Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    124s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/08/2024, 12:16

General

  • Target

    af2de28a68236488c99605f2f56001b4_JaffaCakes118.exe

  • Size

    89KB

  • MD5

    af2de28a68236488c99605f2f56001b4

  • SHA1

    557d203fc988106fb84d82ce9f0cad85285a8810

  • SHA256

    e1fb12c9dfc1bcf77e833a439c5264a332161d9708db19137956ba5499073df0

  • SHA512

    adc4c02e6886bb2caf06c8148316b90ff6ccac148661b516c1b6f81034b4bd37f1e0701f47b774cb720d5691cc6d0368da8685757afee5911bf4c931e17c078c

  • SSDEEP

    1536:W3IWn6TcKebNXzTjI0GGFsNhSEO+k+bmNHEc6JgD7HjVeAR2vBC+oGUE:dWLNHfFsDSeKVEcsgnDXR25Ced

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af2de28a68236488c99605f2f56001b4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\af2de28a68236488c99605f2f56001b4_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:872
    • C:\Windows\SysWOW64\w32tm.exe
      w32tm /config /syncfromflags:manual /manualpeerlist:time.windows.com,time.nist.gov
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4716
      • C:\Windows\system32\w32tm.exe
        w32tm /config /syncfromflags:manual /manualpeerlist:time.windows.com,time.nist.gov
        3⤵
          PID:2524
      • C:\Windows\SysWOW64\w32tm.exe
        w32tm /config /update
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1272
        • C:\Windows\system32\w32tm.exe
          w32tm /config /update
          3⤵
            PID:1152

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads