Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    137s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/08/2024, 00:13

General

  • Target

    ad284fee3b96420b850ad30abefaf485_JaffaCakes118.exe

  • Size

    380KB

  • MD5

    ad284fee3b96420b850ad30abefaf485

  • SHA1

    6f985368d612179e8da613bbe5caf19a3b00d2c2

  • SHA256

    441c8a241df631d69b709976ffa30b5d0b2affb4b1e7a2473800ac91ad9b542e

  • SHA512

    b8b8ee0bf471b6609507f3f5a4941c1ba15aa704bee48779232c07387896bb804bd65c21866c3385e22a9db9e2af1edb1cd1c05e7393052967981434653de775

  • SSDEEP

    6144:ksd2D6wsraBCDorABJclRDvO4SIA1AT+UBiPVCi55bdbP9GwCUKMCux:ksd2JsraBbbDvJAmTs9C+hGaCk

Malware Config

Signatures

  • Server Software Component: Terminal Services DLL 1 TTPs 14 IoCs
  • ASPack v2.12-2.42 2 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 12 IoCs
  • UPX packed file 45 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 14 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad284fee3b96420b850ad30abefaf485_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ad284fee3b96420b850ad30abefaf485_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2664
    • C:\242760c1.exe
      C:\242760c1.exe
      2⤵
      • Server Software Component: Terminal Services DLL
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3260
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s FastUserSwitchingCompatibility
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2792
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s Irmon
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:1656
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s Nla
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:3992
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s Ntmssvc
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2536
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s NWCWorkstation
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:4664
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s Nwsapagent
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:3404
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s SRService
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:1544
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s WmdmPmSp
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:1884
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s LogonHours
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:4224
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s PCAudit
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:3252
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s helpsvc
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2588
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs -s uploadmgr
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:4972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\242760c1.exe

    Filesize

    237KB

    MD5

    2f85e77cf24aeccc9b45fbb8111e8281

    SHA1

    733527ebc2cd96d8959687f82981ee53edba06be

    SHA256

    91d4ded63ae059c700b3f914fa8f3d801f64de851541ef3c8b94092bba9a5049

    SHA512

    4ccfaea2354e1d8058585ee56f886a6d337c297443a92a8e016c0978984b0690b73386b220dd82f29f8446d05160ed30f06d35f75914f5608296a31ae35e4378

  • \??\c:\windows\SysWOW64\fastuserswitchingcompatibility.dll

    Filesize

    237KB

    MD5

    9998f3c081fe4f1868a46f19ba376b45

    SHA1

    cc945a970dd893abeb80996ea748eeec907db5ae

    SHA256

    2793e4b88b0c946f4874e2feb0b2cbf0b8c48627b867f12efdcb4697993476be

    SHA512

    07d5249eccf7b27c3c0e980fcb27d6397e4c50a17d0cd02bf663b263b56858a51ba39068b649b6354bba130c27fa881ef8adc95b42e242f0a6afe6388d363f22

  • memory/1544-64-0x00000000751A0000-0x00000000751ED000-memory.dmp

    Filesize

    308KB

  • memory/1544-62-0x00000000751A0000-0x00000000751ED000-memory.dmp

    Filesize

    308KB

  • memory/1544-61-0x00000000751A0000-0x00000000751ED000-memory.dmp

    Filesize

    308KB

  • memory/1656-20-0x00000000751A0000-0x00000000751ED000-memory.dmp

    Filesize

    308KB

  • memory/1656-24-0x00000000751A0000-0x00000000751ED000-memory.dmp

    Filesize

    308KB

  • memory/1656-22-0x00000000751A0000-0x00000000751ED000-memory.dmp

    Filesize

    308KB

  • memory/1656-21-0x00000000751A0000-0x00000000751ED000-memory.dmp

    Filesize

    308KB

  • memory/1884-71-0x00000000751A0000-0x00000000751ED000-memory.dmp

    Filesize

    308KB

  • memory/1884-69-0x00000000751A0000-0x00000000751ED000-memory.dmp

    Filesize

    308KB

  • memory/1884-68-0x00000000751A0000-0x00000000751ED000-memory.dmp

    Filesize

    308KB

  • memory/2536-41-0x00000000751A0000-0x00000000751ED000-memory.dmp

    Filesize

    308KB

  • memory/2536-38-0x00000000751A0000-0x00000000751ED000-memory.dmp

    Filesize

    308KB

  • memory/2536-39-0x00000000751A0000-0x00000000751ED000-memory.dmp

    Filesize

    308KB

  • memory/2588-94-0x0000000075440000-0x000000007548D000-memory.dmp

    Filesize

    308KB

  • memory/2588-96-0x0000000075440000-0x000000007548D000-memory.dmp

    Filesize

    308KB

  • memory/2588-93-0x0000000075440000-0x000000007548D000-memory.dmp

    Filesize

    308KB

  • memory/2664-0-0x0000000000400000-0x0000000000488000-memory.dmp

    Filesize

    544KB

  • memory/2664-75-0x0000000000400000-0x0000000000488000-memory.dmp

    Filesize

    544KB

  • memory/2664-28-0x0000000000400000-0x0000000000488000-memory.dmp

    Filesize

    544KB

  • memory/2792-16-0x00000000751A0000-0x00000000751ED000-memory.dmp

    Filesize

    308KB

  • memory/2792-14-0x00000000751A0000-0x00000000751ED000-memory.dmp

    Filesize

    308KB

  • memory/2792-13-0x00000000751A0000-0x00000000751ED000-memory.dmp

    Filesize

    308KB

  • memory/2792-12-0x00000000751A0000-0x00000000751ED000-memory.dmp

    Filesize

    308KB

  • memory/3252-87-0x0000000075440000-0x000000007548D000-memory.dmp

    Filesize

    308KB

  • memory/3252-88-0x0000000075440000-0x000000007548D000-memory.dmp

    Filesize

    308KB

  • memory/3252-86-0x0000000075440000-0x000000007548D000-memory.dmp

    Filesize

    308KB

  • memory/3260-34-0x00000000007F0000-0x000000000083D000-memory.dmp

    Filesize

    308KB

  • memory/3260-7-0x00000000007F0000-0x000000000083D000-memory.dmp

    Filesize

    308KB

  • memory/3260-4-0x00000000007F0000-0x000000000083D000-memory.dmp

    Filesize

    308KB

  • memory/3260-6-0x00000000007F0000-0x000000000083D000-memory.dmp

    Filesize

    308KB

  • memory/3404-54-0x00000000751A0000-0x00000000751ED000-memory.dmp

    Filesize

    308KB

  • memory/3404-57-0x00000000751A0000-0x00000000751ED000-memory.dmp

    Filesize

    308KB

  • memory/3404-55-0x00000000751A0000-0x00000000751ED000-memory.dmp

    Filesize

    308KB

  • memory/3992-32-0x00000000751A0000-0x00000000751ED000-memory.dmp

    Filesize

    308KB

  • memory/3992-29-0x00000000751A0000-0x00000000751ED000-memory.dmp

    Filesize

    308KB

  • memory/3992-30-0x00000000751A0000-0x00000000751ED000-memory.dmp

    Filesize

    308KB

  • memory/4224-81-0x0000000075440000-0x000000007548D000-memory.dmp

    Filesize

    308KB

  • memory/4224-79-0x0000000075440000-0x000000007548D000-memory.dmp

    Filesize

    308KB

  • memory/4224-80-0x0000000075440000-0x000000007548D000-memory.dmp

    Filesize

    308KB

  • memory/4664-46-0x00000000751A0000-0x00000000751ED000-memory.dmp

    Filesize

    308KB

  • memory/4664-45-0x00000000751A0000-0x00000000751ED000-memory.dmp

    Filesize

    308KB

  • memory/4664-47-0x00000000751A0000-0x00000000751ED000-memory.dmp

    Filesize

    308KB

  • memory/4972-103-0x0000000075440000-0x000000007548D000-memory.dmp

    Filesize

    308KB