Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/09/2024, 18:01

General

  • Target

    de9f3f3fde903ad30e122fdd71ae7bab_JaffaCakes118.exe

  • Size

    130KB

  • MD5

    de9f3f3fde903ad30e122fdd71ae7bab

  • SHA1

    3879316b3a5e99ff0e8b69f9c3ee58f8cf706e31

  • SHA256

    46db75d61d9cb7aa6e22b6dbedb29c301d10612518384aa4cc5dae63253d193d

  • SHA512

    2544baa6fa1600ca47376cdcd274b65c7f611abad5d52ab1e091c71189f1aba634a4c7f62ee893b8f0986657ed5d64e039eaa7aa619e7ef18ed1baaf90128b1f

  • SSDEEP

    3072:51B31bdBob2QXsFKVTx0QwH9dT7JuucVUoHkQKfZf:5731bdBaBsFGx0QwddPJurV8fZf

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\de9f3f3fde903ad30e122fdd71ae7bab_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\de9f3f3fde903ad30e122fdd71ae7bab_JaffaCakes118.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    PID:1552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\RCX6F1.tmp

    Filesize

    62KB

    MD5

    c28efdd834ed453de90e550a8052f4b6

    SHA1

    1b4bd9e6b5254afdffa1d67e4f7f41fd320baee3

    SHA256

    ef1d62466f858e8f95d22c09679542c14ed2e711b64c7c75f5dd9edbd6da0ce3

    SHA512

    650ddc81119bf722a1af9ad01b5b76997b7cdcd075ea1a34f60ddc14902f1d0238eb8c272e83cefa2ee9f840097daedbe230049a1e7a7c1427ab9fcab30c1d47

  • C:\Windows\SysWOW64\xdccPrograms\7zFM.exe

    Filesize

    930KB

    MD5

    88b53bc75de739d744a0d8b8a7a88f68

    SHA1

    93641f38588c47b63957138525e49eeeaa4fbc62

    SHA256

    af1a4f394c503333750fa60cce5962132826c78c65086cde2c87519ef5872fb6

    SHA512

    4cfbd44c53381ccf36d2ffaa27c9e72dd082dde1958c0f5bbdd969c5500e7c582e4fa251a83a80955979bc352212f496de4fa188cd4eaea3f3eb213d7a474b8b

  • memory/1552-92-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1552-89-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1552-90-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1552-91-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1552-23-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1552-93-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1552-94-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1552-95-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1552-96-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1552-97-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/1552-98-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB