Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/08/2024, 22:49

General

  • Target

    bd79defe4e98b1daa53e815456b0fcfb_JaffaCakes118.exe

  • Size

    2.5MB

  • MD5

    bd79defe4e98b1daa53e815456b0fcfb

  • SHA1

    b90fc77d5d171181487f7ea8a0aa88d0a0702d92

  • SHA256

    ac8f52671bfb89fe4eaddeb7dffb471205d4dfc88ee3b64efb349027959382e7

  • SHA512

    854161c715633ad6b37f2e20673dc8695fc671fba4348a62c11b38ecf5fe7207876ea1430fc6d9722fd6125321c8efd02b5ecd5d06d7da93a046f199bc955ab2

  • SSDEEP

    1536:rWW9hZZ+PVGdm9Rb7HDlcDw/sH3lVQ3poAr/kNkFlZBFTcJa:rLpYN4m9LcDw+qqAr/kNAluJa

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd79defe4e98b1daa53e815456b0fcfb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bd79defe4e98b1daa53e815456b0fcfb_JaffaCakes118.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2828
    • C:\Program Files (x86)\Dtjqmk Doskkpav\Explorer.exe
      .
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1896
      • C:\Program Files (x86)\Dtjqmk Doskkpav\explorer.exe
        explorer.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3080
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1884

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Dtjqmk Doskkpav\Explorer.exe

      Filesize

      5.7MB

      MD5

      2a55264ecc85db36ddf7acbdbbbdbcbe

      SHA1

      e2b901fc9c2c29a0de411432ed7603e8eeaf240b

      SHA256

      f109f7905c7aa0a1c8e201f5e345eb592f663bd753fba7b90930eabd984be8f5

      SHA512

      214d026912a396d1fbf25dc11dabb7da96071cac9f78a0e353349c1dec952ac5cb231bd246c6aff2852752f0164b547783986a0ae7f79c336330c6ec9b7072fd

    • C:\Program Files (x86)\Ekdndbtkyo\11306

      Filesize

      10KB

      MD5

      69c97278ab9e590932fef729f038b151

      SHA1

      076048304500a16cc37dbd8e3d4c42fbc3364ba3

      SHA256

      89287807eae136d2f00851331e45598287993adfccff325e9251f7107fb93ac6

      SHA512

      8d822d479fa2dff6f77153f3d4ae0efd65e44c0ef768b074d49549e685adcae8ca75c58dab5d4b45558fa65f9a21cd302b73fba12cc7ee5c1db1f71a382c7906

    • C:\Program Files (x86)\Ekdndbtkyo\Path.rcd

      Filesize

      260B

      MD5

      1e2b8dbe12dd2ffa8619fe195a8fb629

      SHA1

      ee44098ec9203129381876786355d6436b54a2d7

      SHA256

      edd0202904aa592425636fe529a845edc43bdbc7e7e374952164a69d0416e3f6

      SHA512

      ff7cb4b44941a993c1684448ff08c1bd118cbda09ce67cae9a5d4a1d92221a8382c56dba94f1070856242de33fb1edb531933c11ac7dbbe33e207d770c58107a