Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 15:19

General

  • Target

    eb9d712db4b0f8a173f6fd5c493c6c5d_JaffaCakes118.exe

  • Size

    312KB

  • MD5

    eb9d712db4b0f8a173f6fd5c493c6c5d

  • SHA1

    7683f50f60b9aac555c6e96774813de469e3c947

  • SHA256

    ec75806a9a46dcba221a1ec85e61bf1d76c0d28c800b56af7d042edcdc4e6b6c

  • SHA512

    c57d2a9fb7eabf7ddb9d7fd4fef255d1a64d4c1a7ebfc7eb84c32d3a09a32e2b6af99dac4e3c5554fe6d7a6acc7c815b7d00e215bf849034367fe01a1205c855

  • SSDEEP

    6144:CaUNxXFIZW84aKqRROWHKe4Df+DKt3MghUOr5dBbTI9B14R:Dmx13Rqnj4OKt8ghUyVbE

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb9d712db4b0f8a173f6fd5c493c6c5d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\eb9d712db4b0f8a173f6fd5c493c6c5d_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3640
    • C:\ProgramData\aCkHgImHbJg09100\aCkHgImHbJg09100.exe
      "C:\ProgramData\aCkHgImHbJg09100\aCkHgImHbJg09100.exe" "C:\Users\Admin\AppData\Local\Temp\eb9d712db4b0f8a173f6fd5c493c6c5d_JaffaCakes118.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:1264

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\aCkHgImHbJg09100\aCkHgImHbJg09100.exe

    Filesize

    312KB

    MD5

    df0f334e758b3ad54cc82594d78769a5

    SHA1

    3244fb0b4957c3c48897bf7a1d4b6b9942b61532

    SHA256

    6b72edd85ed47bd75ed120faf0abafc0348ca0fdb66fceaae6b8994b145618a4

    SHA512

    c704bf55b992cddd85e1868e1ab01d70ffb21920b11334f32bfbaecac8ed496c49b13b32075be0444f8fcccd48c07050225916326085886e6e9a27af8bb7dbf7

  • memory/1264-15-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB

  • memory/1264-34-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB

  • memory/1264-23-0x0000000000A00000-0x0000000000A01000-memory.dmp

    Filesize

    4KB

  • memory/1264-22-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB

  • memory/1264-14-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB

  • memory/1264-13-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB

  • memory/3640-3-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB

  • memory/3640-4-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB

  • memory/3640-20-0x00000000006A0000-0x00000000006A1000-memory.dmp

    Filesize

    4KB

  • memory/3640-21-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB

  • memory/3640-0-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB

  • memory/3640-2-0x00000000006A0000-0x00000000006A1000-memory.dmp

    Filesize

    4KB

  • memory/3640-1-0x0000000077CC3000-0x0000000077CC4000-memory.dmp

    Filesize

    4KB

  • memory/3640-41-0x0000000000400000-0x0000000000503000-memory.dmp

    Filesize

    1.0MB