Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/09/2024, 05:35

General

  • Target

    d5ba94e739a3c9ed2bb0fbbb223df3c4_JaffaCakes118.exe

  • Size

    353KB

  • MD5

    d5ba94e739a3c9ed2bb0fbbb223df3c4

  • SHA1

    bc80e1a3a328ee6dc4a38af5cb0daeb710e74ffe

  • SHA256

    fdebe9ab4ad26950a975ac859ba6f40e0e7955122e5461b83a4ea99915f25ec0

  • SHA512

    c2b6eaff3cee00afd86257cb0efc31b31be1fef7e7a67c5eafbb7df75ab6b28fa7c6981d54c959bc162d9ad9615fcc65aa57fdb855da0b76bb9a3b328a6570e8

  • SSDEEP

    3072:oxDmNN8802r9D+tzgRK6gxre1hcT8fmN4vxxXoI:+mNNBr9D5RKHUismN4aI

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5ba94e739a3c9ed2bb0fbbb223df3c4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d5ba94e739a3c9ed2bb0fbbb223df3c4_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Users\Admin\AppData\Local\Temp\d5ba94e739a3c9ed2bb0fbbb223df3c4_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\d5ba94e739a3c9ed2bb0fbbb223df3c4_JaffaCakes118.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4568-2-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB

  • memory/4568-4-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB

  • memory/4568-7-0x0000000000400000-0x0000000000405000-memory.dmp

    Filesize

    20KB