Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/08/2024, 23:35

General

  • Target

    8c701a90a18da1b34695004e2c2ebe60_JaffaCakes118.exe

  • Size

    16KB

  • MD5

    8c701a90a18da1b34695004e2c2ebe60

  • SHA1

    87398dcbfd8d616f81a0c89b722b50adbce6d256

  • SHA256

    81714f58bec44e82fa207ecd341b49e2f2b661948bb07c148c38fd5774bb52b1

  • SHA512

    d627bc24be88dd0cc28f8b77c52977f584cd8b5bce25d207fa46acb45b7dc943465bfbf2ed32616c6177f09a81ab1d9ea71e298567f3cb1c16056501d512a8d5

  • SSDEEP

    384:m4W/WSi7oGOuGuIFiT8fn/luWjNR8ZkDNJz4r3YYAjMqPTE+:b0juj8fn/lrNR8+DNV4r3YY1h+

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8c701a90a18da1b34695004e2c2ebe60_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8c701a90a18da1b34695004e2c2ebe60_JaffaCakes118.exe"
    1⤵
    • Sets service image path in registry
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:224
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\system32\delme.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:912
  • C:\Windows\SysWOW64\29B1A781.EXE
    C:\Windows\SysWOW64\29B1A781.EXE -p
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:3176

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\29B1A781.EXE

    Filesize

    16KB

    MD5

    8c701a90a18da1b34695004e2c2ebe60

    SHA1

    87398dcbfd8d616f81a0c89b722b50adbce6d256

    SHA256

    81714f58bec44e82fa207ecd341b49e2f2b661948bb07c148c38fd5774bb52b1

    SHA512

    d627bc24be88dd0cc28f8b77c52977f584cd8b5bce25d207fa46acb45b7dc943465bfbf2ed32616c6177f09a81ab1d9ea71e298567f3cb1c16056501d512a8d5

  • C:\Windows\SysWOW64\delme.bat

    Filesize

    239B

    MD5

    5e58345bfa97964866b820efba3488d2

    SHA1

    35d4c36b4b1b74f7eabcac8174a98750e870c8c0

    SHA256

    a84c5c1790dc3e851d5e68a29803f1f0fea42dd7a02c0d94908660e091441608

    SHA512

    07382caa6df2ba4fbe2449c32cd9b5ce09848711dca90f1809a386ffbf1d1725833fa71e01000a0abcac3bf592b2f8640994cd264efdbf1a69c21bc9a52405a9

  • memory/224-0-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/224-1-0x00000000009C0000-0x00000000009C1000-memory.dmp

    Filesize

    4KB

  • memory/224-8-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/3176-5-0x0000000000580000-0x0000000000581000-memory.dmp

    Filesize

    4KB

  • memory/3176-11-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB