Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/08/2024, 21:19

General

  • Target

    ac9f2259ac4b8c19db9123e822f3a107_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    ac9f2259ac4b8c19db9123e822f3a107

  • SHA1

    88267d8ac120780655976607f02b960bedf3a9b5

  • SHA256

    c3cb9eea09d75baf41a2f144cc13f68a1c0b1629dccdf9f60a4dfdc5f57161ff

  • SHA512

    35002ce9923ad9cd656c48b0b8b1e12bd2fcdc8081328c287277909201ed53a8332c07a7fbb181eae9a73516a2246936788459dfd632db6ebf2017466261c216

  • SSDEEP

    24576:uY7426SR4y0K2+ObYkmOBkSCk0Oshvqb4UVlavIK:uwZKbVSSCJFrgla

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Program crash 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac9f2259ac4b8c19db9123e822f3a107_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ac9f2259ac4b8c19db9123e822f3a107_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:344
    • C:\Users\Admin\AppData\Roaming\9E8BABAEEA89BFF3CE8753BB936AFD99\ftbret24lt0.exe
      "C:\Users\Admin\AppData\Roaming\9E8BABAEEA89BFF3CE8753BB936AFD99\ftbret24lt0.exe" -i 9E8BABAEEA89BFF3CE8753BB936AFD99 7071624100
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1888
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 472
        3⤵
        • Program crash
        PID:1440
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 472
        3⤵
        • Program crash
        PID:4248
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 412
        3⤵
        • Program crash
        PID:2304
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 732
        3⤵
        • Program crash
        PID:344
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1888 -s 476
        3⤵
        • Program crash
        PID:1132
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1888 -ip 1888
    1⤵
      PID:1208
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1888 -ip 1888
      1⤵
        PID:4944
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1888 -ip 1888
        1⤵
          PID:4876
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1888 -ip 1888
          1⤵
            PID:904
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1888 -ip 1888
            1⤵
              PID:3664

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\9E8BABAEEA89BFF3CE8753BB936AFD99\ftbret24lt0.exe

              Filesize

              1.0MB

              MD5

              4d60e2a263831d0a556a9e3e930fa313

              SHA1

              020db90c81fd3fcb2b2fbf37ea07209b03ba05e0

              SHA256

              3c3ff9960dba55d5529e17c8ea579274303f59045a653f49ed51f2124f39b35e

              SHA512

              32afd89d9e2bd53dd5657292562bfc39af72c8735bb0a247808705754cad56977284561294ea89a197938e06e40a702ade255a3626b1158394f9c76d36ca6725

            • memory/344-0-0x0000000000400000-0x0000000000522000-memory.dmp

              Filesize

              1.1MB

            • memory/344-2-0x0000000002130000-0x000000000224A000-memory.dmp

              Filesize

              1.1MB

            • memory/344-1-0x0000000000400000-0x0000000000522000-memory.dmp

              Filesize

              1.1MB

            • memory/344-4-0x0000000000401000-0x000000000045B000-memory.dmp

              Filesize

              360KB

            • memory/344-3-0x0000000002270000-0x0000000002271000-memory.dmp

              Filesize

              4KB

            • memory/344-11-0x0000000000400000-0x0000000000522000-memory.dmp

              Filesize

              1.1MB

            • memory/344-14-0x0000000002130000-0x000000000224A000-memory.dmp

              Filesize

              1.1MB

            • memory/1888-12-0x0000000000400000-0x0000000000654000-memory.dmp

              Filesize

              2.3MB

            • memory/1888-15-0x0000000000400000-0x0000000000654000-memory.dmp

              Filesize

              2.3MB

            • memory/1888-9-0x0000000000400000-0x0000000000654000-memory.dmp

              Filesize

              2.3MB

            • memory/1888-16-0x0000000000400000-0x0000000000654000-memory.dmp

              Filesize

              2.3MB