Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/09/2024, 03:49

General

  • Target

    dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe

  • Size

    56KB

  • MD5

    dbc24cc44d3682623968b01659fba77c

  • SHA1

    38890157e7e892072c2d66c3687c203e1df5523d

  • SHA256

    ea39f5f38bd536757c0f1ec97db474300de7040b3c3f0829d35d4cc8ca140de8

  • SHA512

    9b487798442f98ce92b4933618073d0a6fd7c8c39e65debc8a80e08eb2a182126d6913cb072269c6f2efbfc7647c36a274e0fdcf8485fd41474f6d01040da8aa

  • SSDEEP

    1536:E0nuJ0pmaxxtP8S5y7xcAzzZFQXV8zm6mWY:E0uJ0caxT8A+vzgyzHmH

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Event Triggered Execution: AppInit DLLs 1 TTPs

    Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

  • Executes dropped EXE 2 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in System32 directory 3 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 29 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 8 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Windows\SysWOW64\net.exe
      net stop "Security Center"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1840
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop "Security Center"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4848
    • C:\Windows\SysWOW64\net.exe
      net stop "Windows FirewaLL/iNTERNET cONNECTION sHARING (ics)"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1648
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop "Windows FirewaLL/iNTERNET cONNECTION sHARING (ics)"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2640
    • C:\Windows\SysWOW64\NET.exe
      NET STOP sYSTEM rESTORE sERVICE
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4036
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 STOP sYSTEM rESTORE sERVICE
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4152
    • C:\Windows\SysWOW64\sc.exe
      sc config NOD32krn start= disabled
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:224
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /im nod32krn.exe /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2240
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /im nod32kui.exe /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1996
    • C:\Windows\SysWOW64\sc.exe
      sc config ekrn start= disabled
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:1828
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /im ekrn.exe /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1892
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /im egui.exe /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:3224
    • C:\Windows\SysWOW64\net.exe
      net stop "Security Center"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2012
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop "Security Center"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:5080
    • C:\Windows\SysWOW64\net.exe
      net stop "Windows FirewaLL/iNTERNET cONNECTION sHARING (ics)"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:452
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop "Windows FirewaLL/iNTERNET cONNECTION sHARING (ics)"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3776
    • C:\Windows\SysWOW64\NET.exe
      NET STOP sYSTEM rESTORE sERVICE
      2⤵
      • System Location Discovery: System Language Discovery
      PID:980
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 STOP sYSTEM rESTORE sERVICE
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1060
    • C:\Windows\SysWOW64\sc.exe
      sc config NOD32krn start= disabled
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:1908
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /im nod32krn.exe /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2916
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /im nod32kui.exe /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:4900
    • C:\Windows\SysWOW64\sc.exe
      sc config ekrn start= disabled
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:1984
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /im ekrn.exe /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1896
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /im egui.exe /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1664
    • C:\Users\Admin\AppData\Local\Temp\SETUP.EXE
      C:\Users\Admin\AppData\Local\Temp\SETUP.EXE
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3916
      • C:\Windows\SysWOW64\svteppsk.exe
        C:\Windows\system32\svteppsk.exe ˜‰
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3276
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\SETUP.EXE.bat
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2888
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c del C:\avp.exe
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\SETUP.EXE

    Filesize

    11KB

    MD5

    736514b0622bb734aebe6071b4eda0fb

    SHA1

    386254bf5d0cab858a9c17731ceaa5f9880516f3

    SHA256

    208d4dabe00abec15c53a97ede69fa5a347f37ffcef1754ef31c8cce1490ca9a

    SHA512

    fb969dfaedce396d25ac4709d2ecf1fc16a7fffc9cdbb8a799a340d57f57ae543daf985378da8f7565f6d907c75a8cfa480eb49e582e1dc794e51037a7c704cb

  • C:\Users\Admin\AppData\Local\Temp\SETUP.EXE.bat

    Filesize

    128B

    MD5

    c42148a730cc3231cdc421c30033516c

    SHA1

    d80ff4d040369eed0cf83cd6b1ec8647874463c0

    SHA256

    c324b1277868440049c34e99429f60825ec73fbc818fb1a15d0ffb8ab0a879a7

    SHA512

    36ffd9dbba49fe51a5d6f96408127710821f99edc27954a8a78c94994061f1e7365b994428cd5bb3abe4d75421555b2509719737bde0d52d2c973fbe9771d494

  • memory/3276-12-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/3916-4-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/3916-10-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB