Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    95s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/09/2024, 07:10 UTC

General

  • Target

    d9d8eac20ee056aef299b2ff04fb5bc1_JaffaCakes118.exe

  • Size

    110KB

  • MD5

    d9d8eac20ee056aef299b2ff04fb5bc1

  • SHA1

    7b9d3654e348f6064f6233cc297203c897ca581b

  • SHA256

    899fd9291112a2dad595f7fd749b7de5027da5cf1c9bb05e9ea90796d1207d44

  • SHA512

    21da9f37af663f04fe5c2bd9e4712b437bfabafa00f8d35e3755921e49a0c8ff7b12b5620eb96f0c1eb4bfc4b56ec99ef84723ec15ba04198a9d83b63a38f274

  • SSDEEP

    1536:awSGenMXapWhZ1a8tPRDWAqEaPQ2AEbd4UFtTPL6PRWpvn8rJi8ZylQF:axMXapWhe8tZDWxRzA4/HArvIQF

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3464
      • C:\Users\Admin\AppData\Local\Temp\d9d8eac20ee056aef299b2ff04fb5bc1_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\d9d8eac20ee056aef299b2ff04fb5bc1_JaffaCakes118.exe"
        2⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2068
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Nashy.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Nashy.exe
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:772

    Network

    • flag-us
      DNS
      241.150.49.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      241.150.49.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      172.214.232.199.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      172.214.232.199.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      67.31.126.40.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      67.31.126.40.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      95.221.229.192.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      95.221.229.192.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      103.169.127.40.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      103.169.127.40.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      18.31.95.13.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      18.31.95.13.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      26.165.165.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      26.165.165.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      81.144.22.2.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      81.144.22.2.in-addr.arpa
      IN PTR
      Response
      81.144.22.2.in-addr.arpa
      IN PTR
      a2-22-144-81deploystaticakamaitechnologiescom
    • flag-us
      DNS
      19.229.111.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      19.229.111.52.in-addr.arpa
      IN PTR
      Response
    No results found
    • 8.8.8.8:53
      241.150.49.20.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      241.150.49.20.in-addr.arpa

    • 8.8.8.8:53
      172.214.232.199.in-addr.arpa
      dns
      74 B
      128 B
      1
      1

      DNS Request

      172.214.232.199.in-addr.arpa

    • 8.8.8.8:53
      67.31.126.40.in-addr.arpa
      dns
      71 B
      157 B
      1
      1

      DNS Request

      67.31.126.40.in-addr.arpa

    • 8.8.8.8:53
      95.221.229.192.in-addr.arpa
      dns
      73 B
      144 B
      1
      1

      DNS Request

      95.221.229.192.in-addr.arpa

    • 8.8.8.8:53
      103.169.127.40.in-addr.arpa
      dns
      73 B
      147 B
      1
      1

      DNS Request

      103.169.127.40.in-addr.arpa

    • 8.8.8.8:53
      18.31.95.13.in-addr.arpa
      dns
      70 B
      144 B
      1
      1

      DNS Request

      18.31.95.13.in-addr.arpa

    • 8.8.8.8:53
      26.165.165.52.in-addr.arpa
      dns
      72 B
      146 B
      1
      1

      DNS Request

      26.165.165.52.in-addr.arpa

    • 8.8.8.8:53
      81.144.22.2.in-addr.arpa
      dns
      70 B
      133 B
      1
      1

      DNS Request

      81.144.22.2.in-addr.arpa

    • 8.8.8.8:53
      19.229.111.52.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      19.229.111.52.in-addr.arpa

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Nashy.exe

      Filesize

      45KB

      MD5

      a8d5395595b37908a079df232c8a4e21

      SHA1

      71ee2211d1f45833f67a9344afc121208bc0eace

      SHA256

      078a9f9fcaa7a979575dfc8be7f2325715e2ab219a006035a4cded612d67af25

      SHA512

      829bc8c51c5d206831e1247f849698d547fcea5de8e3576eebdfa4c70b46f6992c7093fae1af19876b5a9dff4abb77dd31354e2c2648fd64ff5df754903f5328

    • memory/772-6-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/772-8-0x0000000010000000-0x0000000010013000-memory.dmp

      Filesize

      76KB

    • memory/772-13-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/772-14-0x0000000010000000-0x0000000010013000-memory.dmp

      Filesize

      76KB

    • memory/2068-0-0x0000000001000000-0x0000000001027000-memory.dmp

      Filesize

      156KB

    • memory/2068-1-0x0000000001001000-0x0000000001002000-memory.dmp

      Filesize

      4KB

    • memory/2068-16-0x0000000001000000-0x0000000001027000-memory.dmp

      Filesize

      156KB

    • memory/3464-9-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

      Filesize

      28KB

    • memory/3464-10-0x000000007FFD0000-0x000000007FFD1000-memory.dmp

      Filesize

      4KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.