Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    142s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/09/2024, 11:39

General

  • Target

    d44619f85bd0266f6f10934c63fdf9f0_JaffaCakes118.exe

  • Size

    693KB

  • MD5

    d44619f85bd0266f6f10934c63fdf9f0

  • SHA1

    b12296e0bb7b23a2ca1e4477423612c0f467bc21

  • SHA256

    acc585e40833418570437d353a72e3e39733afee873717d9c05050b51c95cdc3

  • SHA512

    9406d53d229ac3ab5d0fbbb29901ea06c6ba520fe65bdd16520e8c80092fa70d5eff6e3182c14b4c524664385c6009f2fb2e8dbf6229fabe93f1e8a7115490e5

  • SSDEEP

    12288:mAiOHgXaFEngCcWxZVwU5mOsxOtAFhyRD2F3Z4mxxlVr3ESWkogreslk:VHK/VwNOs4+FQF2QmX7LdWXgKsa

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d44619f85bd0266f6f10934c63fdf9f0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d44619f85bd0266f6f10934c63fdf9f0_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:5116
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXE
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1596
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Windows\uninstal.bat
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1432
  • C:\Windows\windows\system32\svchost
    C:\Windows\windows\system32\svchost
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:5068
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
      2⤵
        PID:2408

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXE

      Filesize

      293KB

      MD5

      46f7852d3cb5e4c8a9b04c322ecfee63

      SHA1

      db7455f77826e9f8177f3ea4fbacd082720a7c2b

      SHA256

      ee4798b1ed193a63ac9bbcb29c18a8c986bda8ace0b7e60caff3e2e38e3e5e2d

      SHA512

      2bc21f4c412a735268baae125314edeb02d51dc4919bee2db620a40a0f53cae7315de4a29706912b050b295207c7cc9cd87490e64e6e76627854175dd6c4a813

    • C:\Windows\uninstal.bat

      Filesize

      164B

      MD5

      924ea7ae6df752587469376459875c51

      SHA1

      ec5fa69c7e5dcaf5b57eefadc4f25a8e4ae073e1

      SHA256

      46c715ac82d5774479b760757498ddb0b9f75cebc116a3da81f9e438bc9bbb09

      SHA512

      ea7b176a411b82faf5fcd785c67180f88f9ff28f7e24c4f4b49f8e7cdc99fb60e38722b61547a4291bdd2c56b3729045c2e8d4afbecfe03612ab0dd8a7b6ae35

    • memory/1596-90-0x0000000000400000-0x00000000004C6000-memory.dmp

      Filesize

      792KB

    • memory/5068-95-0x0000000000400000-0x00000000004C6000-memory.dmp

      Filesize

      792KB

    • memory/5116-0-0x0000000001000000-0x0000000001162000-memory.dmp

      Filesize

      1.4MB

    • memory/5116-1-0x00000000008B0000-0x0000000000904000-memory.dmp

      Filesize

      336KB

    • memory/5116-9-0x00000000033A0000-0x00000000033A1000-memory.dmp

      Filesize

      4KB

    • memory/5116-8-0x0000000000DD0000-0x0000000000DD1000-memory.dmp

      Filesize

      4KB

    • memory/5116-7-0x0000000000DE0000-0x0000000000DE1000-memory.dmp

      Filesize

      4KB

    • memory/5116-6-0x0000000000560000-0x0000000000561000-memory.dmp

      Filesize

      4KB

    • memory/5116-5-0x0000000000570000-0x0000000000571000-memory.dmp

      Filesize

      4KB

    • memory/5116-4-0x0000000000DF0000-0x0000000000DF1000-memory.dmp

      Filesize

      4KB

    • memory/5116-3-0x00000000006A0000-0x00000000006A1000-memory.dmp

      Filesize

      4KB

    • memory/5116-2-0x0000000000DC0000-0x0000000000DC1000-memory.dmp

      Filesize

      4KB

    • memory/5116-24-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/5116-77-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/5116-76-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/5116-75-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/5116-74-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/5116-73-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/5116-72-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/5116-71-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/5116-70-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/5116-69-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/5116-68-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/5116-67-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/5116-66-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/5116-65-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/5116-64-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/5116-63-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/5116-62-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/5116-61-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/5116-60-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/5116-59-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/5116-58-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/5116-57-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/5116-56-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/5116-55-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/5116-54-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/5116-53-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/5116-52-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/5116-51-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/5116-50-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/5116-49-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/5116-48-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/5116-47-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/5116-46-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/5116-45-0x00000000033A0000-0x00000000033A1000-memory.dmp

      Filesize

      4KB

    • memory/5116-44-0x00000000033A0000-0x00000000033A1000-memory.dmp

      Filesize

      4KB

    • memory/5116-43-0x00000000033A0000-0x00000000033A1000-memory.dmp

      Filesize

      4KB

    • memory/5116-42-0x00000000033A0000-0x00000000033A1000-memory.dmp

      Filesize

      4KB

    • memory/5116-41-0x00000000033A0000-0x00000000033A1000-memory.dmp

      Filesize

      4KB

    • memory/5116-40-0x00000000033A0000-0x00000000033A1000-memory.dmp

      Filesize

      4KB

    • memory/5116-39-0x0000000000F40000-0x0000000000F41000-memory.dmp

      Filesize

      4KB

    • memory/5116-38-0x0000000000EE0000-0x0000000000EE1000-memory.dmp

      Filesize

      4KB

    • memory/5116-37-0x0000000000EF0000-0x0000000000EF1000-memory.dmp

      Filesize

      4KB

    • memory/5116-36-0x0000000000F10000-0x0000000000F11000-memory.dmp

      Filesize

      4KB

    • memory/5116-35-0x0000000000F30000-0x0000000000F31000-memory.dmp

      Filesize

      4KB

    • memory/5116-34-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/5116-33-0x0000000000E40000-0x0000000000E41000-memory.dmp

      Filesize

      4KB

    • memory/5116-32-0x0000000000EC0000-0x0000000000EC1000-memory.dmp

      Filesize

      4KB

    • memory/5116-31-0x0000000000E80000-0x0000000000E81000-memory.dmp

      Filesize

      4KB

    • memory/5116-30-0x0000000000EA0000-0x0000000000EA1000-memory.dmp

      Filesize

      4KB

    • memory/5116-29-0x0000000000E20000-0x0000000000E21000-memory.dmp

      Filesize

      4KB

    • memory/5116-28-0x0000000000E30000-0x0000000000E31000-memory.dmp

      Filesize

      4KB

    • memory/5116-25-0x0000000000E70000-0x0000000000E71000-memory.dmp

      Filesize

      4KB

    • memory/5116-23-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/5116-22-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/5116-21-0x0000000003390000-0x0000000003391000-memory.dmp

      Filesize

      4KB

    • memory/5116-27-0x0000000000EB0000-0x0000000000EB1000-memory.dmp

      Filesize

      4KB

    • memory/5116-26-0x0000000000E50000-0x0000000000E51000-memory.dmp

      Filesize

      4KB

    • memory/5116-20-0x00000000033A0000-0x00000000033A1000-memory.dmp

      Filesize

      4KB

    • memory/5116-19-0x00000000033A0000-0x00000000033A1000-memory.dmp

      Filesize

      4KB

    • memory/5116-18-0x00000000033A0000-0x00000000033A1000-memory.dmp

      Filesize

      4KB

    • memory/5116-17-0x00000000033A0000-0x00000000033A1000-memory.dmp

      Filesize

      4KB

    • memory/5116-16-0x00000000033A0000-0x00000000033A1000-memory.dmp

      Filesize

      4KB

    • memory/5116-15-0x00000000033A0000-0x00000000033A1000-memory.dmp

      Filesize

      4KB

    • memory/5116-14-0x00000000033A0000-0x00000000033A1000-memory.dmp

      Filesize

      4KB

    • memory/5116-13-0x00000000033A0000-0x00000000033A1000-memory.dmp

      Filesize

      4KB

    • memory/5116-12-0x00000000033A0000-0x00000000033A1000-memory.dmp

      Filesize

      4KB

    • memory/5116-11-0x00000000033A0000-0x00000000033A1000-memory.dmp

      Filesize

      4KB

    • memory/5116-10-0x0000000000E00000-0x0000000000E01000-memory.dmp

      Filesize

      4KB

    • memory/5116-87-0x0000000001000000-0x0000000001162000-memory.dmp

      Filesize

      1.4MB

    • memory/5116-93-0x00000000008B0000-0x0000000000904000-memory.dmp

      Filesize

      336KB

    • memory/5116-92-0x0000000001000000-0x0000000001162000-memory.dmp

      Filesize

      1.4MB