Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/08/2024, 04:00

General

  • Target

    88e9b81b718bffc5e5c8b602855d8baa_JaffaCakes118.exe

  • Size

    132KB

  • MD5

    88e9b81b718bffc5e5c8b602855d8baa

  • SHA1

    9bdc6e1f815335f2fa79b79aa6cc570ddafc5580

  • SHA256

    1d1eb27c6a4428b256e306c1edc2c2fe8fd9b04761b0f2e9d7f2581353e64ee8

  • SHA512

    e239a8b730d2d3e97a29951cc0b284cc13648edb834e58fa89e5429324fe7481758beb63cacf5776aec4d733d54277ee7b4cde16bd43725d68045cb16bc29123

  • SSDEEP

    3072:qYFuib2ta4HOKBTWxwLL6MRUC5DG7vVzINKKGHheGpI:qYFuJLOiWGLL6tCRm5bKsPI

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\88e9b81b718bffc5e5c8b602855d8baa_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\88e9b81b718bffc5e5c8b602855d8baa_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:2096

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\›®½ºTV Æ÷¸£³ë°Ë»ö.url

    Filesize

    132B

    MD5

    8d402e9a94fb503513e752821c0b112c

    SHA1

    9f6280139eecf61e2d48aa35f273745f7abe8931

    SHA256

    7548c614c75736de495b63e17811a42b6ffbbe8ed73714e5ab24d584b5623b7e

    SHA512

    12af02e7e88dffa8ff069a9c12aa7e8a8b63a537ebafa02a002cb00b83c5f6dfa3e70403c1729137e9d1520122762a9cb5590a40b27170b97ecab06660af92cd

  • memory/2096-0-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB

  • memory/2096-13-0x0000000000400000-0x0000000000422000-memory.dmp

    Filesize

    136KB