Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/08/2024, 11:53

General

  • Target

    c8c4c54ff151e1f2ddfbb4e51001994d_JaffaCakes118.exe

  • Size

    1.4MB

  • MD5

    c8c4c54ff151e1f2ddfbb4e51001994d

  • SHA1

    7d4586a075029e458506846799def2c055cf18f5

  • SHA256

    721b5e7ccadb94d74f917b1118b9da2bf63ae0d837a6c3f7118fdf6560e38850

  • SHA512

    5054dc35041992a34879ea8d7d2c9e02bdc8a67a68fcb081e4513abf3fab6a0e9296d2eeea242cb35e8de9efabe88e96d2167b109b7abcca59ca76664429df14

  • SSDEEP

    24576:v8E6mQ+0P8D01wMz4dghQp1cspQ3pbFtyuzqlOrD8zNb4bt:E/FjzwmQbcspQ3N1qlOrD8zdC

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c8c4c54ff151e1f2ddfbb4e51001994d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c8c4c54ff151e1f2ddfbb4e51001994d_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3960
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Åú´¦ÀíDZÐÐÕß.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Åú´¦ÀíDZÐÐÕß.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1720
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4112,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=4060 /prefetch:8
    1⤵
      PID:780

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Åú´¦ÀíDZÐÐÕß.exe

      Filesize

      1001KB

      MD5

      c81fe1ee80f52a98522f67f67ce4f64b

      SHA1

      9ee6d19084d5a58c69f139f014710c4b6e08e420

      SHA256

      fea91cf4017ac76fd0e3559de6ece410d422ba16ee01209fdeb7da358f1bce92

      SHA512

      183d69f05954352cff44508f4f15565bbf84070d015c29e9cbdb50422b55259ab8da60c6ae127ad744dd315d275536e864059f5aad306a127269e7b0de44c710

    • memory/1720-8-0x0000000002280000-0x00000000022D4000-memory.dmp

      Filesize

      336KB

    • memory/1720-7-0x0000000000400000-0x000000000070B000-memory.dmp

      Filesize

      3.0MB

    • memory/1720-25-0x00000000035B0000-0x00000000035B1000-memory.dmp

      Filesize

      4KB

    • memory/1720-24-0x0000000002270000-0x0000000002271000-memory.dmp

      Filesize

      4KB

    • memory/1720-23-0x0000000002260000-0x0000000002261000-memory.dmp

      Filesize

      4KB

    • memory/1720-22-0x0000000003580000-0x0000000003583000-memory.dmp

      Filesize

      12KB

    • memory/1720-21-0x00000000035E0000-0x00000000035E1000-memory.dmp

      Filesize

      4KB

    • memory/1720-20-0x0000000003690000-0x0000000003691000-memory.dmp

      Filesize

      4KB

    • memory/1720-19-0x0000000003590000-0x0000000003592000-memory.dmp

      Filesize

      8KB

    • memory/1720-18-0x00000000035A0000-0x00000000035A1000-memory.dmp

      Filesize

      4KB

    • memory/1720-17-0x00000000024C0000-0x00000000024C1000-memory.dmp

      Filesize

      4KB

    • memory/1720-16-0x0000000002640000-0x0000000002641000-memory.dmp

      Filesize

      4KB

    • memory/1720-15-0x0000000002610000-0x0000000002611000-memory.dmp

      Filesize

      4KB

    • memory/1720-14-0x0000000002620000-0x0000000002621000-memory.dmp

      Filesize

      4KB

    • memory/1720-13-0x00000000024A0000-0x00000000024A1000-memory.dmp

      Filesize

      4KB

    • memory/1720-12-0x00000000024B0000-0x00000000024B1000-memory.dmp

      Filesize

      4KB

    • memory/1720-11-0x0000000002630000-0x0000000002631000-memory.dmp

      Filesize

      4KB

    • memory/1720-10-0x00000000024D0000-0x00000000024D1000-memory.dmp

      Filesize

      4KB

    • memory/1720-9-0x0000000002600000-0x0000000002601000-memory.dmp

      Filesize

      4KB

    • memory/1720-26-0x0000000000400000-0x000000000070B000-memory.dmp

      Filesize

      3.0MB

    • memory/1720-27-0x0000000002280000-0x00000000022D4000-memory.dmp

      Filesize

      336KB