Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/08/2024, 22:34

General

  • Target

    a87cbca62dfb34be466022dfa5f43899_JaffaCakes118.exe

  • Size

    87KB

  • MD5

    a87cbca62dfb34be466022dfa5f43899

  • SHA1

    67d42e34d38a861b6e293509d048599ad2327e71

  • SHA256

    9b6da7ef20aeed17c3947a29f55b3199fa0c685735b27d16df352238448f6a00

  • SHA512

    e2e6b1b3c6ca26a6b702ee1d9d4d1f0306954d588a94f45fa30a212fbd4a3a00eed366b0fdb7ec430f2b2b5cf007bfcd47d71a0a790ac786e460fcc41747754b

  • SSDEEP

    1536:7sfXh6ZHfFyoNCoGEvBlfXyoBncIe+E9WQKzuHkN1MAarP0nnRshPdBteJznnvu:4fXh6ZHfFyhEp1XyoBncIeeSHqnG0nQh

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a87cbca62dfb34be466022dfa5f43899_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a87cbca62dfb34be466022dfa5f43899_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5048
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 /s "C:\Program Files (x86)\TopGuide\TopGuide.dll"
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:3336
    • C:\Program Files (x86)\TopGuide\TopGuide.exe
      "C:\Program Files (x86)\TopGuide\TopGuide.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4948
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32 /s "C:\Program Files (x86)\TopGuide\TopGuide.dll"
        3⤵
        • Loads dropped DLL
        • Installs/modifies Browser Helper Object
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        PID:2136

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\TopGuide\TopGuide.dll

    Filesize

    105KB

    MD5

    af91dc5eb2f1600a2acce03de4db8161

    SHA1

    3dc31ecc6ab4111d6f265c5a5700091449ae9df4

    SHA256

    0c1113cec21ed5a03fdd50f4602c362a161c55e4681788328624c296e49a70a5

    SHA512

    67f563095432601fddfc181c1fe1b020463c77148f59c8ea9bfade4b9e3392b1b1906b9603a10041d17c75f24265a5a9aa87ce6cda1d64ae356abba69519b3f2

  • C:\Program Files (x86)\TopGuide\TopGuide.exe

    Filesize

    45KB

    MD5

    97a66539f4cdf6f5970d4f3ab62e7157

    SHA1

    32dca1cbc2a1729dae1fba9b66d7221ed8b0b6a2

    SHA256

    d8fd95ab37afabedcd5d6a76785897b70770644ed3ab8a2b274dfd6ed971ea12

    SHA512

    1857d4829bc758b49a4ba7c2e5bf16b7d07c6eebde561829c4a2f850f50399da5ba68026c5ae19332af023117b750abfa39d05b844c2131c4479cdac387b8abe

  • C:\Program Files (x86)\TopGuide\adc.dll

    Filesize

    23KB

    MD5

    33d7115901c7382d911c5e5f28d95850

    SHA1

    e6b5b513626a1afd7285a1a3648912d54e819128

    SHA256

    b6af553defd463dd7d63b3c65b27d81a1ec5bb325cdaf57d3d42792e8d0dd361

    SHA512

    d5f697dad1c37b7b9d1ea30bd400f1900046fedc1c5ea4b9dea9646ea94f43ec81d3dad6f97f8ab2ab97c2804a939f72f903efae4b1e3e6f45b970bf5bf0eeed

  • memory/5048-0-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/5048-20-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB