Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/07/2024, 04:06

General

  • Target

    76fd7e85d784f634f255644c0665fb03_JaffaCakes118.exe

  • Size

    131KB

  • MD5

    76fd7e85d784f634f255644c0665fb03

  • SHA1

    68256e4d4c38ce278626f45f9ce23efa6d9b5eb5

  • SHA256

    372e07ac0ba85e9efde692b967c7f12d49fb5ea502e93baa29196c35d2e41ea3

  • SHA512

    d1798c0f64b6188476c345ab34c9a4ed1c8bedb4dd78b9d8860e2cfffde434d5ebe2be757143250d0c94ab0a1e35cf420597c62aea90faa0e271edb9c3e6010a

  • SSDEEP

    3072:lvzFyms8JJVb5Ax6oDm2v1RF/9eHiabuOw3sCpJ+:lLuKJYHvvDFECa63se+

Malware Config

Signatures

  • Drops file in Drivers directory 3 IoCs
  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\76fd7e85d784f634f255644c0665fb03_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\76fd7e85d784f634f255644c0665fb03_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Server Software Component: Terminal Services DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:1900
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:4576
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 432
      2⤵
      • Program crash
      PID:4368
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 444
      2⤵
      • Program crash
      PID:1872
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 452
      2⤵
      • Program crash
      PID:872
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4576 -ip 4576
    1⤵
      PID:2648
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4576 -ip 4576
      1⤵
        PID:3548
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4576 -ip 4576
        1⤵
          PID:2996

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \??\c:\windows\system32\drivers\etc\z4ctmmwc.dll

          Filesize

          79KB

          MD5

          7220e4762369a7f1484db84d4b56326e

          SHA1

          1a00f3c3b868a9dfdde8c7b7ffaa0f5923a523ef

          SHA256

          c9b3a3ac546f96bc5127b3d3b6330426313103a66731873a495981f22ecf2c0b

          SHA512

          b3aa96b3e352cf46de2a714471896391b536c2c73201e9b8ef74a619f78222c73bda29a7e57ab7f65a8fb5b3159c37793bd9437e03623444e8dbb4f782266077

        • memory/1900-0-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/1900-13-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/1900-14-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/4576-8-0x0000000001160000-0x00000000011B1000-memory.dmp

          Filesize

          324KB

        • memory/4576-7-0x0000000001160000-0x00000000011B1000-memory.dmp

          Filesize

          324KB