Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2024, 17:25

General

  • Target

    ebd5d2e9b6d427c0a1486b1e0451d163_JaffaCakes118.exe

  • Size

    640KB

  • MD5

    ebd5d2e9b6d427c0a1486b1e0451d163

  • SHA1

    724226def939963715766f62b81e0b78d99a068d

  • SHA256

    7c7e02b9796d58e2f856b67f51a5f8bdac59e26dce62b57f70f3e70c62fd8d04

  • SHA512

    49158fada4a4178de25e69354cb9751599f114b03822716b82ddddd3d2e511745029acb335577b1fdfd9f7c247cae91c7c4562fd2bdd6ab185580580199c1a55

  • SSDEEP

    12288:JO5hD60H3gk2KKYaFywyQVZeJVQwF3Z4mxxD/YkHtc16EEhhpVyF:Y5hD60LO/VZbwQmXD/YkHS14DLyF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ebd5d2e9b6d427c0a1486b1e0451d163_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ebd5d2e9b6d427c0a1486b1e0451d163_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4856
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\uninstal.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2584
  • C:\Windows\msagent\agenter.exe
    C:\Windows\msagent\agenter.exe
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2744
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
      2⤵
        PID:4796

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\msagent\agenter.exe

      Filesize

      640KB

      MD5

      ebd5d2e9b6d427c0a1486b1e0451d163

      SHA1

      724226def939963715766f62b81e0b78d99a068d

      SHA256

      7c7e02b9796d58e2f856b67f51a5f8bdac59e26dce62b57f70f3e70c62fd8d04

      SHA512

      49158fada4a4178de25e69354cb9751599f114b03822716b82ddddd3d2e511745029acb335577b1fdfd9f7c247cae91c7c4562fd2bdd6ab185580580199c1a55

    • C:\Windows\uninstal.bat

      Filesize

      218B

      MD5

      a2c7385e55db633d4f2b69ab4ce51385

      SHA1

      94729b88188922a108e8324e9ef6d14c838cbfcc

      SHA256

      c4fb9c4f2fd8f50e1a26326da7b24922fc22ce41dd2601c6ccf4c8c3b714e0e6

      SHA512

      20898ff60b9dcdeee9d3438346a5d5c49dcfba8322f5346de62195cd4190809f67ff84fa83b937c52e9c6e4fa8224f23b61d7c69dbcebc0f192d1b0f3caf0aab

    • memory/2744-33-0x0000000000DE0000-0x0000000000E34000-memory.dmp

      Filesize

      336KB

    • memory/2744-32-0x0000000000400000-0x0000000000527000-memory.dmp

      Filesize

      1.2MB

    • memory/2744-24-0x0000000000400000-0x0000000000527000-memory.dmp

      Filesize

      1.2MB

    • memory/2744-25-0x0000000000DE0000-0x0000000000E34000-memory.dmp

      Filesize

      336KB

    • memory/4856-9-0x0000000002560000-0x0000000002561000-memory.dmp

      Filesize

      4KB

    • memory/4856-7-0x0000000002540000-0x0000000002541000-memory.dmp

      Filesize

      4KB

    • memory/4856-12-0x00000000034C0000-0x00000000034C3000-memory.dmp

      Filesize

      12KB

    • memory/4856-11-0x00000000034D0000-0x00000000034D1000-memory.dmp

      Filesize

      4KB

    • memory/4856-18-0x00000000034E0000-0x00000000034E1000-memory.dmp

      Filesize

      4KB

    • memory/4856-17-0x00000000034F0000-0x00000000034F1000-memory.dmp

      Filesize

      4KB

    • memory/4856-16-0x0000000003500000-0x0000000003501000-memory.dmp

      Filesize

      4KB

    • memory/4856-15-0x0000000000C80000-0x0000000000C81000-memory.dmp

      Filesize

      4KB

    • memory/4856-14-0x0000000000C70000-0x0000000000C71000-memory.dmp

      Filesize

      4KB

    • memory/4856-8-0x0000000002530000-0x0000000002531000-memory.dmp

      Filesize

      4KB

    • memory/4856-13-0x00000000035C0000-0x00000000035C1000-memory.dmp

      Filesize

      4KB

    • memory/4856-0-0x0000000000400000-0x0000000000527000-memory.dmp

      Filesize

      1.2MB

    • memory/4856-6-0x00000000024D0000-0x00000000024D1000-memory.dmp

      Filesize

      4KB

    • memory/4856-19-0x00000000026E0000-0x00000000026E1000-memory.dmp

      Filesize

      4KB

    • memory/4856-10-0x00000000024F0000-0x00000000024F1000-memory.dmp

      Filesize

      4KB

    • memory/4856-3-0x0000000002500000-0x0000000002501000-memory.dmp

      Filesize

      4KB

    • memory/4856-4-0x0000000002550000-0x0000000002551000-memory.dmp

      Filesize

      4KB

    • memory/4856-27-0x0000000002310000-0x0000000002364000-memory.dmp

      Filesize

      336KB

    • memory/4856-26-0x0000000000400000-0x0000000000527000-memory.dmp

      Filesize

      1.2MB

    • memory/4856-5-0x00000000024E0000-0x00000000024E1000-memory.dmp

      Filesize

      4KB

    • memory/4856-2-0x0000000002520000-0x0000000002521000-memory.dmp

      Filesize

      4KB

    • memory/4856-1-0x0000000002310000-0x0000000002364000-memory.dmp

      Filesize

      336KB