Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/08/2024, 16:05

General

  • Target

    86bbb58ee7fa37d1515e09e04131c33c_JaffaCakes118.exe

  • Size

    195KB

  • MD5

    86bbb58ee7fa37d1515e09e04131c33c

  • SHA1

    73789bc9a05acd59e779e98c60143d3d49a541d0

  • SHA256

    aef95097fc81601e1ac609617b5a27cec09832cb71267d7722edaa0f32dc2233

  • SHA512

    3460848dd5d766c13ab3335d853862b1ba99435f0f73485e5efb25b400c72bdc11e472bc94cde7d28797ebd18e6dca86916f4cee766f3f44dbd53e1d7bb51fb0

  • SSDEEP

    3072:tuHUJU+1l8nSCXOKcSZfuj014yxCAeEYs9a3nGtg0d50pnjdWsCbcNJL5sBot:tuHIU3SCXOM31Gs48xmj0sFNJLqq

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • UPX packed file 17 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 7 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\86bbb58ee7fa37d1515e09e04131c33c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\86bbb58ee7fa37d1515e09e04131c33c_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Disables RegEdit via registry modification
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C AT /delete /yes
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1624
      • C:\Windows\SysWOW64\at.exe
        AT /delete /yes
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4552
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\blastclnnn.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2696
      • C:\Windows\SysWOW64\at.exe
        AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\blastclnnn.exe
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SCVHSOT.exe

    Filesize

    195KB

    MD5

    86bbb58ee7fa37d1515e09e04131c33c

    SHA1

    73789bc9a05acd59e779e98c60143d3d49a541d0

    SHA256

    aef95097fc81601e1ac609617b5a27cec09832cb71267d7722edaa0f32dc2233

    SHA512

    3460848dd5d766c13ab3335d853862b1ba99435f0f73485e5efb25b400c72bdc11e472bc94cde7d28797ebd18e6dca86916f4cee766f3f44dbd53e1d7bb51fb0

  • C:\Windows\SysWOW64\autorun.ini

    Filesize

    100B

    MD5

    1f7b2b0b7fdb9e6ab44f27fa034a9834

    SHA1

    dd2ebd286f752afb45f4675886bd5a520fc9422a

    SHA256

    8dfa6f42f3f8d4c5eb29baf81c7e63f7d7555894d31fb6ed318544c0df1198d8

    SHA512

    e691f8e3258cf2075ec0ecfdd35db80368e3c0bd8c42e715791cb904bed1119a8d227d90fb35a43f927818a22cfaedf200466919881376f8a4656ecd602bb65e

  • C:\Windows\SysWOW64\setting.ini

    Filesize

    148KB

    MD5

    beaa84717044c61671b9cab28763dbef

    SHA1

    45862824ce5629a71bb768614db1d1f90d199000

    SHA256

    87249cadccdff2753754c031c58f19fc999ceb1d6933610ae63fce34f69c3243

    SHA512

    f201fc3dcc89abf369fe6e2b1a5f85a4e2bf4e43e3611ca811699b5156db5ae359af58f8d377e17544a4fa3335c1fa75de0dc219fb384304b3db1c48bfa1e466

  • memory/2432-49-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/2432-45-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/2432-46-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/2432-47-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/2432-48-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/2432-0-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/2432-50-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/2432-51-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/2432-52-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/2432-53-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/2432-54-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/2432-55-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/2432-56-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/2432-57-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/2432-58-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/2432-59-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB