Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/08/2024, 02:16

General

  • Target

    c80e0f6a1acbf984164e0a2d16f9cd4d_JaffaCakes118.exe

  • Size

    972KB

  • MD5

    c80e0f6a1acbf984164e0a2d16f9cd4d

  • SHA1

    690269388a936f18d0fe1bed25e8245f26a7f3fe

  • SHA256

    6582e5a487f370842c09e4e0d52a60b1067c366567ea26cc0c841acbfa866c8f

  • SHA512

    7e9ad5f9e5911451201f2bc14963d2585de1ed869eb02fa2fd3d7803e75dbd3a0ef239dd29d47cad7ff2e93a12d4049e72c1bd69f7f629a5b7969211fab89ed8

  • SSDEEP

    24576:LUvw1uhT4Wu/yjwmfYLz8in8mxvJ7o+p5xpN:LUvw8DuHvJM45xz

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c80e0f6a1acbf984164e0a2d16f9cd4d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c80e0f6a1acbf984164e0a2d16f9cd4d_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4536
    • C:\Users\Admin\AppData\Local\Temp\~240618281.tmp.exe
      C:\Users\Admin\AppData\Local\Temp\~240618281.tmp.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3656
    • C:\Users\Admin\AppData\Local\Temp\~240618281.tmp\c80e0f6a1acbf984164e0a2d16f9cd4d_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\~240618281.tmp\c80e0f6a1acbf984164e0a2d16f9cd4d_JaffaCakes118.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1888
      • C:\Users\Admin\AppData\Local\Temp\is-973SU.tmp\is-3MQI4.tmp
        C:\Users\Admin\AppData\Local\Temp\is-973SU.tmp\is-3MQI4.tmp /SL4 $602AC C:\Users\Admin\AppData\Local\Temp\~240618281.tmp\c80e0f6a1acbf984164e0a2d16f9cd4d_JaffaCakes118.exe 973338 68096
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-973SU.tmp\is-3MQI4.tmp

    Filesize

    550KB

    MD5

    f8af304447fc04618285f448d0651220

    SHA1

    ec2dd2c8b931501f977eefef5449b37373734415

    SHA256

    f0678194ef4b80ed8ec73ef78e5dff621c2602df47fb90e43800b6ab30c33d59

    SHA512

    c2e4cca9a38c8a5616936b2c643596c6125782bf32619eb9e890f9a7b4a293504151b22478e308656f43fc30e7ba4d9859e1a8ac1aba5e72169b8ded7cf39289

  • C:\Users\Admin\AppData\Local\Temp\~240618281.tmp.exe

    Filesize

    11KB

    MD5

    08232702cba0391d0ff4efec9961ba5a

    SHA1

    a93205772634d2a694312539ed03da1a9c1ef67f

    SHA256

    4ba4fbdb03ae978017fd045c5914474100ba64cc8bf78f7330f12e8700a2f7a2

    SHA512

    705ab1a08532d23913f83575ca32ad32f3f287ffcd20bfb60591d06f8615d16b272a382d9eb698674b7e5485b0585469a7637ca9ba770846785fc0c5669379af

  • C:\Users\Admin\AppData\Local\Temp\~240618281.tmp\c80e0f6a1acbf984164e0a2d16f9cd4d_JaffaCakes118.exe

    Filesize

    958KB

    MD5

    f5e0bd5e9c0854d19ec888bb468272b5

    SHA1

    16694ee11b04e359bd3c91cd738085a4ebd844d2

    SHA256

    084dc7dd32b23670316cb764d45a4a1fed2d3aeb84ea3db2208c7053fbb843a6

    SHA512

    170d8500105fee23146eb004e048664a7cecdc2120a209792ce03f32366ca0df5ab1b14388580effd76bdb5a44acec736bb2dff9a3bc9f40473b6d5aebaf4346

  • memory/1888-12-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/1888-14-0x0000000000401000-0x000000000040D000-memory.dmp

    Filesize

    48KB

  • memory/1888-23-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/3656-6-0x0000000013140000-0x0000000013149000-memory.dmp

    Filesize

    36KB

  • memory/4536-0-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/4536-10-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

  • memory/4688-22-0x0000000000400000-0x0000000000498000-memory.dmp

    Filesize

    608KB

  • memory/4688-24-0x0000000000400000-0x0000000000498000-memory.dmp

    Filesize

    608KB