Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    134s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/08/2024, 23:53

General

  • Target

    b15aa985766bd9c7d857ca3202266768_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    b15aa985766bd9c7d857ca3202266768

  • SHA1

    a447a24490de61f5d3f1586dd7ae90cadd5928fc

  • SHA256

    17b9bc1f46bcf0914898b1a5127482422c7676bf28e781ce695986e37e2f0819

  • SHA512

    cd62deaaaf0a1e71e3d487b71c42af846c15befc22bf125a3469ab8d4b24912e90fc579ed88d7eea980cf97e5bd4bf96e3c56ac5dc0ee3b8e305ba25bf4fa4bf

  • SSDEEP

    24576:SypW9SgLNZaOdcTMuUvxIgQFfn/C/k3aqw7WIv/lPMTHDwxbB22Oykx:St9SgLNZa6xIL0kqqw75v/OTUNQx

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b15aa985766bd9c7d857ca3202266768_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b15aa985766bd9c7d857ca3202266768_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4228
    • C:\Users\Admin\AppData\Local\Temp\9EB1.tmp
      "C:\Users\Admin\AppData\Local\Temp\9EB1.tmp" --pingC:\Users\Admin\AppData\Local\Temp\b15aa985766bd9c7d857ca3202266768_JaffaCakes118.exe D295DA70F68305F7DEF8935786A44954C89E3EADCFE0A67CD21581DEE3E8DF711680D27318190AC3637A08D4DF162761828E38B8BB40F128E13D99CD40065724
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      PID:4912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\9EB1.tmp

    Filesize

    1.1MB

    MD5

    55c18c758cb06d12c9081917b854573f

    SHA1

    724b6b644ba785da197daed16c8d69d9f2be59ef

    SHA256

    e09a26e8ba33515a4b94407f65d4b5187d27da2f450c6fc48287f9692c75cd60

    SHA512

    70e59714984a14618303a76bee57a4bed754b61b64d8f5ee0364910f1e81fb5365ab60515506e340261b1f69ce42c7465e1843fce61cb17b85c5f272d7cef4f4

  • memory/4228-0-0x00000000009C0000-0x0000000000A10000-memory.dmp

    Filesize

    320KB

  • memory/4228-1-0x0000000000A60000-0x0000000000BA5000-memory.dmp

    Filesize

    1.3MB

  • memory/4912-7-0x0000000000B00000-0x0000000000C45000-memory.dmp

    Filesize

    1.3MB

  • memory/4912-9-0x0000000000520000-0x0000000000560000-memory.dmp

    Filesize

    256KB