Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/09/2024, 05:05

General

  • Target

    d9aa1f618dccc2f6cafb6b9f1339ee86_JaffaCakes118.exe

  • Size

    560KB

  • MD5

    d9aa1f618dccc2f6cafb6b9f1339ee86

  • SHA1

    5cf5287f3aa9460c8f7f53d7517d14dc35783506

  • SHA256

    7974da1e217fad12742b5942c33883ef72e456ca752ec9487e2474bc68e70976

  • SHA512

    616e5c935660bdfb8b7e8c73d3acf8cb9a89b45691d8ee20ee9196448552e79bf562d83ba5b91b91f2f50e79941e0419cd549c4924d3213e524b9605c9e7d2ce

  • SSDEEP

    12288:x/WyRyr3DkhukgRr0fX1ggXfSMlOR9zmOM5P6/LxONGuHnH3DTWlk5A3:x/Kr3IhuRei2/9OinxH3RK

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 33 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 19 IoCs
  • Drops file in Windows directory 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 47 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9aa1f618dccc2f6cafb6b9f1339ee86_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d9aa1f618dccc2f6cafb6b9f1339ee86_JaffaCakes118.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1776
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32/70l8.dll"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4948
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32/03ca.dll"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2628
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32/da3r.dll"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3992
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32/a3do.dll"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4692
    • C:\Windows\SysWOW64\regsvr32.exe
      C:\Windows\system32\regsvr32.exe /s "C:\Windows\system32/a3do.dll"
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:684
    • C:\Windows\SysWOW64\330d.exe
      C:\Windows\system32/330d.exe -i
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1260
    • C:\Windows\SysWOW64\330d.exe
      C:\Windows\system32/330d.exe -s
      2⤵
      • Executes dropped EXE
      PID:3976
    • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\mtv.exe
      C:\Users\Admin\AppData\Local\Temp\h8nil4o8\mtv.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2100
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32 C:\Windows\system32/330e.dll, Always
      2⤵
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      PID:2296
  • C:\Windows\SysWOW64\330d.exe
    C:\Windows\SysWOW64\330d.exe
    1⤵
    • Drops file in Drivers directory
    • Executes dropped EXE
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2344
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\system32\rundll32 C:\Windows\system32/330e.dll,Always
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:3080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\b.dll

    Filesize

    167KB

    MD5

    9d0f7c77b79519b75acf46a4148f8503

    SHA1

    2aaeacc8522f4e657d9107fa1e0e1b7b607393af

    SHA256

    3888598820b77a12daefc78258021c772ad8c421c77c284ef5a9f7f5c39a1f63

    SHA512

    ad15e04d54052cfeaf67d92bb5643d077b9fbbacb8b1ca2c571cc8ce4df40e95d6d83ef502a066a94f2384cac778a1410ff174ce8f6c0a4835a98e01dffec4f1

  • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\mtv.exe

    Filesize

    112KB

    MD5

    a1e5c39faa4f39100a5fbfe919e6a54c

    SHA1

    ba5912487014655330ba29e3e67d99b4435c5870

    SHA256

    9de19effd57cf8d60de9544fd9decf4e89f36ab58946e7eed7132aa8229652c5

    SHA512

    525584ce90af5b3746358b62328598b12077dfd156b3ab61cf7c7c63d860a046a478e93a8308710cbc2b7aceb7e0ac695ec4a43d92769fbe3bf2b0c25dad74ee

  • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\p.dll

    Filesize

    456KB

    MD5

    c86ca33edcc0ae668b642b7faefd2fa2

    SHA1

    0e1a6be44cd357096c49aa3688e0b44fc59547d6

    SHA256

    ab765adedc6bfb24e817c4c24ef14cf921edfa5f6a9ff394236c190220e94851

    SHA512

    9bf3ec8bd462aff180edff8b9f46f23621ae767a84538421217056bf8f88cc9fa53dc1d79d43e4f93011e60c6e555e5011c248a7da8d3af8d0808d80a54581b5

  • C:\Users\Admin\AppData\Local\Temp\h8nil4o8\s.exe

    Filesize

    184KB

    MD5

    2eaaa3e189e019875357c009bda4b9fe

    SHA1

    e766992580432a61eb48a352cfa5950c24ffb881

    SHA256

    9096c8e171506bd2e421ea157f3e35d2eb6a6ddfa60548042f94f0c731559e19

    SHA512

    2ec1cbaea2a0a12da1eee2ba596784cdd98a5fc321078079e1ea35573ddccc1e84603bdf558d1c2071195c1af35a2e0553dc708d8c6142947afc9d67fd9be28f

  • C:\Windows\Temp\tmp.exe

    Filesize

    68KB

    MD5

    b04303ecca69f25fa2c7116c24cc8263

    SHA1

    65d3ab04ffbe4b3ed6f23b9c35f786dcbb9bb8e4

    SHA256

    d7edbee543209ff9ab009959576e198f1cb2a4d7e5bdc806402a81b9f7c2d35d

    SHA512

    556735bb28562d3dc8eddd28a9ddb02593a380fc9532d891d4790347caf6516720adfb90bc9f29d2841a143200ea7d0ce63bbe66cb542480a664af865d86c8df

  • memory/684-57-0x0000000010000000-0x0000000010020000-memory.dmp

    Filesize

    128KB

  • memory/1776-100-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/1776-0-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2344-74-0x0000000010000000-0x0000000010020000-memory.dmp

    Filesize

    128KB

  • memory/2344-106-0x0000000010000000-0x0000000010020000-memory.dmp

    Filesize

    128KB

  • memory/2344-119-0x0000000010000000-0x0000000010020000-memory.dmp

    Filesize

    128KB

  • memory/2344-125-0x0000000010000000-0x0000000010020000-memory.dmp

    Filesize

    128KB

  • memory/2344-128-0x0000000010000000-0x0000000010020000-memory.dmp

    Filesize

    128KB

  • memory/2344-132-0x0000000010000000-0x0000000010020000-memory.dmp

    Filesize

    128KB