Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    95s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240730-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/08/2024, 21:11

General

  • Target

    81c5844d084530bc41aac73b0c65b89f_JaffaCakes118.exe

  • Size

    159KB

  • MD5

    81c5844d084530bc41aac73b0c65b89f

  • SHA1

    62e02641aac12077ddc90795df04f260fe9f082c

  • SHA256

    0c4a85431263ae8c6e92df33ad45505af6201ee32a23d71b331b72701ff15144

  • SHA512

    c7e830f2a18fc64172e15f361077e29ac59fa380c3c3690593e3ea9d3cee8e4d4dbb75b67d80acf3e31ce49d1e7d8d2b4f96d7189e928486204d36027b96f599

  • SSDEEP

    3072:zNyah0mJdiUJmMPPSsE51eKFWBnj7aboWB4QuJNIssdMg:zwlQmMPW8Bj7abVB49PIPGg

Malware Config

Signatures

  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 40 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\81c5844d084530bc41aac73b0c65b89f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\81c5844d084530bc41aac73b0c65b89f_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4196
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\system32\rjstrfczcw.dll" EntryPoint
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:392
  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3052
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4496
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4496 CREDAT:17410 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1084

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\ver56A.tmp

    Filesize

    15KB

    MD5

    1a545d0052b581fbb2ab4c52133846bc

    SHA1

    62f3266a9b9925cd6d98658b92adec673cbe3dd3

    SHA256

    557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

    SHA512

    bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\LP42WWJI\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\nsz84A3.tmp\NSISdl.dll

    Filesize

    14KB

    MD5

    2a2af69379ed269c61893e8146e18f52

    SHA1

    03264b45960d3f1fde4b031db47ab7a3f863713d

    SHA256

    e323b74c36dc52c2a3fbda49d998744cf64cab102f0d72796472ab55d2c784d4

    SHA512

    49388047397e33f1ed502bd0c5e61b98b33881f794fb52ca229db5b589af9ecb370e9043e2143dcb62cd9d00df6cacc89589734c83f9fda0ceb3f216c0bedeab

  • C:\Users\Admin\AppData\Local\Temp\nsz84A3.tmp\System.dll

    Filesize

    10KB

    MD5

    82f7926fd7d12e3eb8ed7b5232bcf956

    SHA1

    6065fc921b742cc86c77ce2533fc1d17359eb45e

    SHA256

    604b5e75f43ffae8f172018cdd8f136392d9c52ae0c100d27ef537bb2dfb3984

    SHA512

    b31a63ebbda8f147c32d8336c5ecde8c5261ad5526b01926d7cd74b7a9a1348da56e180e53d20e1e300daca76f9511f24d6e695550b705b7650c239e5b6e76c7

  • C:\Windows\SysWOW64\rjstrfczcw.dll

    Filesize

    164KB

    MD5

    22c0ab59ddae9b1bb9a905ecf5f16021

    SHA1

    3e976a5abccb34372633b8d6427dd45a09395718

    SHA256

    15d4993534c019859c56589d11d3328ef731d94e566798d98322ddd5538115d9

    SHA512

    c4d075a748bda7e5f7b20c7a28db040f3400f5bbd4073102ad879f36c9cd9d11ffe05ee3fb11171e6a556b1a9e9d8a1621ad23804c8508dde54ff8bf5131cb0e