Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/08/2024, 22:07

General

  • Target

    acc4d2670aa0c61ed277b8c7294e6da3_JaffaCakes118.exe

  • Size

    433KB

  • MD5

    acc4d2670aa0c61ed277b8c7294e6da3

  • SHA1

    59d1fc713b683bb92722c6a9f8a5d604e2fe2c74

  • SHA256

    fd4e4050aa4de944648e72354d1596049002b04e8a413ec595032bb2f8de043b

  • SHA512

    108343fde4106c5f38e41cac8465da7094ab6f013422f17be9a67a65b6d6441dd78235308bf90d489950f3c029918a0edf59277b098f01425f20c151ffc24be5

  • SSDEEP

    12288:67gEHCwWpPjn3/K7D8Qk+QqSKOd1Sd0XClqNtTird:iyrWD87+zUTEd

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\acc4d2670aa0c61ed277b8c7294e6da3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\acc4d2670aa0c61ed277b8c7294e6da3_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1584
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1584 -s 516
      2⤵
      • Program crash
      PID:3004
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\GUOCYOKl.BAT
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2880
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1584 -ip 1584
    1⤵
      PID:984
    • C:\Windows\svchsot.exe
      C:\Windows\svchsot.exe
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3176
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 516
        2⤵
        • Program crash
        PID:4260
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
        2⤵
          PID:4828
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3176 -ip 3176
        1⤵
          PID:3568

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\GUOCYOKl.BAT

          Filesize

          218B

          MD5

          967560d095701c036dcf6d94d96dec39

          SHA1

          b980ec49097f34ddaa7b279ca5ec79f62d6917a5

          SHA256

          acfb0f0d19ffabe9ced18a8768f605f143310ad4ae4137e78270ff02d1bb5c76

          SHA512

          8f37468a8bdfa95ba82c2a461bed80d8e09b2b2a7773f7f5748c5a964ad944e794b30add1636a27f18a308030a77a1a7562b1ca4eabb7cd25130c499f7bd269f

        • C:\Windows\svchsot.exe

          Filesize

          433KB

          MD5

          acc4d2670aa0c61ed277b8c7294e6da3

          SHA1

          59d1fc713b683bb92722c6a9f8a5d604e2fe2c74

          SHA256

          fd4e4050aa4de944648e72354d1596049002b04e8a413ec595032bb2f8de043b

          SHA512

          108343fde4106c5f38e41cac8465da7094ab6f013422f17be9a67a65b6d6441dd78235308bf90d489950f3c029918a0edf59277b098f01425f20c151ffc24be5

        • memory/1584-8-0x0000000002720000-0x0000000002721000-memory.dmp

          Filesize

          4KB

        • memory/1584-15-0x00000000022B0000-0x00000000022F3000-memory.dmp

          Filesize

          268KB

        • memory/1584-5-0x0000000002340000-0x0000000002341000-memory.dmp

          Filesize

          4KB

        • memory/1584-4-0x0000000002260000-0x0000000002261000-memory.dmp

          Filesize

          4KB

        • memory/1584-3-0x0000000002270000-0x0000000002271000-memory.dmp

          Filesize

          4KB

        • memory/1584-2-0x0000000002360000-0x0000000002361000-memory.dmp

          Filesize

          4KB

        • memory/1584-0-0x0000000000400000-0x00000000004EA000-memory.dmp

          Filesize

          936KB

        • memory/1584-7-0x00000000024C0000-0x00000000024C1000-memory.dmp

          Filesize

          4KB

        • memory/1584-1-0x00000000022B0000-0x00000000022F3000-memory.dmp

          Filesize

          268KB

        • memory/1584-6-0x0000000002380000-0x0000000002381000-memory.dmp

          Filesize

          4KB

        • memory/1584-14-0x0000000000400000-0x00000000004EA000-memory.dmp

          Filesize

          936KB

        • memory/3176-16-0x00000000011B0000-0x00000000011B1000-memory.dmp

          Filesize

          4KB

        • memory/3176-13-0x0000000000E30000-0x0000000000E73000-memory.dmp

          Filesize

          268KB

        • memory/3176-21-0x0000000000400000-0x00000000004EA000-memory.dmp

          Filesize

          936KB

        • memory/3176-22-0x0000000000E30000-0x0000000000E73000-memory.dmp

          Filesize

          268KB

        • memory/3176-24-0x00000000011B0000-0x00000000011B1000-memory.dmp

          Filesize

          4KB

        • memory/3176-30-0x0000000000400000-0x00000000004EA000-memory.dmp

          Filesize

          936KB