Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    139s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/08/2024, 13:25

General

  • Target

    8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe

  • Size

    264KB

  • MD5

    8ee5151279f21a802c7c4a35c438559e

  • SHA1

    968c2a3637bab54cb8eaf3e5552e42f612ef5786

  • SHA256

    c4539628a4b771a1b1276de073b43d9ebf669154c7c89fdb5cc63ec6e3230047

  • SHA512

    35688680ec958269b9e764fbec21115b1533d3a99b2fc56f61da4cd132d9e5b63db9c121444d5b79e35b6973980e5809a49e451b73e18f2f2467668af25f91a0

  • SSDEEP

    6144:3/nyiyjGgZdQL4MF7w8iigvookK2vhlwfk:vyzl24MRTgb2c8

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8ee5151279f21a802c7c4a35c438559e_JaffaCakes118.exe"
    1⤵
    • Adds policy Run key to start application
    • Boot or Logon Autostart Execution: Active Setup
    • Adds Run key to start application
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4944
    • C:\Program Files (x86)\Common Files\Win SVC 32service.exe
      "C:\Program Files (x86)\Common Files\Win SVC 32service.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1640
      • C:\Windows\SysWOW64\explorer.exe
        explorer.exe
        3⤵
          PID:2620
        • C:\Users\Admin\AppData\Local\Temp\Win SVC 32service.exe
          "C:\Users\Admin\AppData\Local\Temp\Win SVC 32service.exe"
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:4768

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Common Files\Win SVC 32service.exe

      Filesize

      240KB

      MD5

      c7fab3f0c3c415d7b1708f0679201af4

      SHA1

      2cdb6fd004237fbf8203a0a72b6fd99305d270b4

      SHA256

      8569945915e878d2bed8690466ecd63c125b094770c9df121aa2f21f00e73ef0

      SHA512

      1cb4a99f38a95335ace8278d4ab3f7fd2a1d12920626c4a5251d4c228e8a60291fc1c59d6f635bc61b5660268723d03c760b268386ef7fd4db36b8544fc61b3a

    • C:\Users\Admin\AppData\Local\Temp\Win SVC 32service.exe

      Filesize

      156KB

      MD5

      9482ad828adeb5073a2528961543d970

      SHA1

      6af219b44be03684976c66ce1955de2cc94bc7b8

      SHA256

      bd68cfa07378928615a9b74de2b1d331eba23791cbce3d569c19922dee4b11e8

      SHA512

      6b2b03d2a46f911dd5536b96bb8df90e87baedd9b97aeec4058cb7de16ca66dda6eb959ed5a66da7c902833033ac0c7855ebc104a9131d62e01fdc20884a99c8