Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2024, 23:44

General

  • Target

    b5844ec8b0d13aa0b3757cab5f8a4234_JaffaCakes118.dll

  • Size

    992KB

  • MD5

    b5844ec8b0d13aa0b3757cab5f8a4234

  • SHA1

    b7e2c872277ccf1d5a3de7dbd822a4cfc9afa70c

  • SHA256

    59bc8120f510c6e96a51bfc3af6ef71edf660097f711345746a4e3b17578e4c9

  • SHA512

    fb7694c4f179d79746c7f23937b74b459e4c5bf923f22ee2f024d07d2676631321b8509ee12c2a2c02be3dcb216dd051b56b67c51e4f13e5f340615ce9cfb126

  • SSDEEP

    24576:kFWv1KaJDrL+EeaWJC7S/akvxJlxVpcTHSvtz3rdXVSf8K:GWvMaFDeaQC7S/akrl7W+vxmUK

Score
7/10

Malware Config

Signatures

  • VMProtect packed file 3 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 36 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\b5844ec8b0d13aa0b3757cab5f8a4234_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:804
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\b5844ec8b0d13aa0b3757cab5f8a4234_JaffaCakes118.dll,#1
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1612-0-0x0000000010000000-0x0000000010288000-memory.dmp

    Filesize

    2.5MB

  • memory/1612-1-0x0000000010000000-0x0000000010288000-memory.dmp

    Filesize

    2.5MB

  • memory/1612-5-0x0000000010000000-0x0000000010288000-memory.dmp

    Filesize

    2.5MB