Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    127s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/08/2024, 19:03

General

  • Target

    ac338442aa60da53fdd1b747e86f878b_JaffaCakes118.exe

  • Size

    579KB

  • MD5

    ac338442aa60da53fdd1b747e86f878b

  • SHA1

    7a45af7f037bd6e30262f77f932bbb4abb89d8a0

  • SHA256

    34d62d15783a6a6c73988f7b4037815bed12c9af689906aa5b8eec8d68461224

  • SHA512

    149cacfaf391713baebe76183b849ed1f897c03ffbab73a62c824271a000c3a51c9e13d785a5a2593e9442be64e358c627185cd3bfc252762c86277e95e3dfd5

  • SSDEEP

    12288:5hr3ZBIRiKXoYSPYNvXXn85KDWBArKEQ0WNNPgC3:51ZB2iKYYSPYRM412v7P53

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac338442aa60da53fdd1b747e86f878b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ac338442aa60da53fdd1b747e86f878b_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4812
    • C:\Users\Admin\AppData\Local\Temp\SetA6FE.tmp
      "C:\Users\Admin\AppData\Local\Temp\SetA6FE.tmp"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3120
      • C:\Users\Admin\AppData\Local\Temp\WPTCasino_Installer\SmartInstaller.exe
        "C:\Users\Admin\AppData\Local\Temp\WPTCasino_Installer\SmartInstaller.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\SetA6FE.tmp

    Filesize

    533KB

    MD5

    f9e9a85fdc13e2a21a4c0f069d0d4376

    SHA1

    f0c0d58f9cd31c5958a4343ddd988f03ee986d9b

    SHA256

    6cd8051d2f833940decf9ff7c0e01f76012c97442124bd08ec8d9a4ff48fff5f

    SHA512

    565feb4ee8e8e00e26fd50fa7c54681437bb6b1efef0f6252da2f4db01dc2eecc312cd089ce5e2720243748cbf5dab0dc2a03a7efaa0bca6c59e748b046f5802

  • C:\Users\Admin\AppData\Local\Temp\WPTCasino_Installer\Background.bmp

    Filesize

    580KB

    MD5

    f4380bce69af62428e17ca8a5cc34622

    SHA1

    67c67605f0181b2fd80fe15e37391f07efc942e5

    SHA256

    6167539f438bef1356b94d19f212fb26cd08b543f1eb852bd670ffb65bb8ceaa

    SHA512

    085ec4e3fc78e26db31c1f25d0049dcf1e6ea3f31ece79748b9cae100658a3b249cfde4080c35f5d4cdd0cbe0b45c1ebd28c480fc1d799e1fd3fcb25a39bdc37

  • C:\Users\Admin\AppData\Local\Temp\WPTCasino_Installer\ConfigParams.ini

    Filesize

    1KB

    MD5

    95f874ccb681582d7907b7b97eb2210c

    SHA1

    fd7329602004f8fdf6a74937c64f84e6b7ac298e

    SHA256

    1a88b1e058bc3cbc7e7ddffef6c8551d35dcd41bf53e9917042530c13c41d8bd

    SHA512

    dd1595d51d51bb6513bd39c026a606b99f3042d2f38bf93bfa1e6e3d78232bc8e6b9e3b89040ef52cf369377a2a275057d74753c2af1c78150f15806f4ba226e

  • C:\Users\Admin\AppData\Local\Temp\WPTCasino_Installer\Language.ini

    Filesize

    45KB

    MD5

    089fb82d676ca0f4f1ef633483f0d19a

    SHA1

    bf10fee8d79b01d98972d2a49a72ff9978e1a828

    SHA256

    9adabbc2f77a35b84df086674a202e2cee06f33257c554d41e68aa03d834f3c4

    SHA512

    32d9f6e834dda2f6342da9fcaeaece923f7312dfe69c59d8bd71e39a94603bf8338a2866a04002b2ae07b29546114dd2da34eba91004a350bf615f636bec9110

  • C:\Users\Admin\AppData\Local\Temp\WPTCasino_Installer\Preloader.jpg

    Filesize

    60KB

    MD5

    7e4b8ab31e8125e91afc8b77810f00b8

    SHA1

    9102137fe4c49c85dfb2270a018eae43dd8a32a7

    SHA256

    96d61e5c017cbc4c79255a6c8cd21ce1c97159878b81332cbbf6111f6dc786db

    SHA512

    1923916ff449c29d99023c2c98f3ede7e8f8311de779199e7eb66e8168d8714fa7e0fb443b775e92bd6ca9154d1c335d616b9d7c50455d05e4c9812fd4324282

  • C:\Users\Admin\AppData\Local\Temp\WPTCasino_Installer\SmartInstaller.exe

    Filesize

    662KB

    MD5

    6d0755a10ca9230f686159c15b1fc9cb

    SHA1

    e2c838f88669d776c5c49ae31e0ae85a8e5d66cb

    SHA256

    02bc6db5e908b329620588fe52939be1825b2ee2fabd8ea6e95945aa9f934b34

    SHA512

    7b77f49839107e86212e6a8c24b91f034b7242f00e9d67e913adaab061148580cf4f02d6bf768056ec064af52462c186bdef24be4a9d5db1b728d5db2beb38b7

  • C:\Users\Admin\AppData\Local\Temp\WPTCasino_Installer\zlib.dll

    Filesize

    52KB

    MD5

    4965107d112666d3835308a831a29274

    SHA1

    50439b99ce525ecb74c554e1dc43ddb39481dfa4

    SHA256

    105280995cd5746078d67b8651dfe4ad2abcd532d7ad528d3100c535b0b538af

    SHA512

    38fa8f0eeadd75bf212eaab458833cfd3445d00f3d77f1f8a86b7c3ba99376231c8b3fc3cfdff6f02f2ca9c90956c76f9055717712d35a7ca7b30172a0010b59

  • memory/1872-28-0x0000000000A60000-0x0000000000A87000-memory.dmp

    Filesize

    156KB

  • memory/3120-29-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB