Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/09/2024, 12:24

General

  • Target

    e91bfaf6436c8e7cea12d5c4e7dd41cb_JaffaCakes118.exe

  • Size

    241KB

  • MD5

    e91bfaf6436c8e7cea12d5c4e7dd41cb

  • SHA1

    cc890aef4bfa783860401a4888c4c5a8f6b99889

  • SHA256

    d58c0807d9e47a1aa642cfcddc849d76608cbe8e9e8cb8604f47db93f54f1a59

  • SHA512

    f501f31c3d1d3215485fa204eebdb3885efd35cd62a8236ca76452328abd1d95ae232e876e0d0d4ff3680a14f9d5b394920ff6fb2034d17da5cd64f440bebaff

  • SSDEEP

    6144:WbTo8mhn+TupXuBPhhDZ2NllBzuTnDuwX5:zLnuPhhsNrBcDuwX5

Score
3/10

Malware Config

Signatures

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e91bfaf6436c8e7cea12d5c4e7dd41cb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e91bfaf6436c8e7cea12d5c4e7dd41cb_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2780
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2780 -s 464
      2⤵
      • Program crash
      PID:4976
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2780 -s 472
      2⤵
      • Program crash
      PID:3132
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2780 -ip 2780
    1⤵
      PID:3736
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2780 -ip 2780
      1⤵
        PID:904

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2780-0-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB