Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    100s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/09/2024, 04:44

General

  • Target

    d11abfb770aa57350070a95f3d47dcd2_JaffaCakes118.exe

  • Size

    1.0MB

  • MD5

    d11abfb770aa57350070a95f3d47dcd2

  • SHA1

    3032cbe041d4ff5e97ead84a4057671f1c16f83d

  • SHA256

    f205efc58da5396bb6bff9d4af71889f525ff0cad6dac274e6f61f4fdf6039b2

  • SHA512

    0caa2ca261ce0ca7ac9c3710455e86b40c9921d92b6159485b43bb20457f2fd329662a2c8f6bdbecd2986313238217de5ac6a5502b51787829fb23929dc33036

  • SSDEEP

    24576:bK8E+6SUmunH67nOs6qMPwvutzfAz3yyv6k4pj0ISQA6B:aHSMnH67n8dtzryyPZ0rQA6B

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 11 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 17 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d11abfb770aa57350070a95f3d47dcd2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d11abfb770aa57350070a95f3d47dcd2_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2332
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" http://www.yftk.cc/?000
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5152
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.yftk.cc/?000
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3944
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3944 CREDAT:17410 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2712
    • C:\Program Files (x86)\soft911\Green.exe
      "C:\Program Files (x86)\soft911\Green.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5496
      • C:\Users\Admin\AppData\Local\Temp\is-CVMTH.tmp\Green.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-CVMTH.tmp\Green.tmp" /SL5="$601E4,744477,52224,C:\Program Files (x86)\soft911\Green.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1512
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c ""C:\Program Files (x86)\soft911\Green.exe"" /sp- /VERYSILENT /norestart
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:5008
          • C:\Program Files (x86)\soft911\Green.exe
            "C:\Program Files (x86)\soft911\Green.exe" /sp- /VERYSILENT /norestart
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:6048
            • C:\Users\Admin\AppData\Local\Temp\is-I47MT.tmp\Green.tmp
              "C:\Users\Admin\AppData\Local\Temp\is-I47MT.tmp\Green.tmp" /SL5="$80232,744477,52224,C:\Program Files (x86)\soft911\Green.exe" /sp- /VERYSILENT /norestart
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in Program Files directory
              • System Location Discovery: System Language Discovery
              PID:6056
    • C:\Program Files (x86)\soft911\sun18.exe
      "C:\Program Files (x86)\soft911\sun18.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:5920
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\temg_tmp2.bat"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3380

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\soft911\Green.exe

    Filesize

    978KB

    MD5

    64e38efc3ea1835950b14c9a348c99c9

    SHA1

    acae91f4d32ab9bab54ff501a278d7923a1a0599

    SHA256

    de7efb99d3f4c91146546dde2b8fb6d187ebd566ba3ebdea3511cba0ab1cb974

    SHA512

    68c3d31e8f812eedb583bb790a486249a9250c7306481b17075826bd835362f3047ac81600dd4674dc04af13f21b15b9fa0a28b4a6b6d96bd0a97217eba5dfce

  • C:\Program Files (x86)\soft911\setup_2107.exe

    Filesize

    2B

    MD5

    1ddb063b54ffcd13ed4440e3b9a0c92d

    SHA1

    dbf80ea61bea21e57c018ca48ea8e9cdb8590211

    SHA256

    85224a5c0186b205a3e0a1ac0ac023bfb8cc6f4bf19c90be88fc5f0c2316a9fa

    SHA512

    1f95eb70927dbf6421265f1356911649aca69ae149003b444ca6eb568c92806fe47ba6ebfe9ad4aadf442cf99f6e952fbc0b34bf70e90af9b4586ea101206476

  • C:\Program Files (x86)\soft911\sun18.exe

    Filesize

    40KB

    MD5

    87730a2424bc90141d6fd85e2161763e

    SHA1

    1ccf9da7cc09ac2484164d342a68d2dbf080b59c

    SHA256

    22d0bcfb872080641aa6d90c990c3b7e184d2f7f61fd91c5be133e4a74d8c0e7

    SHA512

    e1d64bc6828798f51738ecbc9afb5a8d6f6cfcecc031b7c12286f6f9822545f4bd5398563ed71581acc1f086e343f458327acac94f8fa62d746eb49606a3c099

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    471B

    MD5

    ba1bf8cf86ec57057637af172911cd13

    SHA1

    32daf654da1afadd3021d486164516318295debf

    SHA256

    77fb6880c4ae2e78d705501c19c9cd4a4d3d2f9e42d45e313561caa0b6c832e0

    SHA512

    46780dd891659bde9eb87f07c857a43de3de9eccc53077b437282d1dd0c1339321399b0faa4cc2a6534396cdd4d358209bfe1f9622bda1e5681acef2b9c4a255

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

    Filesize

    404B

    MD5

    e6321a9f5fc1735e186e0846ef3ccd37

    SHA1

    2b2b307598e0b66641e563c9432373baf0b63080

    SHA256

    30a8554d537341eb099dffdd80d2cf7b672966ec4bd74f4268ce5c8dd2c821c8

    SHA512

    0f1fdd3edda348517f51b6d26e3b25cc4e3260eb82f4390bb88c10b47ebf63baa0c96b446e04136ba852a9303a56efeb3ebc703833a459e2f4f7a2aa5ab22dce

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\ver4477.tmp

    Filesize

    15KB

    MD5

    1a545d0052b581fbb2ab4c52133846bc

    SHA1

    62f3266a9b9925cd6d98658b92adec673cbe3dd3

    SHA256

    557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

    SHA512

    bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\4329235D\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Temp\is-CVMTH.tmp\Green.tmp

    Filesize

    707KB

    MD5

    bf6be714c784b9157099cbc15df5b38a

    SHA1

    20303eec37cf9c7277a3f42ea4c74dc35fcb31e3

    SHA256

    40ea597e3a3825c9ccb672f00f6229991914e03b9fd66aa7898ef3dcc255bafe

    SHA512

    c5c8097465d1418ffc6806c0f5c4a21277042580975bc0bc1153e5245bbcfcc11ef13d6ef001a1b613910da2abdf452a5432488f7ff3fdd6ca1450006f75cb0d

  • C:\Users\Admin\AppData\Local\Temp\is-E1C5U.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • C:\Users\Admin\AppData\Local\Temp\is-NUR8A.tmp\_isetup\_isdecmp.dll

    Filesize

    13KB

    MD5

    a813d18268affd4763dde940246dc7e5

    SHA1

    c7366e1fd925c17cc6068001bd38eaef5b42852f

    SHA256

    e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64

    SHA512

    b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4

  • C:\Users\Admin\AppData\Local\Temp\nsaC611.tmp\NSISdl.dll

    Filesize

    14KB

    MD5

    254f13dfd61c5b7d2119eb2550491e1d

    SHA1

    5083f6804ee3475f3698ab9e68611b0128e22fd6

    SHA256

    fd0e8be2135f3d326b65520383a3468c3983fa32c9c93594d986b16709d80f28

    SHA512

    fcef8ac5bd0ee6e316dbbc128a223ba18c8bf85a8d253e0c0877af6a4f686a20b08d34e5a426e2be5045962b391b8073769253a4d9b18616febc8133ccf654f7

  • C:\Users\Admin\AppData\Local\Temp\nsaC611.tmp\System.dll

    Filesize

    11KB

    MD5

    00a0194c20ee912257df53bfe258ee4a

    SHA1

    d7b4e319bc5119024690dc8230b9cc919b1b86b2

    SHA256

    dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

    SHA512

    3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

  • C:\Users\Admin\AppData\Local\Temp\temg_tmp2.bat

    Filesize

    420B

    MD5

    cf263a10dcbe7341674e4ba11cca4517

    SHA1

    d5bf64d14841ac91982d4b4cd46990349d3db386

    SHA256

    1641972b6cfa1dd0f0233e7f2ae1bf95b3e1187b48936b7401403b71915a22f5

    SHA512

    bb6e311e5de7702156775db055a23e9c83f2d65ecb9639a7e0da0c24a94c1e9add3b4e3179788577f4874935560de2fe651f9623cb4c825093c32141ddc5a8a0

  • memory/1512-37-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/1512-35-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB

  • memory/5496-38-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/5496-15-0x0000000000401000-0x000000000040B000-memory.dmp

    Filesize

    40KB

  • memory/5496-13-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/6048-47-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/6048-110-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/6048-49-0x0000000000400000-0x0000000000414000-memory.dmp

    Filesize

    80KB

  • memory/6056-109-0x0000000000400000-0x00000000004C1000-memory.dmp

    Filesize

    772KB