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\66c910db68b98751290cdb4d6835da7f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\66c910db68b98751290cdb4d6835da7f_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4864
    • \??\c:\Program Files1FM7G3.exe
      "c:\Program Files1FM7G3.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3660
      • C:\Program Files\Internet Explorer\IEXPLORE.exe
        "C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/vplay.php
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2208
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:17410 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:3108
    • C:\Windows\SysWOW64\WScript.Exe
      WScript.Exe jies.bak.vbs
      2⤵
      • Deletes itself
      PID:4868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files1FM7G3.exe

    Filesize

    36KB

    MD5

    dc836c8f50af98c6ee14406dbe413dbd

    SHA1

    482cd345eb9a9da3482ccea5d690481847432e6d

    SHA256

    1b866ca32649463789bb7822accd5d5a2f35366c4cce82094766951a847cc760

    SHA512

    30ea534f6e069582c2c04b95551ec35a9bf9858dc5be63f0d9158d2801da422d729a1c31d353395cdff3f008ae2f8fb8dab00e10e13160e051ffbdbc997e49d2

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\09XH2190\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\jies.bak.vbs

    Filesize

    450B

    MD5

    183925c527aefe488a03e1d645ef8a1d

    SHA1

    52d67fe7586c37c3f9c21d140f3b55281675be04

    SHA256

    4474a711e1dcdf6c36ab7c3d02b685a83187b872dcb58eb425750d497a5ddb97

    SHA512

    5a08b94ccb0634a814e2dca6797108d20b2171c4b3eda09a0abee4e9c54f5500309393756aaff5fc18041e791801535d0c8a5bf10b03cc8432eb00fa71bc3121