Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    138s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2024, 20:59

General

  • Target

    b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe

  • Size

    570KB

  • MD5

    b505c838d1ff40fd639e762f4594075c

  • SHA1

    ddc06b4a856bffdfb686812012080451d2e14dbc

  • SHA256

    a7ad629c0d5323a126e66d26e41d9f516467d208c0ca71be3d3db94a5b5af081

  • SHA512

    8f50b3e8452ecefcfb7a0335942686d86481d5adab3ea806bde158c3fda84891ab5fb843fc43f731c96ea074c3027f902c9da540a573816d1c5459388288d257

  • SSDEEP

    12288:zANwRo+mv8QD4+0V16/5UfeNB6efhgBdStUgkPM94MR:zAT8QE+kX420XR

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b505c838d1ff40fd639e762f4594075c_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:5056
    • C:\Users\Admin\AppData\Roaming\holyshit.exe
      C:\Users\Admin\AppData\Roaming\holyshit.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\WebProject.ocx

    Filesize

    48KB

    MD5

    686f8494e71de081c5bb8c6888fceb0d

    SHA1

    07ee5026a08f952d12d1bcad6f6a319c6b0a6f5d

    SHA256

    2c5925e725c873b2988456d083555028d4aa91132b85d55cbe3c13821f736fe0

    SHA512

    ca3ce4b514f69d15b50a9346561124c674951d7ed87da3e2f2166dea3d5b9bb721cdae6fb3c5f0d904f7a5d8520e1563adfcbc7d2913f21c232c767016ad695b

  • C:\Users\Admin\AppData\Roaming\holyshit.exe

    Filesize

    20KB

    MD5

    bcf781e1e9dacfafc428dfd74b6d2607

    SHA1

    34e05431184e0bfa38bc146593183297831924a2

    SHA256

    e236ffb6e458cb169ad4473d759b2247debb2cfa65fe379e309de734a1d5f2f7

    SHA512

    9c5c1cd141b4c871a5f21ed0340a08a40ee00765d932a95019cf4ccbc905cc6305d3fae46f89960b199887e68c4ca05f56e5ee215884af66bf33a99fcf4a87ae

  • memory/5056-29-0x0000000000400000-0x0000000000488000-memory.dmp

    Filesize

    544KB