Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    95s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/09/2024, 00:47

General

  • Target

    d0bf84954350aa1b4ddc317e0e8c9312_JaffaCakes118.exe

  • Size

    150KB

  • MD5

    d0bf84954350aa1b4ddc317e0e8c9312

  • SHA1

    93544e9870b8b260ca0b9ab3f45b38c95072cbab

  • SHA256

    d94dc87d4b88c1fcd45d0e3a228a5e361c5fa16bb58dea42420c2fb0d0e00bad

  • SHA512

    5c451cca985b5483f876107ed9c8d2e1f525e427f013f10682457106857b2502f5c30fb1989bd1a1c15b86881b2114b3918cf7b1e6111ee0ae6b104503afeda7

  • SSDEEP

    1536:Wvq49czsHZ/4WMFekHCCUwKoYFG782KkEOxDCSdFIPS1B7UOktjr+54:lhzstRkJUwrIG78iEO1pqPOuOkt25

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3404
      • C:\Users\Admin\AppData\Local\Temp\d0bf84954350aa1b4ddc317e0e8c9312_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\d0bf84954350aa1b4ddc317e0e8c9312_JaffaCakes118.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:2588

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2588-1-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB

    • memory/2588-0-0x0000000000600000-0x0000000000602000-memory.dmp

      Filesize

      8KB

    • memory/2588-3-0x0000000000400000-0x0000000000416000-memory.dmp

      Filesize

      88KB