Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/09/2024, 14:23

General

  • Target

    f6345e3b45591ab9a44d724c0ff8656d_JaffaCakes118.exe

  • Size

    400KB

  • MD5

    f6345e3b45591ab9a44d724c0ff8656d

  • SHA1

    bf2174b48daeadb6066eabc1f518eeb510aee516

  • SHA256

    a8fb90b6a1068f695e0ea092262e4a6085300e9f3dafc57da48bee837ec353a3

  • SHA512

    63145c5bbb265dbcbe52698f7ef9cd3bc5ed43944a1abb7577286cdc94874e25164f1a19bf5376f37a22b579b7ee2ad7862b1d546a11045fd423e90bfc003c95

  • SSDEEP

    6144:4jlYKRF/LReWAsUypbJmVYCdkssUoUdi9lruFvbj8h+V7PiA+mfWIDz51x8zN:4jauDReW74VHWIDz51eJ

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6345e3b45591ab9a44d724c0ff8656d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f6345e3b45591ab9a44d724c0ff8656d_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4936
    • C:\ProgramData\oamlt.exe
      "C:\ProgramData\oamlt.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:1936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Documents and Settings .exe

    Filesize

    400KB

    MD5

    3ae7d9edfcef02abdb3e3da53fb3c9fd

    SHA1

    a379758a4503f64a43f376006b330426d8a9c81c

    SHA256

    fce98590a7ac93a352aed12a3e71783324f805175fb018f8dbdf1579fd3b76ab

    SHA512

    5c5239caa3a622ce37b19a8afce838a3fb6c330bbdd6a9a3d778bda2d1afa1da59f4a11b21d8cf31ddbe3e3becf751ea60dd82f815a139ea02e3b08bf256a9b5

  • C:\ProgramData\Saaaalamm\Mira.h

    Filesize

    136KB

    MD5

    cb4c442a26bb46671c638c794bf535af

    SHA1

    8a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf

    SHA256

    f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25

    SHA512

    074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3

  • C:\ProgramData\oamlt.exe

    Filesize

    263KB

    MD5

    b597ad67bd40b2f00abd84b7ec4aa313

    SHA1

    03abc6ec09d3ed9b4cedb32760567d9034112a1a

    SHA256

    25c865dade39525301059a9f97c3bdd783b3e2f552eca0c97c9609180a63f1e1

    SHA512

    989bcea7ae2fca0038e09ba6e5a8df080ccaa60e1554e22ff6f82a57444e95281350df8f95e9930404e7d203b9ca3b262117ab6b0eb4753a48e66b5fad8272ae

  • memory/1936-130-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/1936-313-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/4936-0-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/4936-1-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/4936-9-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB