Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    134s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/08/2024, 18:50

General

  • Target

    c770f82ae0eaf582bef7e43003838252_JaffaCakes118.exe

  • Size

    138KB

  • MD5

    c770f82ae0eaf582bef7e43003838252

  • SHA1

    67c9b7cd17498d7c2382f4acff037d484dae638e

  • SHA256

    d41f4febe7b043c7388dd2ecc4a4637fb56d7a4ca79acbf46b3cf9bce08ae52a

  • SHA512

    05e1ca35d5bfc15626e5b27800119dc5f39a5ef492a29cb8d40aff5f575e70995cbc855a6619d94114b6b2865e8bc3389f281244761b470ea17871044f7c8f07

  • SSDEEP

    3072:BF3jOgqTivf2ZVBwMyn4B0UCwOXAehp6sTKDWzlg0tlVGDnUsW:fjODTivf263n4bCZAehIsGYlgBvW

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c770f82ae0eaf582bef7e43003838252_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c770f82ae0eaf582bef7e43003838252_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:376
    • C:\Users\Admin\AppData\Local\Temp\7zS8EC3.tmp\BridgeWeb.exe
      .\BridgeWeb.exe
      2⤵
      • Executes dropped EXE
      PID:3024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zS8EC3.tmp\BridgeWeb.exe

    Filesize

    18KB

    MD5

    4a09f070ad0031ec94e49de22d0c0708

    SHA1

    7052a6f64ead26260c998b537351840d62b528fa

    SHA256

    1288fcf74849d81980fa66dccb188be4ec091abbc7b6ad74301856bf72137c34

    SHA512

    360c842b51fc1765291288a6a5f03fd7f8061b0d4b74bad6f8a336df03e3335ab575a4b23c6f76d92a16a1f0ee928d2c94ea5b0739884d6ca96a7e00bb475ce5

  • C:\Users\Admin\AppData\Local\Temp\7zS8EC3.tmp\BridgeWeb.xml

    Filesize

    435B

    MD5

    db0feb07d3c199a7c6647f1f64730e1e

    SHA1

    78a1ec5c1af44a750770f714cf14f8255e1f8730

    SHA256

    42e186b4c97abb98a5ef56176dae2916d5ebcb447c028e037e00f6e815de818a

    SHA512

    8dd7967fa7b1d2b259d11f6a662ecf392a400154e206efd869893f30983927fa05eae253fbbbc102f833601b0a50e8a52b0bcb46c5bcd86b503b1f86672d70fd

  • memory/3024-12-0x000000001BB20000-0x000000001BFEE000-memory.dmp

    Filesize

    4.8MB

  • memory/3024-10-0x000000001B5A0000-0x000000001B646000-memory.dmp

    Filesize

    664KB

  • memory/3024-11-0x00007FFA8C760000-0x00007FFA8D101000-memory.dmp

    Filesize

    9.6MB

  • memory/3024-13-0x000000001C0C0000-0x000000001C15C000-memory.dmp

    Filesize

    624KB

  • memory/3024-14-0x0000000000E70000-0x0000000000E78000-memory.dmp

    Filesize

    32KB

  • memory/3024-15-0x000000001C220000-0x000000001C26C000-memory.dmp

    Filesize

    304KB

  • memory/3024-16-0x00007FFA8C760000-0x00007FFA8D101000-memory.dmp

    Filesize

    9.6MB

  • memory/3024-9-0x00007FFA8CA15000-0x00007FFA8CA16000-memory.dmp

    Filesize

    4KB

  • memory/3024-18-0x00007FFA8C760000-0x00007FFA8D101000-memory.dmp

    Filesize

    9.6MB

  • memory/3024-19-0x00007FFA8C760000-0x00007FFA8D101000-memory.dmp

    Filesize

    9.6MB

  • memory/3024-21-0x00007FFA8C760000-0x00007FFA8D101000-memory.dmp

    Filesize

    9.6MB