Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    136s
  • max time network
    109s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/08/2024, 18:27

General

  • Target

    bcb41b5c44ae429a861d41c953abda8d_JaffaCakes118.exe

  • Size

    167KB

  • MD5

    bcb41b5c44ae429a861d41c953abda8d

  • SHA1

    0e81e9208f3a1062da733cd68ed56a4241868fc7

  • SHA256

    3efb61211a9fdfc34a6951337bb9cc735914e2d80f81d0f768e09d646a7bccc0

  • SHA512

    f202e2f813ef902d5a7a5e1d9d86bb6f3a613ff1b343114caa5e1a22bf388b1c01d7dc15e27e12f13105e14608f3027e53972d3f4d467de9e5ad20416b075778

  • SSDEEP

    3072:0l856uXS5CH6BDsmXYm+uJJTd4ISvyRbGLoQM71a1DzSLTjMrpKYqonqm:NSDbH7Td4zaRqLhM71rL/MtfqoT

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bcb41b5c44ae429a861d41c953abda8d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bcb41b5c44ae429a861d41c953abda8d_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3320
    • C:\Users\Admin\AppData\Local\Temp\bcb41b5c44ae429a861d41c953abda8d_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\bcb41b5c44ae429a861d41c953abda8d_JaffaCakes118.exe"
      2⤵
      • Maps connected drives based on registry
      • System Location Discovery: System Language Discovery
      PID:4740
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4740 -s 336
        3⤵
        • Program crash
        PID:1720
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4740 -ip 4740
    1⤵
      PID:1860

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\DJl1i8I1GmG.txt

      Filesize

      2KB

      MD5

      dd189be8f4e64c244da018a3f75c1c66

      SHA1

      92c38bbe6ae235b536fc02b50932a655d2cc5ef2

      SHA256

      dd62d67229540479e5ea6a95de426723538e1982f8ae1410c2115cee16bff88f

      SHA512

      65ad44d99699720cec8e79d9bdedfbf4b0d9613c4bd6bf798e294deb57763e91fb8cc0a6828894a34ca10c913a45a5069877671ed96196caf0c68c73ee0b5bd5

    • memory/4740-6-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/4740-8-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/4740-23-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB