Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/09/2024, 03:51

General

  • Target

    dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe

  • Size

    293KB

  • MD5

    dbc292a2292c6061700236830d45ca91

  • SHA1

    fcdfba4b95c145a715209d694639de6be0478f6b

  • SHA256

    e60fc4473ada26f3a8d2dd5c5f226441073bf86737e271f6f2ec61324ef9ab60

  • SHA512

    551e097fb31a5e7a6b6ecf602f7ae8cb63dc620940fe47b003ebcafcedbfdb391731cfce399b48111ee9524f2272f53eb4076c84f65e377336930fd6b3c3e0fe

  • SSDEEP

    6144:6qcbmoTtMUxxzP75a2eoEnnZcYupty6DPlQ82hmbN:6NTTyUX/5a2NGZcTs6DPlahmbN

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Modifies registry class 23 IoCs
  • Runs regedit.exe 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dbc292a2292c6061700236830d45ca91_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks computer location settings
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1856
    • C:\Windows\SysWOW64\regedit.exe
      regedit.exe /s "C:\Users\Admin\AppData\Local\Temp\\\36.ini"
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Runs regedit.exe
      PID:4388
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\srun22.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4120
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3516
      • C:\Windows\SysWOW64\cacls.exe
        cacls "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\╞⌠╢» Internet Explorer Σ»└└╞≈.lnk" /G Everyone:R /C
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\36.ini

    Filesize

    139B

    MD5

    bb454b063043f484326575ce60d587c1

    SHA1

    cac3171df8fc25526a82356ed53f1c45a86167be

    SHA256

    838a54026108ff550f5d3c425cf7852abea41882590863e423cf9e94573dc11f

    SHA512

    8c86e46eea787025937204f93738c02f1d5268c19e20126d86df5f1bb3d15367935b3f23e5c6c482b462ac79dbbcc87b38a952a3a8567bf9a3cff2a68ab92099

  • C:\Users\Admin\AppData\Local\Temp\srun22.bat

    Filesize

    191B

    MD5

    ea4a53c540281f0999211d094132d387

    SHA1

    c66efbe3dcad0e6b54dc7e4916dffb2f482b4552

    SHA256

    bd5b15a14844a404d657174b70a106f4d1d5b651be94ed2ff5707cecb340fcdd

    SHA512

    97a0de90788f267a9b0c6c63c84edf0f714d4519a1d308a54f76403e7590b53c829fbb1b4a873c8ad3683cecc58f13e69d7dcd462f3d10001808ef60c886c2fe

  • C:\Windows\SysWOW64\PnkB.exe

    Filesize

    293KB

    MD5

    4fabbf59a743e4f14d790757aaefdc46

    SHA1

    93d3ca31986430c1bad8e7a9cf1c47594afbfb20

    SHA256

    9e3765d54dddaa165aba77839b3a45ab8010b98581dc5f75d684bea1550292c6

    SHA512

    5869837d7f9e96f3cdd9b8453a76f4b933e0b3dcb29dad4e4ed48e6ba85fd6ce9a4edbd2929dc7c39a567bf1e0fe43e36a02ff597f3c23d184ff84f8ff16a3c2

  • memory/1856-0-0x0000000002390000-0x0000000002391000-memory.dmp

    Filesize

    4KB

  • memory/1856-16-0x0000000000400000-0x00000000004C8000-memory.dmp

    Filesize

    800KB