Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    139s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/08/2024, 11:51

General

  • Target

    85f1befebaad54c116ba3fbb7c710dde_JaffaCakes118.exe

  • Size

    153KB

  • MD5

    85f1befebaad54c116ba3fbb7c710dde

  • SHA1

    d8b36d6202694fb834e783e5c3dc6ca6aca9a8f3

  • SHA256

    6937c8fe895f0c3cf1ed6aa3783fbe63e201cdac570a00c0c7e1e97ab6777725

  • SHA512

    912c6ce73af75ec197ea4dd0af2a2f06ac32ab0d0bc36b17ff97475f0db4c6f29719778992796f9fbe621cb639e2e3b7bfa318ecf384cf9d0fa7f525a5e8f2cb

  • SSDEEP

    3072:1uOoa/ibr71HCwaa9RUupsjVI9jQeDMyvyxkLOqZBjHuZumKMMbM1r0uGTRAUw:k4/i35aaojLG2kL7XqTKMMbCMTY

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\85f1befebaad54c116ba3fbb7c710dde_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\85f1befebaad54c116ba3fbb7c710dde_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3860
    • C:\Program Files (x86)\Common Files\Setup.exe
      "C:\Program Files (x86)\Common Files\Setup.exe"
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      PID:916
    • C:\Program Files (x86)\Common Files\svchost.exe
      "C:\Program Files (x86)\Common Files\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:1736
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3224

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Common Files\Setup.exe

    Filesize

    444KB

    MD5

    79992af6bc665c89142e6d56ac175c2b

    SHA1

    4fdec99f47ad3b941d72ce4e0f653050fd261146

    SHA256

    253a445128dbf7e6277fe2db6b3a28c1538477f208047e3c7b40300ac7fa374f

    SHA512

    3cc96462928a4510b744b8f1ec282332b0a2360361a069a8ea8ca81f1e230aa7f9d122e938b9f749b40231c7c1e1ab31bfd57f4cdd4f8bbc03a5f1a24d98f7b0

  • C:\Program Files (x86)\Common Files\svchost.exe

    Filesize

    52KB

    MD5

    450d5949dc4290b2bcffc63083892eaf

    SHA1

    acb2e2d87cff63a2dc4e81ded30fc8ad0ba5ff78

    SHA256

    ef9ebef7797b501e2b799d6876e0d9dd7cdcc6028d4e7834561e63a504541376

    SHA512

    adaa3d2d7fa894d3ce5c43bdc1c6b357d1b0700733048e0be8c8d63eead124f73d5c93be422a3f002f0e254d8a70b7a662a95067a6fe4620b80b2cbd1218c51b

  • C:\Users\Admin\AppData\Local\Temp\$$a.bat

    Filesize

    258B

    MD5

    48fc89a9e93e7f30a4a4bafcb999e51a

    SHA1

    7db603bc22d3538b0ef2b86a600c155b28f15068

    SHA256

    4db5f206c08ac575db8af3a748fd4bda2251a3cb3ec6a9064751b03836da79dd

    SHA512

    e950fbac6e17dc62dd8f6d6a5f11053a68f7aecfcb3bb30fb88be6edbff99cc31a06a9fdbf15680d5ae0bed94aeaa03bf31dd1e607244c9b8cb193caeba93a18

  • C:\Windows\SysWOW64\Packet.dll

    Filesize

    80KB

    MD5

    ab652dab12afdad853fd59207dd2d68b

    SHA1

    0969ebf80723c3f5889dc9d9b94872d4b474c89e

    SHA256

    19c6e6603021586092dcedf5592865cdda5cae1ee1db00343cdd523e399b0d65

    SHA512

    c5fd05fd866fcf17ec1173a049ea03db01301a3fa9073dfeafb6bc11a56f716eb9385fc1ceec7a80f41c1673aea5ba00dc6f8b6c41883c366a27c2d61ad24e56

  • C:\Windows\SysWOW64\WanPacket.dll

    Filesize

    60KB

    MD5

    12aa2da30d1d2889511b4c1d14fb99b9

    SHA1

    e6d09e7581565d5e83563e23027784348fd188ca

    SHA256

    3064ea133646c4dbfbe750abbf836492a016b319783bc8166825e0783fd6e462

    SHA512

    6a732791d1c54098b4b143e03d21ecdd360d1b629d10afc442eeed5e7aae7ad877019f7a1bcf354d9d563f66083fbb9a66b1fde1ab34ac125d188a8f226e9ca0

  • C:\Windows\SysWOW64\wpcap.dll

    Filesize

    228KB

    MD5

    0a478ea707f567efa7f31847dd0e9928

    SHA1

    7748e0d84fb2cc170d46d009250a5762e3a6b9f0

    SHA256

    ab1bf7740115d2930377a17e41d7f685acf51f128405dde228e492de6ce82725

    SHA512

    4c447f53437b8e9a3f974a25b0b992ace066c9d0c1e2449dc65960cd7de8560ff74e5b87e610f32c46e3712c46070975135d088fea2ae7c1c94b7225a6cacac9

  • memory/1736-22-0x00000000005C0000-0x00000000005D0000-memory.dmp

    Filesize

    64KB

  • memory/1736-18-0x00000000005A0000-0x00000000005B5000-memory.dmp

    Filesize

    84KB

  • memory/3860-0-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/3860-25-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB