Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    132s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/07/2024, 17:14

General

  • Target

    687c0c8c5f4a1da320cb904978dc552f_JaffaCakes118.exe

  • Size

    509KB

  • MD5

    687c0c8c5f4a1da320cb904978dc552f

  • SHA1

    aedbeb1d7ac9ea82b8731db5baf008f5f3eaaf9f

  • SHA256

    ae6e3c9cf1c29eaecfeb77812a7f157bc87f709efbef44f21d9ecc01e8e4869e

  • SHA512

    4dfa06de57ccdcbbb8cc65bbeb17e0474a8173bf58197a058795964beeef242584244d81a452a9ed1f2d2e81244d70ddd31162ae3e622095a0746e7d50d281dd

  • SSDEEP

    3072:7+ZvkWp8qX96QfCDpMqrT4GmdVM3bXKCKk3T1a/PTYhA7Jf22QA6Ivv1tH/nSrNF:aZmqt6Qyiy3b6CR10TY8JOArF9S9

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\687c0c8c5f4a1da320cb904978dc552f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\687c0c8c5f4a1da320cb904978dc552f_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4660
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c c:\$$$$$.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\drivers32\Tomb Raider - The Angel of Darkness No-Cd Crack.exe

    Filesize

    509KB

    MD5

    687c0c8c5f4a1da320cb904978dc552f

    SHA1

    aedbeb1d7ac9ea82b8731db5baf008f5f3eaaf9f

    SHA256

    ae6e3c9cf1c29eaecfeb77812a7f157bc87f709efbef44f21d9ecc01e8e4869e

    SHA512

    4dfa06de57ccdcbbb8cc65bbeb17e0474a8173bf58197a058795964beeef242584244d81a452a9ed1f2d2e81244d70ddd31162ae3e622095a0746e7d50d281dd

  • \??\c:\$$$$$.bat

    Filesize

    228B

    MD5

    ace72152dccdb3e4ce7eb47b13530b55

    SHA1

    56df5a5eab7c1ca8803fcb836f0293b709620a6a

    SHA256

    cb8d808cd1ce083a42f1410d5f8dbedd8c31a54af7b3ed2a54815f603aa5ce7f

    SHA512

    5d6f259071865f14e7958ac96549c0c0c70cd665877053970d25b286e2b53bf27e53dd64c1b8ca9ccfc6b3cadda3486379711a8cfb616205e9934afa24901606

  • memory/4660-0-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/4660-701-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/4660-821-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB