Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    95s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/09/2024, 06:39

General

  • Target

    dbffdb476210d278e6f8ba1bbf6bf25c_JaffaCakes118.exe

  • Size

    717KB

  • MD5

    dbffdb476210d278e6f8ba1bbf6bf25c

  • SHA1

    cbbdb709b49664dcb291c526c10d6450ce4e5dac

  • SHA256

    a4cbe6c8132ece0824c88aec3f63ffd38b5f468028865542b3c057c66cd1e093

  • SHA512

    b4f1e621e0c088e59f0a7b4711e09338874c8b98734e8651f8501c951102cf33e8f991b73338730e8525b9c98f22cb6ba0ee90eb937413aa39d384a48eda8350

  • SSDEEP

    6144:bbVXmZfL3KXSapluBY6eC2VsJsG2CPRgcz9XbrE9N94xiI2XkIfroRD9evp5Y1fh:HVWZjYMYc2IgcxXbk6gXkSucch

Score
6/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dbffdb476210d278e6f8ba1bbf6bf25c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dbffdb476210d278e6f8ba1bbf6bf25c_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4972
    • C:\Program Files (x86)\internet explorer\iexplore.exe
      "C:\Program Files (x86)\internet explorer\iexplore.exe" "199.221.131.86/RequestHandler.ashx?MfcISAPICommand=installstatus&param=%58%00%01%00B8RppShaXz16gIKuMoGx-IfyPxYe8uM2t_rQcjFZcp7laxkswjfgqGu7nfbthglynGY1LbqE6B-xpAE93uAsVHp3SYja7yWETqWe2MwLpXUjIi7A_MItAm"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1896
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" "199.221.131.86/RequestHandler.ashx?MfcISAPICommand=installstatus&param=%58%00%01%00B8RppShaXz16gIKuMoGx-IfyPxYe8uM2t_rQcjFZcp7laxkswjfgqGu7nfbthglynGY1LbqE6B-xpAE93uAsVHp3SYja7yWETqWe2MwLpXUjIi7A_MItAm"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2868
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2868 CREDAT:17410 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          PID:4876
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 780
            5⤵
            • Program crash
            PID:3172
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4876 -ip 4876
    1⤵
      PID:4196

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads