Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/08/2024, 05:27

General

  • Target

    a15a53951acc8ece61b47d4a6ab86a5a_JaffaCakes118.exe

  • Size

    81KB

  • MD5

    a15a53951acc8ece61b47d4a6ab86a5a

  • SHA1

    9b6ffbfef83fb1322a0111396183599d6df5568e

  • SHA256

    7af108afc3afe3b69b8ebf72c0297335e60baf150fb678d171a03e7963857e24

  • SHA512

    715bb6f240fc8849f97e85a230d755d67f269c1485347748785417ce6580cbe8e3d47af922938ce666002d37b3f1eb8c12a428fdcc64559babb318827110d9ac

  • SSDEEP

    1536:zSib6taxfqDV8uv0cbMo+rZNPRXUvVjx1fdlwatz+U5vgqc:JSofqJ8yArZ+Rx17w2z+Evgq

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a15a53951acc8ece61b47d4a6ab86a5a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a15a53951acc8ece61b47d4a6ab86a5a_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4296
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\7EB5.tmp.bat" > nul 2> nul
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4084

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7EB5.tmp.bat

    Filesize

    238B

    MD5

    10da0beb8016fb99085becf2fd473797

    SHA1

    6d54beb0366d04825b49c96a12f5d463e60a67d6

    SHA256

    0af3591ce648943a64d48a687367ce432c54db836454d40139070df4a2aa0749

    SHA512

    9e0500c16167d14f20ed3d511723b35ea32577a261a730848ae166c3dce1531b07cf44efb8285257621693d498475b0c07d905a50a3bba468b44d13099d7f8e7

  • memory/4296-0-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/4296-3-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB