Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/08/2024, 20:38

General

  • Target

    a40e31c89b8ba733fb2460fca90d9fcb_JaffaCakes118.exe

  • Size

    88KB

  • MD5

    a40e31c89b8ba733fb2460fca90d9fcb

  • SHA1

    4c5369ac4e058cb1f05a712093d3d36c3c1ffdc5

  • SHA256

    5c376515db9d93258c1af536511c2463df6f132e6ce4c6d2620241a180dd9645

  • SHA512

    ab46ed19a25d114a578b29b280e03d142dc4065d9fafe80c1b2a0a05a1cd756e2fce4ed75f9379c521205d3da328798b78219ec4b15cb4a26a4c1c8ebe123d3c

  • SSDEEP

    1536:76rBcCfPbBa7lzWsMJH682+TAOcn0f+czYLfK2pgYl7PXJyHU1:3CfTU80tnw+zfJflT5y0

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a40e31c89b8ba733fb2460fca90d9fcb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a40e31c89b8ba733fb2460fca90d9fcb_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3420
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\KBDNSew.dll",Startup
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4080
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Users\Admin\AppData\Local\KBDNSew.dll",iep
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:4324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\KBDNSew.dll

    Filesize

    88KB

    MD5

    6708321aae76bdc00f39530099ca5af0

    SHA1

    2ec19d478260d9b342d02e3032d5ca2a3f9e89e4

    SHA256

    b97e688cc0cf3c20a71bab69a18859274141c027aabbde12ec05e086e7b34eb7

    SHA512

    44544edfe6ff182cd96d5ce6a72b7b9cc141929de018b16e7bd44d262b433054cd0133866eaed4dd914869689ef1c87dbe03b6ce97f2e18d4141bf069e88c990

  • memory/3420-10-0x00000000023A0000-0x00000000023B0000-memory.dmp

    Filesize

    64KB

  • memory/3420-0-0x00000000023A0000-0x00000000023B0000-memory.dmp

    Filesize

    64KB

  • memory/3420-2-0x0000000010000000-0x0000000010019000-memory.dmp

    Filesize

    100KB

  • memory/3420-14-0x0000000010000000-0x0000000010019000-memory.dmp

    Filesize

    100KB

  • memory/3420-1-0x00000000023A0000-0x00000000023B0000-memory.dmp

    Filesize

    64KB

  • memory/3420-11-0x00000000023A0000-0x00000000023B0000-memory.dmp

    Filesize

    64KB

  • memory/4080-13-0x00000000028E0000-0x00000000028F0000-memory.dmp

    Filesize

    64KB

  • memory/4080-8-0x00000000028E0000-0x00000000028F0000-memory.dmp

    Filesize

    64KB

  • memory/4080-12-0x00000000028E0000-0x00000000028F0000-memory.dmp

    Filesize

    64KB

  • memory/4080-9-0x00000000028E0000-0x00000000028F0000-memory.dmp

    Filesize

    64KB

  • memory/4080-7-0x0000000010000000-0x0000000010019000-memory.dmp

    Filesize

    100KB

  • memory/4080-15-0x0000000010000000-0x0000000010019000-memory.dmp

    Filesize

    100KB

  • memory/4080-20-0x0000000010000000-0x0000000010019000-memory.dmp

    Filesize

    100KB

  • memory/4080-26-0x0000000010000000-0x0000000010019000-memory.dmp

    Filesize

    100KB

  • memory/4324-22-0x0000000002BD0000-0x0000000002BE0000-memory.dmp

    Filesize

    64KB

  • memory/4324-21-0x0000000002BD0000-0x0000000002BE0000-memory.dmp

    Filesize

    64KB

  • memory/4324-25-0x0000000002BD0000-0x0000000002BE0000-memory.dmp

    Filesize

    64KB

  • memory/4324-24-0x0000000002BD0000-0x0000000002BE0000-memory.dmp

    Filesize

    64KB

  • memory/4324-27-0x0000000010000000-0x0000000010019000-memory.dmp

    Filesize

    100KB