Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    3s
  • max time network
    4s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/08/2024, 08:39 UTC

Errors

Reason
Machine shutdown

General

  • Target

    89b5a6af73d8a12ac5a0cdf54cf74902_JaffaCakes118.exe

  • Size

    96KB

  • MD5

    89b5a6af73d8a12ac5a0cdf54cf74902

  • SHA1

    cac267f7b772a80ee0b1ef21da3cc073099fd05e

  • SHA256

    2f8fddcf233fdb3152a78b55d738e782c39a5d335a2601d48c2fdab86fa7a4de

  • SHA512

    f47e7968f46dd0ea74f99dcda2f847d40a14c592ddbdb894948fa18eba1e401018f2cc62c482083964dc3154bd0aa44ddf63ad2acb3cda63a0ea103990a4260b

  • SSDEEP

    1536:+UC0ip1IbJSmBXgf4Hba9bFFRVKPEcX38YjMNajoxBgmQB:+XB1UgqsRQEUJMMjofgmQ

Malware Config

Signatures

  • Event Triggered Execution: AppInit DLLs 1 TTPs

    Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\89b5a6af73d8a12ac5a0cdf54cf74902_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\89b5a6af73d8a12ac5a0cdf54cf74902_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:2232
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa39ff855 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:692

Network

  • flag-us
    DNS
    133.211.185.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    133.211.185.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    81.144.22.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    81.144.22.2.in-addr.arpa
    IN PTR
    Response
    81.144.22.2.in-addr.arpa
    IN PTR
    a2-22-144-81deploystaticakamaitechnologiescom
  • flag-us
    DNS
    67.112.168.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    67.112.168.52.in-addr.arpa
    IN PTR
    Response
No results found
  • 8.8.8.8:53
    133.211.185.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    133.211.185.52.in-addr.arpa

  • 8.8.8.8:53
    81.144.22.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    81.144.22.2.in-addr.arpa

  • 8.8.8.8:53
    67.112.168.52.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    67.112.168.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2232-0-0x0000000001000000-0x0000000001019000-memory.dmp

    Filesize

    100KB

  • memory/2232-1-0x0000000001001000-0x0000000001002000-memory.dmp

    Filesize

    4KB

  • memory/2232-2-0x0000000001000000-0x0000000001019000-memory.dmp

    Filesize

    100KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.