Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/09/2024, 13:45

General

  • Target

    f623a222ff4ca68be361a4ca9ed975f4_JaffaCakes118.exe

  • Size

    124KB

  • MD5

    f623a222ff4ca68be361a4ca9ed975f4

  • SHA1

    5cc294b5fc85a4a9919f38fd4e6c9af8fe103b2b

  • SHA256

    04945ac63ae1a9e54bec7db2532c09d5e8354296f8b875b6ebb2b3e210a9a50c

  • SHA512

    b9398ce4c67fb8f99b193bb4afebff0cfbb157dfd8963552a9d21a4d54026593ad28da61509fd15de899e250a742ed1cb2a59f3aa1a7bc56daf235bb1fd17195

  • SSDEEP

    3072:z7dbGkiWPLAFqIHn7yXus+7Jlkz/GMexh89Mu:NqkivqOn8uT7e/GMuhEMu

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f623a222ff4ca68be361a4ca9ed975f4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f623a222ff4ca68be361a4ca9ed975f4_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1008
    • C:\Windows\SysWOW64\51b198.exe
      C:\Windows\system32\51b198.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1100
    • C:\Windows\SysWOW64\gggg27.exe
      C:\Windows\system32\gggg27.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3880
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1036,i,5469445176230119590,7931734017267321834,262144 --variations-seed-version --mojo-platform-channel-handle=3956 /prefetch:8
    1⤵
      PID:4644

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\51b198.exe

      Filesize

      28KB

      MD5

      b8cd4e2e545bf8a55375714b0479fcbc

      SHA1

      1dd7dd14aebe49f988515a1fc868c114f3e853af

      SHA256

      7b79f3ab2647f27b4e20a4a475b53ba4a40fbdedb772286b6578679ea8a73245

      SHA512

      1a24d90212f19e0ca55cc4f6b4d831deaff58c7600e3c9196a0b34c273b7ceced842725d50642d348df6787ec45251fbd807e5af96b61d84bc394caf0bc925cb

    • C:\Windows\SysWOW64\MSINET.OCX

      Filesize

      112KB

      MD5

      7bec181a21753498b6bd001c42a42722

      SHA1

      3249f233657dc66632c0539c47895bfcee5770cc

      SHA256

      73da54b69911bdd08ea8bbbd508f815ef7cfa59c4684d75c1c602252ec88ee31

      SHA512

      d671e25ae5e02a55f444d253f0e4a42af6a5362d9759fb243ad6d2c333976ab3e98669621ec0850ad915ee06acbe8e70d77b084128fc275462223f4f5ab401bc

    • C:\Windows\SysWOW64\MSWINSCK.OCX

      Filesize

      105KB

      MD5

      9484c04258830aa3c2f2a70eb041414c

      SHA1

      b242a4fb0e9dcf14cb51dc36027baff9a79cb823

      SHA256

      bf7e47c16d7e1c0e88534f4ef95e09d0fd821ed1a06b0d95a389b35364b63ff5

      SHA512

      9d0e9f0d88594746ba41ea4a61a53498619eda596e12d8ec37d01cfe8ceb08be13e3727c83d630a6d9e6d03066f62444bb94ea5a0d2ed9d21a270e612db532a0

    • C:\Windows\SysWOW64\gggg27.exe

      Filesize

      11KB

      MD5

      3a8c12fbdc005004714b8ba7cb65eb8c

      SHA1

      724c49a2ad6760cb5f918b2bbfa2b041181cda00

      SHA256

      c3811f0663fda0242ec114f4979dc921ce7c5d8698a3502f0cddac39c98d0a83

      SHA512

      629c439358985735f59942806bd0eb220c4a957059df303229e2700eefce0a48ed1b971ae8b0f31b61cecb4415ac5e7d5caabc750d59af66855f039e262e97a3