Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/08/2024, 00:14

General

  • Target

    841cb772ed5e46e1e187fd2e34f95110_JaffaCakes118.exe

  • Size

    326KB

  • MD5

    841cb772ed5e46e1e187fd2e34f95110

  • SHA1

    2c79f894fb1142bb6906c1639b355457e47cd8ba

  • SHA256

    7a993b8cc6a588035b80f56de898fa7a9600a6d30152cd2ca96cd1f9fc612582

  • SHA512

    f83bfca0dbdd979ab382f5b374ada0142c2948b45b264f878830b61045dee24bd8912c281ec612f4b4d0f80456f4cc654da06d86ffb5eb907f7c190ec2922331

  • SSDEEP

    6144:+cM5DWnN6aAW/2kXz20ckY+NIMZKHuW9KQwY:ZM5DSN6aAH0XNed

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 15 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 7 IoCs
  • Modifies registry class 38 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\841cb772ed5e46e1e187fd2e34f95110_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\841cb772ed5e46e1e187fd2e34f95110_JaffaCakes118.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe C:\Users\Admin\AppData\Local\Temp\841cb772ed5e46e1e187fd2e34f95110_JaffaCakes118
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4936
    • C:\WINDOWS\CIDD_P\lsass.exe
      C:\WINDOWS\CIDD_P\lsass.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:4544
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4168
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2736

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\WINDOWS\CIDD_P\lsass.exe

      Filesize

      326KB

      MD5

      841cb772ed5e46e1e187fd2e34f95110

      SHA1

      2c79f894fb1142bb6906c1639b355457e47cd8ba

      SHA256

      7a993b8cc6a588035b80f56de898fa7a9600a6d30152cd2ca96cd1f9fc612582

      SHA512

      f83bfca0dbdd979ab382f5b374ada0142c2948b45b264f878830b61045dee24bd8912c281ec612f4b4d0f80456f4cc654da06d86ffb5eb907f7c190ec2922331

    • memory/1732-7-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/1732-0-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/4544-25-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/4544-23-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/4544-24-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/4544-8-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/4544-26-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/4544-27-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/4544-30-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/4544-31-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/4544-32-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/4544-33-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/4544-34-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB

    • memory/4544-42-0x0000000000400000-0x00000000004A2000-memory.dmp

      Filesize

      648KB