Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/09/2024, 02:31

General

  • Target

    d5849dfe11450640efd7a6f78141dc76_JaffaCakes118.exe

  • Size

    387KB

  • MD5

    d5849dfe11450640efd7a6f78141dc76

  • SHA1

    4937560a144a57aec86cc82dce65c49d8eaf52d9

  • SHA256

    e189fb63b73b753b07c464f93a2ce2cdd55b93c0f678b5f1c85edb486c4cd02f

  • SHA512

    d2f798c690b7e1276463e4413164a461c4f427e1e7b844604809df385fbd3d192e602ed052ef28437586586e3792a4b5651a4882dbd966ea13ce7b0c03326941

  • SSDEEP

    6144:anSxOhzm7DMSB2qdDqBMYY16qXKATBSPsV2zBu/RlQiwM0i:aSxOhzmXVXqBMYY1zTs7kZuiwM0

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 6 IoCs
  • Drops file in System32 directory 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 14 IoCs
  • Suspicious behavior: EnumeratesProcesses 58 IoCs
  • Suspicious use of AdjustPrivilegeToken 58 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5849dfe11450640efd7a6f78141dc76_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d5849dfe11450640efd7a6f78141dc76_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:736
  • C:\Windows\system32\BackgroundTaskHost.exe
    "C:\Windows\system32\BackgroundTaskHost.exe" -ServerName:BackgroundTaskHost.WebAccountProvider
    1⤵
      PID:2032
    • C:\Windows\System32\RuntimeBroker.exe
      C:\Windows\System32\RuntimeBroker.exe -Embedding
      1⤵
        PID:2520
      • C:\Windows\System32\RuntimeBroker.exe
        C:\Windows\System32\RuntimeBroker.exe -Embedding
        1⤵
          PID:1512
        • C:\Windows\system32\DllHost.exe
          C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
          1⤵
            PID:2612
          • C:\Windows\system32\wbem\wmiprvse.exe
            C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
            1⤵
              PID:4212
            • C:\Windows\System32\mousocoreworker.exe
              C:\Windows\System32\mousocoreworker.exe -Embedding
              1⤵
                PID:3948
              • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
                C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
                1⤵
                  PID:3004

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Windows\SysWOW64\updatenf.dll

                  Filesize

                  43KB

                  MD5

                  c7665180dbf13e798dde715eab97380d

                  SHA1

                  ffe88076cbecedef9f450a9ad9709fd761943a14

                  SHA256

                  efb1ba1b9b70ba6e7ee845235b706c458000858c7955722b35541f9a13fb7c25

                  SHA512

                  c4db5236de95a91aa3d7ce58ba4683c401154a5440d4c1dffcfe8672d7de1272febb4cb6362b7ed4aa4852b8e24a9badc1eb5cf0381e53a0f9aab4f9eaa8b95f

                • memory/736-7-0x00000000022B0000-0x00000000022BF000-memory.dmp

                  Filesize

                  60KB

                • memory/736-11-0x00000000022B0000-0x00000000022BF000-memory.dmp

                  Filesize

                  60KB

                • memory/736-10-0x0000000000400000-0x0000000000466000-memory.dmp

                  Filesize

                  408KB