Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/09/2024, 00:42 UTC

General

  • Target

    db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    db83044597e2b12bd8cf9a12d4870cce

  • SHA1

    ead58ccb73af8b47bcdce50eb43525d3d5aea65e

  • SHA256

    9b3acae6a6738003aa758af3e6a7c17164fb8f97b83df395a06d74e642db6992

  • SHA512

    f61071eee3c48ac15769f8f850cb7eddf0dc47b9ca4a281cdc0af81b72bc5190099d01b126145d1a1ed0e5c7e3b33878d0a81b1d038372e44fa356db281cd8ea

  • SSDEEP

    24576:uUZVeIOWJRH814FaLwNAQUQjC05y37G9vH9XimKJY85iMUEIs7YuPCp7Bb/W/+lU:uUZgduRutLwOcjCD36f9XimKJYGtTap4

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 8 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3396
      • C:\Users\Admin\AppData\Local\Temp\db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe"
        2⤵
        • Adds Run key to start application
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4804
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\D.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\D.exe
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4544

    Network

    • flag-us
      DNS
      8.8.8.8.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      8.8.8.8.in-addr.arpa
      IN PTR
      Response
      8.8.8.8.in-addr.arpa
      IN PTR
      dnsgoogle
    • flag-us
      DNS
      104.219.191.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      104.219.191.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      25.140.123.92.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      25.140.123.92.in-addr.arpa
      IN PTR
      Response
      25.140.123.92.in-addr.arpa
      IN PTR
      a92-123-140-25deploystaticakamaitechnologiescom
    • flag-us
      DNS
      22.160.190.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      22.160.190.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      95.221.229.192.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      95.221.229.192.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      86.23.85.13.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      86.23.85.13.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      15.164.165.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      15.164.165.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      172.214.232.199.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      172.214.232.199.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      240.143.123.92.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      240.143.123.92.in-addr.arpa
      IN PTR
      Response
      240.143.123.92.in-addr.arpa
      IN PTR
      a92-123-143-240deploystaticakamaitechnologiescom
    • flag-us
      DNS
      31.243.111.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      31.243.111.52.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      130.109.69.13.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      130.109.69.13.in-addr.arpa
      IN PTR
      Response
    No results found
    • 8.8.8.8:53
      8.8.8.8.in-addr.arpa
      dns
      66 B
      90 B
      1
      1

      DNS Request

      8.8.8.8.in-addr.arpa

    • 8.8.8.8:53
      104.219.191.52.in-addr.arpa
      dns
      73 B
      147 B
      1
      1

      DNS Request

      104.219.191.52.in-addr.arpa

    • 8.8.8.8:53
      25.140.123.92.in-addr.arpa
      dns
      72 B
      137 B
      1
      1

      DNS Request

      25.140.123.92.in-addr.arpa

    • 8.8.8.8:53
      22.160.190.20.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      22.160.190.20.in-addr.arpa

    • 8.8.8.8:53
      95.221.229.192.in-addr.arpa
      dns
      73 B
      144 B
      1
      1

      DNS Request

      95.221.229.192.in-addr.arpa

    • 8.8.8.8:53
      86.23.85.13.in-addr.arpa
      dns
      70 B
      144 B
      1
      1

      DNS Request

      86.23.85.13.in-addr.arpa

    • 8.8.8.8:53
      15.164.165.52.in-addr.arpa
      dns
      72 B
      146 B
      1
      1

      DNS Request

      15.164.165.52.in-addr.arpa

    • 8.8.8.8:53
      172.214.232.199.in-addr.arpa
      dns
      74 B
      128 B
      1
      1

      DNS Request

      172.214.232.199.in-addr.arpa

    • 8.8.8.8:53
      240.143.123.92.in-addr.arpa
      dns
      73 B
      139 B
      1
      1

      DNS Request

      240.143.123.92.in-addr.arpa

    • 8.8.8.8:53
      31.243.111.52.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      31.243.111.52.in-addr.arpa

    • 8.8.8.8:53
      130.109.69.13.in-addr.arpa
      dns
      72 B
      146 B
      1
      1

      DNS Request

      130.109.69.13.in-addr.arpa

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\D.exe

      Filesize

      31KB

      MD5

      7efc387017221960ae741fb41186c3ed

      SHA1

      9e7ee2862559f0387b5995fce5a2c9819b9cdecf

      SHA256

      1dcbf21d4b5195c84e8776ef179c9d74c7f2f55fef3300ca841b634a722e3ede

      SHA512

      31845d75fb72514f59c637138af45d1adc6e7b1f5a02ecb86aa8c8d94f0c5cc47ccf1fd54522aa3e9d0293415a581252c394ce17d44b3044a5480f12af01e0ed

    • memory/3396-19-0x000000007FFD0000-0x000000007FFD1000-memory.dmp

      Filesize

      4KB

    • memory/3396-18-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

      Filesize

      28KB

    • memory/4544-22-0x0000000010000000-0x0000000010013000-memory.dmp

      Filesize

      76KB

    • memory/4544-17-0x0000000010000000-0x0000000010013000-memory.dmp

      Filesize

      76KB

    • memory/4544-16-0x0000000000400000-0x0000000000408960-memory.dmp

      Filesize

      34KB

    • memory/4804-5-0x0000000001000000-0x000000000113F000-memory.dmp

      Filesize

      1.2MB

    • memory/4804-6-0x0000000001000000-0x000000000113F000-memory.dmp

      Filesize

      1.2MB

    • memory/4804-8-0x0000000001000000-0x000000000113F000-memory.dmp

      Filesize

      1.2MB

    • memory/4804-13-0x0000000001000000-0x000000000113F000-memory.dmp

      Filesize

      1.2MB

    • memory/4804-11-0x0000000001000000-0x000000000113F000-memory.dmp

      Filesize

      1.2MB

    • memory/4804-7-0x0000000001000000-0x000000000113F000-memory.dmp

      Filesize

      1.2MB

    • memory/4804-4-0x0000000001000000-0x000000000113F000-memory.dmp

      Filesize

      1.2MB

    • memory/4804-0-0x0000000001001000-0x0000000001003000-memory.dmp

      Filesize

      8KB

    • memory/4804-3-0x0000000001000000-0x000000000113F000-memory.dmp

      Filesize

      1.2MB

    • memory/4804-1-0x0000000001000000-0x000000000113F000-memory.dmp

      Filesize

      1.2MB

    • memory/4804-2-0x0000000001000000-0x000000000113F000-memory.dmp

      Filesize

      1.2MB

    • memory/4804-23-0x0000000001000000-0x000000000113F000-memory.dmp

      Filesize

      1.2MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.