Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/08/2024, 04:46

General

  • Target

    c24f5ad9b1044507470deb08ceb02c42_JaffaCakes118.exe

  • Size

    45KB

  • MD5

    c24f5ad9b1044507470deb08ceb02c42

  • SHA1

    247a5e56d91e3463169012c0df6d89fe5b9232e9

  • SHA256

    987c1baa340a6edb444f953c4d3b68f9899e03366f88e2c20d91b445221e2326

  • SHA512

    2a76ce318c793f4bdcab737eb335deb30a3f49f0e860ab041a88ba21dcf82e7cd480db8f0d0c75f3766b8c93ecb0b9460343977c6a0e2d0f27f3cf96124e0e9c

  • SSDEEP

    768:LRVZwlephZYNuRrIKM/GsNEpFjEf8o688PUQ0Zbnwzoxz5FhVkdvDya:LRAephXq/hxf36JUjZhxdFhKdvL

Malware Config

Signatures

  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 20 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 48 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies registry class 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c24f5ad9b1044507470deb08ceb02c42_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c24f5ad9b1044507470deb08ceb02c42_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3396
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp_ext.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2916
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Roaming\lua\1.bat
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2020
        • C:\PROGRA~1\INTERN~1\iexplore.exe
          C:\PROGRA~1\INTERN~1\IEXPLORE.EXE http://www.cnkankan.com/?71628
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3920
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3920 CREDAT:17410 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:4388
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\Users\Admin\AppData\Roaming\lua\1.inf
          4⤵
          • System Location Discovery: System Language Discovery
          PID:740
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Roaming\lua\2.bat
          4⤵
          • Enumerates connected drives
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3876
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKLM\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.71628.com/?S"" /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Modifies Internet Explorer start page
            PID:4060
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d ""http://www.71628.com/?S"" /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Modifies Internet Explorer start page
            PID:4472
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKCU\Software\tmp" /v "key" /d ""http://www.71628.com/?S"" /f
            5⤵
            • System Location Discovery: System Language Discovery
            PID:4708
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}" /v "IsShortCut" /d "" /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            PID:4668
          • C:\Windows\SysWOW64\reg.exe
            reg add "HKCR\CLSID\{971C5380-92A0-5A69-B3EE-C3002B33309E}\Shell\open(&H)\Command" /v "" /d "wscript -e:vbs ""C:\Users\Admin\AppData\Roaming\lua\3.bat""" /f
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            PID:3028
          • C:\Windows\SysWOW64\attrib.exe
            attrib +s +h C:\Users\Admin\AppData\Roaming\lua\tmp\a.{971C5380-92A0-5A69-B3EE-C3002B33309E}
            5⤵
            • Sets file to hidden
            • System Location Discovery: System Language Discovery
            • Views/modifies file attributes
            PID:3388
          • C:\Windows\SysWOW64\attrib.exe
            attrib +s +h C:\Users\Admin\AppData\Roaming\lua\tmp
            5⤵
            • Sets file to hidden
            • System Location Discovery: System Language Discovery
            • Views/modifies file attributes
            PID:5100
          • C:\Windows\SysWOW64\rundll32.exe
            rundll32 syssetup,SetupInfObjectInstallAction DefaultInstall 128 C:\Users\Admin\AppData\Roaming\lua\2.inf
            5⤵
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1220
            • C:\Windows\SysWOW64\runonce.exe
              "C:\Windows\system32\runonce.exe" -r
              6⤵
              • System Location Discovery: System Language Discovery
              • Checks processor information in registry
              • Suspicious use of WriteProcessMemory
              PID:2736
              • C:\Windows\SysWOW64\grpconv.exe
                "C:\Windows\System32\grpconv.exe" -o
                7⤵
                • System Location Discovery: System Language Discovery
                PID:3672
          • C:\Windows\SysWOW64\rundll32.exe
            rundll32 D:\VolumeDH\inj.dat,MainLoad
            5⤵
            • System Location Discovery: System Language Discovery
            PID:684
    • C:\Users\Admin\AppData\Local\Temp\inlE6A4.tmp
      C:\Users\Admin\AppData\Local\Temp\inlE6A4.tmp
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1224
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\inlE6A4.tmp > nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4404
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\C24F5A~1.EXE > nul
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2328

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\H9MX5QVK\favicon[1].htm

    Filesize

    802B

    MD5

    b4f7d6a0d3f6605440a1f5574f90a30c

    SHA1

    9d91801562174d73d77f1f10a049c594f969172a

    SHA256

    e3b1510526757baa753c916ababce951be64146e04f74c631c6503531d83c6cd

    SHA512

    c852ff3b51db00184bcfb0d6609a2791cb81efdb0d8d5aaed1c5b9e576b17b19804affe6ea7b5db575179c166543db5dcd828b3fcbd90e8baabb47c166da7c3f

  • C:\Users\Admin\AppData\Local\Temp\cdf1912.tmp

    Filesize

    903B

    MD5

    a895dff7b4822dbeacbc624df35b115f

    SHA1

    1ecec3bde42582d1841755d6f27ee707c97fbf1e

    SHA256

    a4d15f9e35eea6a8df381f1755660210afc596d97b2babd65132d2261769c5c0

    SHA512

    340b00695153e29ea71726c45482c1923765e4b93c8fdfa243dc575014711f8b27e9e29b1ccce4d86349dab4422f6c72e73cef049cd53c4a8657c5dfbb929f29

  • C:\Users\Admin\AppData\Local\Temp\tmp_ext.bat

    Filesize

    50B

    MD5

    e08ad52d3d132292f9c51e7cfec5fe08

    SHA1

    269f7eb185a9ff02664297bfb6f5df9f86ec10f0

    SHA256

    bd2a3003fb1f771283b30a044c49aecb72bfdff4322330337dba4992ecd198f4

    SHA512

    3dc0331f3ee9a57de7bda71a94953239bc7033a130f2b783b35d17ce3ed7b7928c154323d10ba81bd81d3bfd2d7c123cec55f5178d2b44286c2f857ccd6a1722

  • C:\Users\Admin\AppData\Roaming\lua\1.bat

    Filesize

    2KB

    MD5

    582695c0131019067973d3870c8c9bca

    SHA1

    575da5536074707385418985375d6735fec7de77

    SHA256

    4dd7bb56ca6f2e48cd57ceafcd79ff31c11ce2d474d777ee5c9e16c5bfbf3e9c

    SHA512

    ea59965f427ca826734115290e42ed9a2b7db66853474a735c0add16b5e0f2e799fe7586aa2114443797d3ea02c09e36523d072dc12be38c9be5ddbab6083231

  • C:\Users\Admin\AppData\Roaming\lua\1.inf

    Filesize

    410B

    MD5

    66a1f0147fed7ddd19e9bb7ff93705c5

    SHA1

    9d803c81ea2195617379b880b227892ba30b0bf6

    SHA256

    4f45ce85e221352f7fe26e04968c7f7267dc24b55cf2b72b929b4c90e48cb764

    SHA512

    cfe51756ddec75d240249980a4d27870d15983add25058e4d0da4d8a3ea11384d4d228d6cbc95091f91e516e1ab4dfb1e315941dbd95bf717d4b31936311d597

  • C:\Users\Admin\AppData\Roaming\lua\2.bat

    Filesize

    3KB

    MD5

    2cc7ab0e0e60b07b036165b5359b4f29

    SHA1

    ce5d46d531e37bb52ac4983c061963223b043052

    SHA256

    52ed22e575304c981f0f44c771fdd7d4fe185ecfba4ff9e3ac24986686e58be9

    SHA512

    35bb22bf0c253a0d099f6fbf92ebea36714a674459f7185bce8267aee79ddceeef010a86b3e0f5a1aa9af0d7d3843c4a905a171529e19472543c916b7c926746

  • C:\Users\Admin\AppData\Roaming\lua\2.inf

    Filesize

    244B

    MD5

    524023ba7f18bfc502d22dbaade4571e

    SHA1

    fc118e1284db4e36da41d5cc4496ffa9a8b7cd2e

    SHA256

    5d170c83ca9a16ed7f62145099b3b8b0c0a1d4187e60bb0719754cb6ed40fc4c

    SHA512

    22384a0854a9949209444d9e7af3016327ad698e56797af246e02604b880949f40c7f4627303c11d73581c681b93bcee285b3937d4088c61107b9ec73901bdbc

  • C:\Users\Admin\AppData\Roaming\lua\4.bat

    Filesize

    44KB

    MD5

    8639815b7bda81055eaba69766f4c83c

    SHA1

    fcd1aacf535d0e948a8ff8104126040d1efb5bb3

    SHA256

    cf1b5e5145057f947af3ab59060e7b184975c66a68d4076732774a572f8376c8

    SHA512

    02268150ae0042dc1b8fda8d2d31b8d94058ade4fff8244a60ba8580f464e1bb5cec4a77448ba730389f9680b27742a697174c5efe2c1ddccb342ab01a5b0954

  • memory/3396-6-0x0000000000450000-0x0000000000453000-memory.dmp

    Filesize

    12KB

  • memory/3396-127-0x00000000004E0000-0x00000000004FF000-memory.dmp

    Filesize

    124KB

  • memory/3396-0-0x00000000004E0000-0x00000000004FF000-memory.dmp

    Filesize

    124KB

  • memory/3396-5-0x00000000004E0000-0x00000000004FF000-memory.dmp

    Filesize

    124KB

  • memory/3396-1-0x0000000000450000-0x0000000000453000-memory.dmp

    Filesize

    12KB

  • memory/3920-80-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-54-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-73-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-70-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-74-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-76-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-68-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-67-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-65-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-60-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-57-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-56-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-63-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-62-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-84-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-82-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-79-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-78-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-81-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-55-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-51-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-69-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-86-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-85-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-91-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-87-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-92-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-93-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-61-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-97-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-99-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-103-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-98-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-112-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-117-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-116-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-114-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-113-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-111-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-59-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-58-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB

  • memory/3920-53-0x00007FFD8AD60000-0x00007FFD8ADCE000-memory.dmp

    Filesize

    440KB