Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2024, 14:17

General

  • Target

    b3cc763a76402e48178b277e21feb079_JaffaCakes118.exe

  • Size

    10.0MB

  • MD5

    b3cc763a76402e48178b277e21feb079

  • SHA1

    e203fe02a0962b83f73895a1c03cbdac4a4953f8

  • SHA256

    76557b0f1da2b21272c8a141ead19e15851bc8ab104c59f50e6651ebebfcf379

  • SHA512

    4d448a4ead0e042d06d8b45a9c4c8c42522df6fb4b752e22b8b0876ac9c0eac924e30f9eb309422cdf81df5ffdfe18448f82da9f7bc97d2d863a7a8051f38a0c

  • SSDEEP

    196608:UqvYPMj6hAXhmhSwkeUpuz3//Y1NvTdWBV36ZdtR6+fdnE7imhieu:paMjmYmhSbetIjTOK91nE7Rvu

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b3cc763a76402e48178b277e21feb079_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b3cc763a76402e48178b277e21feb079_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:3132
    • C:\Users\Admin\AppData\Local\Temp\nsk5271.tmp\firefox_plus.exe
      C:\Users\Admin\AppData\Local\Temp\nsk5271.tmp\firefox_plus.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1196
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3824,i,6510295916244954942,10164894160290787457,262144 --variations-seed-version --mojo-platform-channel-handle=4400 /prefetch:8
    1⤵
      PID:4864

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Firefox\firefox_inst.dll

      Filesize

      44KB

      MD5

      30c96ef06b2d89ce7f32a0ab7e85017c

      SHA1

      5736361779aee705764d1b0bb8eb8a2f4c45da33

      SHA256

      e8513c2d35e821298b91e3226089ac66ab75e44c4c5afd436bac6f290e3fe843

      SHA512

      188aab49635e99831a99933dd55654dde107d7751b5612f9e27e7f2246aeedd6de0d6d8b0968fabdb253d9fb2a1745858e796bf6ac2091a6b0fd4df0142cefe1

    • C:\Users\Admin\AppData\Local\Temp\nsk5271.tmp\firefox_plus.exe

      Filesize

      9.8MB

      MD5

      ba26cdeb3fd7f690ee82e9845c93fc40

      SHA1

      e68398de276f5e9af6df407c016a847543597405

      SHA256

      79d9047bb441a2880849d8e62410d463911dac4bad88393f004f2fa01715250d

      SHA512

      6041eb3576df60d633d91f4e10798cb4e96cb8a98172af52cdb32ab126f354a79414dfbe744102d948d467ce695eae5aeb84336ba562f66b5e62c1be94a0ec54

    • C:\Users\Admin\AppData\Local\Temp\nsr5550.tmp\InstallOptions.dll

      Filesize

      12KB

      MD5

      08c82a46416a5e2b471d457968f53816

      SHA1

      3e3897c20b9e89b279b4764a633f67955bf8f09a

      SHA256

      435baf3b7282c9110697a4916834ef9371dd29fae6b4cb8e19c19eb126562dc9

      SHA512

      91e2055b91d04b2348a923cb298ac6ba3637de5038dc4f849c4d2f1665d17de9cd6eb6a97d42d0f894d65348c8fd8e79cd61b667ea5a78e8960347e8cc8db81d

    • C:\Users\Admin\AppData\Local\Temp\nsr5550.tmp\System.dll

      Filesize

      10KB

      MD5

      61151aff8c92ca17b3fab51ce1ca7156

      SHA1

      68a02015863c2877a20c27da45704028dbaa7eff

      SHA256

      af15ef6479e5ac5752d139d1c477ec02def9077df897dadc8297005b3fc4999d

      SHA512

      4f5c943b7058910dc635bdcfadfea1d369c3d645239d1a52b030c21f43aac8e76549e52fd28e38ba5341d32aefe3c090dd8377d9e105ad77f71ab8870d8e326e

    • C:\Users\Admin\AppData\Local\Temp\nsr5550.tmp\ioSpecial.ini

      Filesize

      630B

      MD5

      572fe2379712f8010a2d09d69797e74d

      SHA1

      c83163952edcb19ea9e9de7aee7418edfd327eb4

      SHA256

      ea52e8703194620a55634c1b733edbeb5f180815d3f4a07557220bf2ab1a21e2

      SHA512

      a3aa6dce15c2a0e763e702109cf263840066aab08c34d55d1361049a4f0201b3235f23d00d57e6ba9afa94d391f99b5ee5554090c621cee85c9ae5ccbdc9f400

    • memory/1196-13-0x0000000002710000-0x000000000271C000-memory.dmp

      Filesize

      48KB