Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/08/2024, 05:24

General

  • Target

    84f137ac4654067e4c105187df431b34_JaffaCakes118.exe

  • Size

    1.9MB

  • MD5

    84f137ac4654067e4c105187df431b34

  • SHA1

    e59218f0de1fa39f6cf6e3c2990ae21082e353b8

  • SHA256

    64b9ab45bb422d7aa7ad80ec352ea66c00e6a18d047dcce7104be1d3ddd055ec

  • SHA512

    84aabc030545cf09bee05be2ccb5c9270e04561088d0a93015e0e07c52d622efccfceffcf6d43f8bf3a8cf83fecd1b3c7e1f6a9b44ebf3ce5b660a37483e46a1

  • SSDEEP

    49152:Qoa1taC070dXck0lXK9brarLbExLOYVOA7msr6xSK:Qoa1taC0McTKs8VB/Ml

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\84f137ac4654067e4c105187df431b34_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\84f137ac4654067e4c105187df431b34_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1568
    • C:\Users\Admin\AppData\Local\Temp\6A81.tmp
      "C:\Users\Admin\AppData\Local\Temp\6A81.tmp" --splashC:\Users\Admin\AppData\Local\Temp\84f137ac4654067e4c105187df431b34_JaffaCakes118.exe 2188387B02EFA197F9AA14DB973A44106193308214FB0C273A14A78667AA2668EAB2A341300A7A04194C596AB59585BC938A15B03E04EC97DE4A5552199B9568
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\6A81.tmp

    Filesize

    1.9MB

    MD5

    512dcda0e1f9c9b1d5ee5dc2b8c4c28d

    SHA1

    0c36e2594575ab96255f454a3e458fcc06c29445

    SHA256

    86b771c89effa107e236a0e2a468a27f8a51333d954d8ad3d386f61cc3817e06

    SHA512

    8e6d9b97ec7573bd6ad07d65c38fced85d70d4dd4bac984d4be2b547a5087318c32296742211ccbbb6ea3bb4a9b62de93ff2e9175111d38c4fe55fc3081fe0eb

  • memory/1568-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/4152-5-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB