Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    129s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/07/2024, 20:07

General

  • Target

    75876d65612cbdfebccf1065bedf284c_JaffaCakes118.exe

  • Size

    157KB

  • MD5

    75876d65612cbdfebccf1065bedf284c

  • SHA1

    b2b30e2b37cbf69ffc2c93c7a683ec8da63a609d

  • SHA256

    a8966bbc4a771da485bb79fbf7cac162bf6f55ab017a85ca1303d6e656b20b52

  • SHA512

    0c15731a0b8fbbe63926c8dcfc24047fe9cdbe3ec3a093f3ffe90ce29e303e3437a1248f87c1293cc3bd499a504fa689385d427ecfa17b891fcc7efec858e6a3

  • SSDEEP

    3072:g0/AMdBs/q7qxQy/2NZSj/MeZLV3EaPvjfG1k78tGdq4VYl5S:gzMBs/q7qxQy/27a/f5V3R7dH84VYm

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\75876d65612cbdfebccf1065bedf284c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\75876d65612cbdfebccf1065bedf284c_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:3312
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2900
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding B75B1713CD276D5EF9D57EF1FA944EA7 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1496

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C3948BE6E525B8A8CEE9FAC91C9E392_625831257BDAD5EDE9F82A76B457B04B

    Filesize

    5B

    MD5

    5bfa51f3a417b98e7443eca90fc94703

    SHA1

    8c015d80b8a23f780bdd215dc842b0f5551f63bd

    SHA256

    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

    SHA512

    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C3948BE6E525B8A8CEE9FAC91C9E392_625831257BDAD5EDE9F82A76B457B04B

    Filesize

    412B

    MD5

    7672bf07a352bad459e4c2ba731c373c

    SHA1

    229f9a2c77fd4eda78b5d9ba5bf320b4e8ba0da6

    SHA256

    245f4de507ce2dbb24998ef1125145b2665676438a8bb474183d8117e65f4701

    SHA512

    2605440efbf22ca2bb9bb947f9f7fa50f48e1a6ee7724905ad95882a646bfee78d351c66ebad98c7406168887d7292a7054045dc838e82e3f8a024c4ba0d33ef

  • C:\Users\Admin\AppData\Local\Temp\MSIBEBC.tmp

    Filesize

    613KB

    MD5

    8f7b7452c1004b979009e565a317f114

    SHA1

    6e246522028f17c9ec7c338806e5114efe709f93

    SHA256

    fcb7fc90474b07df2994218832ee865f46876c3a069ffde30cb416f0bfbff237

    SHA512

    b6086b2b3f73ed7efc8dbd8d7a354d5aebddf4d5045a4d6b488ba8e60280c4e07a502d1f0012af19cc83e42b37aa6fc2df5c541190e1922bc3d3e7a291628464

  • C:\Users\Admin\AppData\Local\Temp\MSIBF98.tmp

    Filesize

    349KB

    MD5

    b381c2ade79ec791c56bce2150410527

    SHA1

    d71887f86ef53764191f6aa870f6c99a273dcf73

    SHA256

    721ce118704206ce31cba0c0fabbc3a45a8d3f52e4ca430637bd6acce36b795e

    SHA512

    94374147df3c54d98d56f751ed65d75b3d2b01747c693287b5896605b932ae6d5ac280ce67e177d858a59859e5b2fc8760bef30591a3969f77f985c3ce72ec23

  • C:\Users\Admin\AppData\Local\Temp\rap240627890\RapportSetup-Full.msi

    Filesize

    14.1MB

    MD5

    09edf5b1f04d58369cbd80f3c22b72ce

    SHA1

    e6fb66fb45aa0c170719252802ad02a072404dcc

    SHA256

    1c7bd0e864abeb9961a470151cbc0990c77db485044205fb95848d600b9252b3

    SHA512

    8ce364fe681690aaad737b1d98b815f95bb2a60320c30c11a83c50c30bf44d2e4f1bfbc765c85e545ddd6c93749599e29c4756daec131f3b308e940a268ec45b

  • memory/1496-50-0x0000000010000000-0x000000001009D000-memory.dmp

    Filesize

    628KB

  • memory/1496-57-0x0000000002FB0000-0x0000000003007000-memory.dmp

    Filesize

    348KB

  • memory/1496-58-0x0000000002FB0000-0x0000000003007000-memory.dmp

    Filesize

    348KB