Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/09/2024, 06:22

General

  • Target

    cedfc9e7ea59492dad67070e010d81c4_JaffaCakes118.exe

  • Size

    98KB

  • MD5

    cedfc9e7ea59492dad67070e010d81c4

  • SHA1

    03cfc6743e5856f7fdb5fc26b11e63adb9a65cdc

  • SHA256

    93ec9d600310adcd143a5bda950d4fbba056e070433205394b0cd69f75ba115f

  • SHA512

    f27ddb21980107ab034792056cfd9bc02a4d028c46bbb5ed4254e417fe05364cddce51ffdd96111d24f6a880677075b49b55faaf9691e2b3bb54d1c534718314

  • SSDEEP

    1536:lsKZbKJC4AC9hKwx2PV5HE7itqVmF9mWjJ3kv1RCj7CMLFCALkvOrmw4m2OE:ecB4AC3QV5HE7A9lsRCdhC9GrOzF

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cedfc9e7ea59492dad67070e010d81c4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\cedfc9e7ea59492dad67070e010d81c4_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4560
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Ijv..bat" > nul 2> nul
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Ijv..bat

    Filesize

    238B

    MD5

    5c6d8729d0d17dc552baa89f64ef835d

    SHA1

    74ec356d26c6a17e37d71e14223dbf8ddd409d41

    SHA256

    a74eaab8acd75b5d4346ff315499680f4af373341a98e41f3399541ca0d91a29

    SHA512

    4e4b1ca3f8cc0bbb6e49c76b65ba76e73e528afe3d91dbd406ceb6acaf5bea9b0042a929eb7ffa77835ac9f38e91cd0cb8e07833185d73f49655e0b965388bd2

  • memory/4560-0-0x0000000002170000-0x000000000217D000-memory.dmp

    Filesize

    52KB

  • memory/4560-1-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/4560-4-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB