Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/08/2024, 20:20

General

  • Target

    8787ab0122b63692d45c711c62a9ae5b_JaffaCakes118.exe

  • Size

    415KB

  • MD5

    8787ab0122b63692d45c711c62a9ae5b

  • SHA1

    08775e96e366e268baef80c5f24da6f3ca2b657e

  • SHA256

    858c1a15ec73430b4d1dc2f3c3fa1365ba935c4d2d03718d290f71847e352935

  • SHA512

    56f375b0ef196327a9c75714ab8435a5dd49d9bec8ff7073ba487bfacb407152ace3910b6107bba5d016fb7d89615c9ef161d3b074504bc28ffa3fdcee859592

  • SSDEEP

    6144:qE5WuXs2oRlewgvbhHm+UQVgz2kSnzcuxuCQWHX9VPF15FfbXuZow1C7uDZ1w+:jqZE9G+UQVgz2kSouxuRgXFdSowb1

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8787ab0122b63692d45c711c62a9ae5b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8787ab0122b63692d45c711c62a9ae5b_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4868
    • C:\Users\Admin\AppData\Local\Temp\svchosty.exe
      "C:\Users\Admin\AppData\Local\Temp\svchosty.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:408
      • C:\Users\Admin\AppData\Local\Temp\svchosty.exe
        C:\Users\Admin\AppData\Local\Temp\svchosty.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4244
        • C:\Users\Admin\AppData\Local\Temp\svchosty.exe
          C:\Users\Admin\AppData\Local\Temp\svchosty.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1488
          • C:\Users\Admin\AppData\Local\Temp\svchosty.exe
            C:\Users\Admin\AppData\Local\Temp\svchosty.exe
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2336
            • C:\Users\Admin\AppData\Local\Temp\svchosty.exe
              C:\Users\Admin\AppData\Local\Temp\svchosty.exe
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:392
              • C:\Users\Admin\AppData\Local\Temp\svchosty.exe
                C:\Users\Admin\AppData\Local\Temp\svchosty.exe
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:1476
                • C:\Users\Admin\AppData\Local\Temp\svchosty.exe
                  C:\Users\Admin\AppData\Local\Temp\svchosty.exe
                  8⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:2252
                  • C:\Users\Admin\AppData\Local\Temp\svchosty.exe
                    C:\Users\Admin\AppData\Local\Temp\svchosty.exe
                    9⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:636
                    • C:\Users\Admin\AppData\Local\Temp\svchosty.exe
                      C:\Users\Admin\AppData\Local\Temp\svchosty.exe
                      10⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      PID:2204
                      • C:\Users\Admin\AppData\Local\Temp\svchosty.exe
                        C:\Users\Admin\AppData\Local\Temp\svchosty.exe
                        11⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:3576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\JACP9GNT\js3[3].js

    Filesize

    1KB

    MD5

    a66b149a7ebc798955373415d683f32a

    SHA1

    15ceaba8cfae8368600620ae97aa26ae7331d626

    SHA256

    036c94653e84e6078c087abeb3ac8804491d27b27938839ae3df42b31e2238d9

    SHA512

    286add411911651ed9217ab94b286d4e3fb546f4bf39c451eff86df0b6daab412d2fd97e0e34c4b71322e862eddf8bc1efdb9d7e1e3c53c15bb420f609966443

  • C:\Users\Admin\AppData\Local\Temp\svchosty.exe

    Filesize

    295KB

    MD5

    83ae2790b4528531046b9903361af5c6

    SHA1

    ff01b966dfa8d41fb18fd1af36e5fd92b5d44838

    SHA256

    57eb9423f455c973371def560c38bd6fe3c936680c408181574ba452c989febf

    SHA512

    8c665f58596ebcb7821976ca65b20b98bf435ee63ad3424804b3ab764b90ae5c82a5307fb34f7329de0f567155c37d919c79af545b4480c48428bdd81e25132a

  • memory/392-45-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/392-112-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/408-41-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/408-40-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/408-15-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/408-14-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/408-108-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/408-12-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/408-13-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/636-115-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/636-48-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/1476-113-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/1476-46-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/1488-23-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/1488-110-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/1488-43-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/1488-25-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2204-49-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2204-116-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2252-47-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2252-114-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2336-111-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/2336-44-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/3576-39-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/4244-19-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/4244-20-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/4244-109-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/4244-18-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/4244-17-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/4244-42-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/4868-3-0x0000000000400000-0x000000000046C000-memory.dmp

    Filesize

    432KB

  • memory/4868-1-0x0000000000400000-0x000000000046C000-memory.dmp

    Filesize

    432KB

  • memory/4868-0-0x0000000000457000-0x0000000000469000-memory.dmp

    Filesize

    72KB