Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/09/2024, 00:42

General

  • Target

    db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe

  • Size

    1.2MB

  • MD5

    db83044597e2b12bd8cf9a12d4870cce

  • SHA1

    ead58ccb73af8b47bcdce50eb43525d3d5aea65e

  • SHA256

    9b3acae6a6738003aa758af3e6a7c17164fb8f97b83df395a06d74e642db6992

  • SHA512

    f61071eee3c48ac15769f8f850cb7eddf0dc47b9ca4a281cdc0af81b72bc5190099d01b126145d1a1ed0e5c7e3b33878d0a81b1d038372e44fa356db281cd8ea

  • SSDEEP

    24576:uUZVeIOWJRH814FaLwNAQUQjC05y37G9vH9XimKJY85iMUEIs7YuPCp7Bb/W/+lU:uUZgduRutLwOcjCD36f9XimKJYGtTap4

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 8 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3396
      • C:\Users\Admin\AppData\Local\Temp\db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\db83044597e2b12bd8cf9a12d4870cce_JaffaCakes118.exe"
        2⤵
        • Adds Run key to start application
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4804
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\D.exe
          C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\D.exe
          3⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4544

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\D.exe

      Filesize

      31KB

      MD5

      7efc387017221960ae741fb41186c3ed

      SHA1

      9e7ee2862559f0387b5995fce5a2c9819b9cdecf

      SHA256

      1dcbf21d4b5195c84e8776ef179c9d74c7f2f55fef3300ca841b634a722e3ede

      SHA512

      31845d75fb72514f59c637138af45d1adc6e7b1f5a02ecb86aa8c8d94f0c5cc47ccf1fd54522aa3e9d0293415a581252c394ce17d44b3044a5480f12af01e0ed

    • memory/3396-19-0x000000007FFD0000-0x000000007FFD1000-memory.dmp

      Filesize

      4KB

    • memory/3396-18-0x000000007FFF0000-0x000000007FFF7000-memory.dmp

      Filesize

      28KB

    • memory/4544-22-0x0000000010000000-0x0000000010013000-memory.dmp

      Filesize

      76KB

    • memory/4544-17-0x0000000010000000-0x0000000010013000-memory.dmp

      Filesize

      76KB

    • memory/4544-16-0x0000000000400000-0x0000000000408960-memory.dmp

      Filesize

      34KB

    • memory/4804-5-0x0000000001000000-0x000000000113F000-memory.dmp

      Filesize

      1.2MB

    • memory/4804-6-0x0000000001000000-0x000000000113F000-memory.dmp

      Filesize

      1.2MB

    • memory/4804-8-0x0000000001000000-0x000000000113F000-memory.dmp

      Filesize

      1.2MB

    • memory/4804-13-0x0000000001000000-0x000000000113F000-memory.dmp

      Filesize

      1.2MB

    • memory/4804-11-0x0000000001000000-0x000000000113F000-memory.dmp

      Filesize

      1.2MB

    • memory/4804-7-0x0000000001000000-0x000000000113F000-memory.dmp

      Filesize

      1.2MB

    • memory/4804-4-0x0000000001000000-0x000000000113F000-memory.dmp

      Filesize

      1.2MB

    • memory/4804-0-0x0000000001001000-0x0000000001003000-memory.dmp

      Filesize

      8KB

    • memory/4804-3-0x0000000001000000-0x000000000113F000-memory.dmp

      Filesize

      1.2MB

    • memory/4804-1-0x0000000001000000-0x000000000113F000-memory.dmp

      Filesize

      1.2MB

    • memory/4804-2-0x0000000001000000-0x000000000113F000-memory.dmp

      Filesize

      1.2MB

    • memory/4804-23-0x0000000001000000-0x000000000113F000-memory.dmp

      Filesize

      1.2MB