Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/08/2024, 05:12

General

  • Target

    a150b92c74d6c4e00e75efd809486a8a_JaffaCakes118.exe

  • Size

    53KB

  • MD5

    a150b92c74d6c4e00e75efd809486a8a

  • SHA1

    7add8500ea7c5f029a6c03b58ab7be98aae6e316

  • SHA256

    fe498601122500cb3cb19d3776aea5f4068bfcbf13b07a6f1afed7bbcb2a5790

  • SHA512

    72e6fcf0bea0080c55dbb541c5e5561f0bcb48b2462f2a12b8bf32f14099207a39525997c8d56f4a620212cdcd2460032ff9e1014f18cde7daefa21417d4bae0

  • SSDEEP

    1536:Hbcj7zsJcXsezqQjOe1Vk6hF+/k7gNqvm1Rgr:HbZcXF+NeM6hF+M7gNqvUgr

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:616
    • C:\Users\Admin\AppData\Local\Temp\a150b92c74d6c4e00e75efd809486a8a_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\a150b92c74d6c4e00e75efd809486a8a_JaffaCakes118.exe"
      1⤵
      • Modifies WinLogon for persistence
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4916

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/616-38-0x00000000293E0000-0x0000000029408000-memory.dmp

      Filesize

      160KB

    • memory/616-53-0x0000000029470000-0x0000000029498000-memory.dmp

      Filesize

      160KB

    • memory/616-78-0x0000000029560000-0x0000000029588000-memory.dmp

      Filesize

      160KB

    • memory/616-73-0x0000000029530000-0x0000000029558000-memory.dmp

      Filesize

      160KB

    • memory/616-8-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/616-14-0x00000000292F0000-0x0000000029318000-memory.dmp

      Filesize

      160KB

    • memory/616-19-0x0000000029320000-0x0000000029348000-memory.dmp

      Filesize

      160KB

    • memory/616-25-0x0000000029350000-0x0000000029378000-memory.dmp

      Filesize

      160KB

    • memory/616-34-0x00000000293B0000-0x00000000293D8000-memory.dmp

      Filesize

      160KB

    • memory/616-68-0x0000000029500000-0x0000000029528000-memory.dmp

      Filesize

      160KB

    • memory/616-48-0x0000000029440000-0x0000000029468000-memory.dmp

      Filesize

      160KB

    • memory/616-44-0x0000000029410000-0x0000000029438000-memory.dmp

      Filesize

      160KB

    • memory/616-63-0x00000000294D0000-0x00000000294F8000-memory.dmp

      Filesize

      160KB

    • memory/616-30-0x0000000029380000-0x00000000293A8000-memory.dmp

      Filesize

      160KB

    • memory/616-58-0x00000000294A0000-0x00000000294C8000-memory.dmp

      Filesize

      160KB

    • memory/4916-0-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4916-1-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4916-2-0x0000000000411000-0x0000000000413000-memory.dmp

      Filesize

      8KB

    • memory/4916-3-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/4916-1443-0x0000000000411000-0x0000000000413000-memory.dmp

      Filesize

      8KB