Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/09/2024, 19:57

General

  • Target

    f6c1ac8f3c9d3b2f3ae2658a01918bff_JaffaCakes118.exe

  • Size

    422KB

  • MD5

    f6c1ac8f3c9d3b2f3ae2658a01918bff

  • SHA1

    6f42164711fcc6bad9ec2d984132f11f2a2fd148

  • SHA256

    28b7e3595512cd3dcab0153907b3f318d062efa59f0cbfb80d0212c7e4e8ce15

  • SHA512

    5ac7e498675ad147cd4ae81b1484d8c7571eac1dcd2b7312d991ee45f15aab69acafdc6814eac91e1721c0144324dfd3d728dd0afbdd3b00e12efd5e7fdad3a6

  • SSDEEP

    12288:7b2/pTtDN26J9yS4QiTLwLOC1ojBuzolNQ+AWK:G0y9yS4QAwLOFjIENQ+C

Score
7/10

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 5 IoCs
  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6c1ac8f3c9d3b2f3ae2658a01918bff_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f6c1ac8f3c9d3b2f3ae2658a01918bff_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:384
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 384 -s 384
      2⤵
      • Program crash
      PID:2328
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\system32\Deleteme.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2672
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 384 -ip 384
    1⤵
      PID:4224
    • C:\Windows\SysWOW64\Server.exe
      C:\Windows\SysWOW64\Server.exe
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      PID:2904
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 372
        2⤵
        • Program crash
        PID:3396
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2904 -ip 2904
      1⤵
        PID:2684

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\SysWOW64\Deleteme.bat

        Filesize

        212B

        MD5

        55da017ae1aef50d23ef817393a76458

        SHA1

        30b376cd73bc0f2affd1882fd436c48833e8d6fc

        SHA256

        5b1b5ccdf9c4c71df935c86497a62539771bed86e79ba1c3aadc4ffbbd1d08d1

        SHA512

        bac9f100472e37137560b72a354f7ceb97e41baa860a9e5d69112b9c954fc8579fd27cb3de18b7f6f699bfee40e781db2ee83cba5570d866afbfa1c6f654652a

      • C:\Windows\SysWOW64\Server.exe

        Filesize

        422KB

        MD5

        f6c1ac8f3c9d3b2f3ae2658a01918bff

        SHA1

        6f42164711fcc6bad9ec2d984132f11f2a2fd148

        SHA256

        28b7e3595512cd3dcab0153907b3f318d062efa59f0cbfb80d0212c7e4e8ce15

        SHA512

        5ac7e498675ad147cd4ae81b1484d8c7571eac1dcd2b7312d991ee45f15aab69acafdc6814eac91e1721c0144324dfd3d728dd0afbdd3b00e12efd5e7fdad3a6

      • memory/384-6-0x0000000002350000-0x0000000002351000-memory.dmp

        Filesize

        4KB

      • memory/384-5-0x00000000022E0000-0x00000000022E1000-memory.dmp

        Filesize

        4KB

      • memory/384-14-0x0000000003310000-0x0000000003311000-memory.dmp

        Filesize

        4KB

      • memory/384-11-0x00000000032C0000-0x00000000032C2000-memory.dmp

        Filesize

        8KB

      • memory/384-10-0x00000000032D0000-0x00000000032D1000-memory.dmp

        Filesize

        4KB

      • memory/384-9-0x0000000002300000-0x0000000002301000-memory.dmp

        Filesize

        4KB

      • memory/384-8-0x0000000002370000-0x0000000002371000-memory.dmp

        Filesize

        4KB

      • memory/384-7-0x0000000002340000-0x0000000002341000-memory.dmp

        Filesize

        4KB

      • memory/384-0-0x0000000002100000-0x0000000002154000-memory.dmp

        Filesize

        336KB

      • memory/384-15-0x00000000020A0000-0x00000000020A1000-memory.dmp

        Filesize

        4KB

      • memory/384-4-0x00000000022F0000-0x00000000022F1000-memory.dmp

        Filesize

        4KB

      • memory/384-3-0x0000000002360000-0x0000000002361000-memory.dmp

        Filesize

        4KB

      • memory/384-2-0x0000000002310000-0x0000000002311000-memory.dmp

        Filesize

        4KB

      • memory/384-1-0x0000000002330000-0x0000000002331000-memory.dmp

        Filesize

        4KB

      • memory/384-16-0x00000000020B0000-0x00000000020B1000-memory.dmp

        Filesize

        4KB

      • memory/384-17-0x00000000032E0000-0x00000000032E1000-memory.dmp

        Filesize

        4KB

      • memory/384-23-0x0000000000400000-0x0000000000488000-memory.dmp

        Filesize

        544KB

      • memory/384-24-0x0000000002100000-0x0000000002154000-memory.dmp

        Filesize

        336KB

      • memory/2904-20-0x0000000000400000-0x0000000000488000-memory.dmp

        Filesize

        544KB