Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    132s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/07/2024, 13:31

General

  • Target

    6fc6ae36d4b8f5994d4cd9cd26de9728_JaffaCakes118.exe

  • Size

    233KB

  • MD5

    6fc6ae36d4b8f5994d4cd9cd26de9728

  • SHA1

    58116a7f38dab1d2fb752afa598802676ba0897e

  • SHA256

    2f8136071dccbbe3188bf50419491aa08816ff2b7662bbbd5c07c325f633fa48

  • SHA512

    ce294fe3406865c627071c19b03aab7968027efe276762dfc6f917b35c49c63850ebdd4e7d78f2e5321c759711e42011b2a780d787db151856d8de4d01c9b71a

  • SSDEEP

    6144:S183YxSfwjBaU+8cNiC/8KzkjHPTDX+kp:VIYfwAU09vzk3

Malware Config

Signatures

  • Loads dropped DLL 12 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6fc6ae36d4b8f5994d4cd9cd26de9728_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6fc6ae36d4b8f5994d4cd9cd26de9728_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4796
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c move /Y "C:\Users\Admin\AppData\Local\Temp\Drivers\*.*" "C:\Users\Admin\AppData\Local\Temp\Drivers\Legacy"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2896
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del /Q "C:\Users\Admin\AppData\Local\Temp\Drivers\Legacy\ds2490winusb_*.*"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:424
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del /Q "C:\Users\Admin\AppData\Local\Temp\Drivers\Legacy\WdfCoInstaller01005.dll"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1832
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del /Q "C:\Users\Admin\AppData\Local\Temp\Drivers\Legacy\WinUSBCoInstaller.dll"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2520

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsl7B3C.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    0dc0cc7a6d9db685bf05a7e5f3ea4781

    SHA1

    5d8b6268eeec9d8d904bc9d988a4b588b392213f

    SHA256

    8e287326f1cdd5ef2dcd7a72537c68cbe4299ceb1f820707c5820f3aa6d8206c

    SHA512

    814dd17ebb434f4a3356f716c783ab7f569f9ee34ce5274fa50392526925f044798f8006198ac7afe3d1c2ca83a2ca8c472ca53fec5f12bbfbbe0707abacd6b0

  • C:\Users\Admin\AppData\Local\Temp\nsl7B3C.tmp\NSISdl.dll

    Filesize

    17KB

    MD5

    9194668e4763bb5f0573d020a1e29d54

    SHA1

    d7cd6aaba3728e40f128fa97d2c57b60d82868ca

    SHA256

    f73984bd94184b0cc9ae5023b90ef81a7f3f06480f66cbb2a015d7f115e2923b

    SHA512

    2d32747b00e231ee2df67d0e71428f0e3b4e3f265bcbed11cfbe2a88ea5ad7cac6d321ae0ab1daab13cfe25ce8d76338c16195b01ac2ab84479c20cfe8ee6d54

  • C:\Users\Admin\AppData\Local\Temp\nsl7B3C.tmp\System.dll

    Filesize

    11KB

    MD5

    00a0194c20ee912257df53bfe258ee4a

    SHA1

    d7b4e319bc5119024690dc8230b9cc919b1b86b2

    SHA256

    dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

    SHA512

    3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

  • C:\Users\Admin\AppData\Local\Temp\nsl7B3C.tmp\ioSpecial.ini

    Filesize

    513B

    MD5

    755a4720fa50e6ce95f73bca225cf490

    SHA1

    6b5dd88cca1248f7d9846447b3f432585e60e3ec

    SHA256

    728f9087543efefe25ddf61416b21e9465880f4b562628ce30b80aec99689333

    SHA512

    28c79e3bd3a7af8b34e6d770cc5cc8575ef9b48727d50ab9d5032c496ec3e1d4aef6033ba5fa5b9ec20fc22e89986da1de2627185d3ca8f54168b5757a1741fc