Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/08/2024, 07:02

General

  • Target

    a5d32d6f8376f8efbdb9dd8633a055d2_JaffaCakes118.exe

  • Size

    197KB

  • MD5

    a5d32d6f8376f8efbdb9dd8633a055d2

  • SHA1

    553bb1b973e8adc2b118b30af2a726ecab10858d

  • SHA256

    b16b4d62e493ea2bbfc46f458fc0bf0f5384a0590eac7bc450fa521f91fb39a4

  • SHA512

    97d79a18d18b8bd93128aa63531757a836e664e22e4292578cf261898ab36aae95c4c665d110717b3f94932ec9051a6dae15cecff323e732bf641748a1e5c391

  • SSDEEP

    3072:hGu9BlfzWIbXWm+w0J05RjuUtpjnpC5AIHQFwFBuzAWtG3BJ+ed2PoLT:h/0uoqtpzpEIGFwztGRJL0q

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5d32d6f8376f8efbdb9dd8633a055d2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a5d32d6f8376f8efbdb9dd8633a055d2_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3296
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LOCALH~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LOCALH~1.EXE
      2⤵
      • Executes dropped EXE
      PID:1956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\LOCALH~1.EXE

    Filesize

    19KB

    MD5

    51532e738d9eaba4381430474bf16765

    SHA1

    2f7e4d2ce59833b0847d327a503130319f029c90

    SHA256

    46f1f0c164ea8e0c16d7eb7b88e480382e09cb85b737b8155126cf9e47e4edbe

    SHA512

    21cb17984789a9718267ae9c1ccebb2d9ad905426da71d59dad5331f443a1ce66f43afea770e257ce9ee11e4de26c87fc459b303f0df7fa3faade9a99a187e8e

  • memory/1956-7-0x00007FFF352F5000-0x00007FFF352F6000-memory.dmp

    Filesize

    4KB

  • memory/1956-8-0x000000001B930000-0x000000001B9D6000-memory.dmp

    Filesize

    664KB

  • memory/1956-9-0x00007FFF35040000-0x00007FFF359E1000-memory.dmp

    Filesize

    9.6MB

  • memory/1956-10-0x000000001BEB0000-0x000000001C37E000-memory.dmp

    Filesize

    4.8MB

  • memory/1956-11-0x000000001C420000-0x000000001C4BC000-memory.dmp

    Filesize

    624KB

  • memory/1956-12-0x00000000010D0000-0x00000000010D8000-memory.dmp

    Filesize

    32KB

  • memory/1956-13-0x00007FFF35040000-0x00007FFF359E1000-memory.dmp

    Filesize

    9.6MB

  • memory/1956-14-0x000000001C680000-0x000000001C6CC000-memory.dmp

    Filesize

    304KB

  • memory/1956-15-0x00007FFF35040000-0x00007FFF359E1000-memory.dmp

    Filesize

    9.6MB

  • memory/1956-16-0x00007FFF35040000-0x00007FFF359E1000-memory.dmp

    Filesize

    9.6MB

  • memory/1956-17-0x00007FFF35040000-0x00007FFF359E1000-memory.dmp

    Filesize

    9.6MB

  • memory/1956-18-0x00007FFF352F5000-0x00007FFF352F6000-memory.dmp

    Filesize

    4KB

  • memory/1956-19-0x00007FFF35040000-0x00007FFF359E1000-memory.dmp

    Filesize

    9.6MB