Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    132s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/08/2024, 05:25

General

  • Target

    c84a15c55c65123c6edeee8a0dc1ad27_JaffaCakes118.exe

  • Size

    544KB

  • MD5

    c84a15c55c65123c6edeee8a0dc1ad27

  • SHA1

    fd332f234be31cd32722b478b425eabd5f66f9ed

  • SHA256

    ffef77fb8cd5d33870fc5ffb329b689e241f402a75c2fe325000bc2f880ad534

  • SHA512

    5b511460d8fcdb4fa0fceeb1ae41fb79c30ea068cc228721aff94f8d3950055a92057870529984b820419287c11072434e5490cf5303ec5ca6ed3926e8712d59

  • SSDEEP

    12288:Ocy8zpggctQIZdTBwHilnDgTkmo514uPa4:y6cuIZd6HgDgVAi4

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Time Discovery 1 TTPs 1 IoCs

    Adversary may gather the system time and/or time zone settings from a local or remote system.

  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c84a15c55c65123c6edeee8a0dc1ad27_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c84a15c55c65123c6edeee8a0dc1ad27_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3404
    • C:\Users\Admin\AppData\Local\Temp\c84a15c55c65123c6edeee8a0dc1ad27_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\c84a15c55c65123c6edeee8a0dc1ad27_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Writes to the Master Boot Record (MBR)
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2200
      • C:\Users\Admin\AppData\Local\Temp\68370361a1ddf8599e61d45239a94c67 (1).exe
        "C:\Users\Admin\AppData\Local\Temp\68370361a1ddf8599e61d45239a94c67 (1).exe"
        3⤵
        • Modifies WinLogon for persistence
        • Adds policy Run key to start application
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:408
        • C:\Windows\SysWOW64\netsh.exe
          netsh advfirewall firewall add rule name="Nero" dir=in action=allow description="Multimedia suite" program="C:\Users\Admin\AppData\Roaming\csrss.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          • System Time Discovery
          PID:584
        • C:\Users\Admin\AppData\Roaming\csrss.exe
          C:\Users\Admin\AppData\Local\Temp\68370361a1ddf8599e61d45239a94c67 (1).exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:4120
      • C:\Users\Admin\AppData\Local\Temp\Q82mn1VB.exe
        "C:\Users\Admin\AppData\Local\Temp\Q82mn1VB.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\68370361a1ddf8599e61d45239a94c67 (1).exe

    Filesize

    120KB

    MD5

    81d44302811953fe75df0c2e02f1d871

    SHA1

    380b31ca2b0848c6013c434cece9e62df471cc76

    SHA256

    8ac15bb8b6ee41bea20813bd4aae91a52e3d93166e2352430aa1fe9ddb28e99a

    SHA512

    769e3d6d800d912dd4f08420fd867c03c91cebdfdc347ddb67f153715ed01395bd8da3ce316473548a6a20ddef09ef9fcd5761baa0f9eb6ade04db49cf3ebbc5

  • C:\Users\Admin\AppData\Local\Temp\Q82mn1VB.exe

    Filesize

    272KB

    MD5

    61edd8f74cfed02d3d7f17ea29ae7fdb

    SHA1

    309de06742b56436c53f0d9f2f5219d16e6e7b97

    SHA256

    a3be9d0b3a9e7d09aa5ebe767244dd3764233cec7f4778b681dc56750c3e83e9

    SHA512

    c44679ac1dc3f2f967e3a748bd99ec8cc86593e20f4acd3900fe9ba558ca126a552df596c14a11bd00b02dc57d8378dbca1fc6f0b58274dfb489866040cb9612

  • memory/2200-2-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/2200-4-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/2200-33-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB