Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/07/2024, 17:28

General

  • Target

    78f51dc2278cd62782f8e82348090292_JaffaCakes118.exe

  • Size

    8KB

  • MD5

    78f51dc2278cd62782f8e82348090292

  • SHA1

    1daf179c8fb09b832b5109272a61ad44180a9297

  • SHA256

    cf9e817be5e880438d725cf50851ea14dd4b3ef1679599377aecb3ceb8a4acf4

  • SHA512

    055b0e1bc2d6781411004dfcc61bf0a6aab5f3d447d3af26f92664970a8547b585093d3a1067e676f41e76d9e7a17fbe1e8221c3a8688ff707cdff31ff5d9cfe

  • SSDEEP

    192:4LHI9CXU/KBVh/I8N27DCgongxgtotMTy:Tm4KBVhTNwWn9tott

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\78f51dc2278cd62782f8e82348090292_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\78f51dc2278cd62782f8e82348090292_JaffaCakes118.exe"
    1⤵
    • Adds policy Run key to start application
    • System Location Discovery: System Language Discovery
    PID:2648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2648-0-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/2648-3-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2648-2-0x00000000001C0000-0x00000000001C2000-memory.dmp

    Filesize

    8KB

  • memory/2648-1-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2648-4-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2648-6-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB