Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    138s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/08/2024, 02:51

General

  • Target

    8d06e57c597d8855e3b00dbdffc08686_JaffaCakes118.exe

  • Size

    132KB

  • MD5

    8d06e57c597d8855e3b00dbdffc08686

  • SHA1

    3d55b6fa9fc4b6e9af405c52946d214cf43824fc

  • SHA256

    6d735fd1681702bb3f124f41ec8bcd1f05f1066f3e1b3a3b2e4da56d15f64011

  • SHA512

    f4f0595ab3e287dbfc3c6e28f1bc2c36d78416cf91d1e54401fdcb01effb2db198693e847db2c47bd7a097429e08d169e2e8af852dd0e850e6af2a71a2aca6a4

  • SSDEEP

    3072:UfZTwUa7e73kEtW8lJjWHdtm7Gbc4ExBV4HK:uZTwUa7Mk+46Y

Score
3/10

Malware Config

Signatures

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d06e57c597d8855e3b00dbdffc08686_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8d06e57c597d8855e3b00dbdffc08686_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1320
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1320 -s 200
      2⤵
      • Program crash
      PID:2612
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1320 -s 404
      2⤵
      • Program crash
      PID:3848
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1320 -ip 1320
    1⤵
      PID:4408
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1320 -ip 1320
      1⤵
        PID:3464

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1320-0-0x0000000000400000-0x000000000042C000-memory.dmp

        Filesize

        176KB

      • memory/1320-1-0x0000000000400000-0x000000000041D000-memory.dmp

        Filesize

        116KB

      • memory/1320-2-0x0000000000400000-0x000000000042C000-memory.dmp

        Filesize

        176KB

      • memory/1320-3-0x0000000000400000-0x000000000041D000-memory.dmp

        Filesize

        116KB