Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/09/2024, 13:06

General

  • Target

    fa75201150e65da4c9ca4b2918fda8c0_JaffaCakes118.exe

  • Size

    634KB

  • MD5

    fa75201150e65da4c9ca4b2918fda8c0

  • SHA1

    21134f1d7070d5523f7a5ac111f5c58065e49706

  • SHA256

    0ab1285578f78e68b432e02381b9657be60207ffeb7608a7f810ec4d58ce00fb

  • SHA512

    97180f7214485449cd1c16a6350b10644002447f210d9b30e4a26885a206c0820c01a9605dde8127874cb4122fd717a72b24a568cf23ebfb7b800fe44b5ffc28

  • SSDEEP

    12288:QwwSUjd9p3KRRLPI5ES7HcPhoF3Z4mxxmDqVTVOC6e:vaFwS78PmQmXFVTzT

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa75201150e65da4c9ca4b2918fda8c0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fa75201150e65da4c9ca4b2918fda8c0_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:384
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\uninstal.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3596
  • C:\Windows\Hacker.com.cn.exe
    C:\Windows\Hacker.com.cn.exe
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2340

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Hacker.com.cn.exe

    Filesize

    634KB

    MD5

    fa75201150e65da4c9ca4b2918fda8c0

    SHA1

    21134f1d7070d5523f7a5ac111f5c58065e49706

    SHA256

    0ab1285578f78e68b432e02381b9657be60207ffeb7608a7f810ec4d58ce00fb

    SHA512

    97180f7214485449cd1c16a6350b10644002447f210d9b30e4a26885a206c0820c01a9605dde8127874cb4122fd717a72b24a568cf23ebfb7b800fe44b5ffc28

  • C:\Windows\uninstal.bat

    Filesize

    218B

    MD5

    c411046316e4218f4f196e685d6ef047

    SHA1

    afc26ffcc646587c1f3aba082899444e79c196a0

    SHA256

    35b629c856ca7a0a244ae63b1cd2e2e53733f1bb55c13912ecbdc8366479cccb

    SHA512

    d10507200e4b86c941f89932f52eecdd9667cf7516e7dc1ef1fae3396328e0365498efe21d095c211bc05d912bc6c7153e1ffee8a3e64a9d0259131f15ae1aa8

  • memory/384-0-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/384-1-0x00000000022D0000-0x0000000002324000-memory.dmp

    Filesize

    336KB

  • memory/384-34-0x00000000034B0000-0x00000000034B3000-memory.dmp

    Filesize

    12KB

  • memory/384-33-0x00000000034B0000-0x00000000034B1000-memory.dmp

    Filesize

    4KB

  • memory/384-32-0x00000000034B0000-0x00000000034B1000-memory.dmp

    Filesize

    4KB

  • memory/384-31-0x00000000034B0000-0x00000000034B1000-memory.dmp

    Filesize

    4KB

  • memory/384-30-0x00000000034B0000-0x00000000034B1000-memory.dmp

    Filesize

    4KB

  • memory/384-29-0x00000000034B0000-0x00000000034B1000-memory.dmp

    Filesize

    4KB

  • memory/384-41-0x00000000026D0000-0x00000000026D1000-memory.dmp

    Filesize

    4KB

  • memory/384-40-0x00000000034C0000-0x00000000034C1000-memory.dmp

    Filesize

    4KB

  • memory/384-39-0x00000000034D0000-0x00000000034D1000-memory.dmp

    Filesize

    4KB

  • memory/384-38-0x00000000034E0000-0x00000000034E1000-memory.dmp

    Filesize

    4KB

  • memory/384-37-0x00000000034F0000-0x00000000034F1000-memory.dmp

    Filesize

    4KB

  • memory/384-36-0x0000000002280000-0x0000000002281000-memory.dmp

    Filesize

    4KB

  • memory/384-35-0x0000000002270000-0x0000000002271000-memory.dmp

    Filesize

    4KB

  • memory/384-28-0x00000000034B0000-0x00000000034B1000-memory.dmp

    Filesize

    4KB

  • memory/384-27-0x00000000034B0000-0x00000000034B1000-memory.dmp

    Filesize

    4KB

  • memory/384-26-0x00000000023B0000-0x00000000023B1000-memory.dmp

    Filesize

    4KB

  • memory/384-25-0x00000000034B0000-0x00000000034B1000-memory.dmp

    Filesize

    4KB

  • memory/384-24-0x00000000035B0000-0x00000000035B1000-memory.dmp

    Filesize

    4KB

  • memory/384-23-0x00000000035B0000-0x00000000035B1000-memory.dmp

    Filesize

    4KB

  • memory/384-22-0x00000000035B0000-0x00000000035B1000-memory.dmp

    Filesize

    4KB

  • memory/384-21-0x00000000035B0000-0x00000000035B1000-memory.dmp

    Filesize

    4KB

  • memory/384-20-0x00000000035B0000-0x00000000035B1000-memory.dmp

    Filesize

    4KB

  • memory/384-19-0x00000000034B0000-0x00000000034B1000-memory.dmp

    Filesize

    4KB

  • memory/384-18-0x00000000034C0000-0x00000000034C1000-memory.dmp

    Filesize

    4KB

  • memory/384-17-0x00000000034C0000-0x00000000034C1000-memory.dmp

    Filesize

    4KB

  • memory/384-16-0x00000000034C0000-0x00000000034C1000-memory.dmp

    Filesize

    4KB

  • memory/384-15-0x00000000034C0000-0x00000000034C1000-memory.dmp

    Filesize

    4KB

  • memory/384-14-0x00000000034C0000-0x00000000034C1000-memory.dmp

    Filesize

    4KB

  • memory/384-13-0x00000000034C0000-0x00000000034C1000-memory.dmp

    Filesize

    4KB

  • memory/384-12-0x00000000034C0000-0x00000000034C1000-memory.dmp

    Filesize

    4KB

  • memory/384-11-0x00000000034C0000-0x00000000034C1000-memory.dmp

    Filesize

    4KB

  • memory/384-10-0x00000000034B0000-0x00000000035B0000-memory.dmp

    Filesize

    1024KB

  • memory/384-9-0x00000000023D0000-0x00000000023D1000-memory.dmp

    Filesize

    4KB

  • memory/384-8-0x0000000002550000-0x0000000002551000-memory.dmp

    Filesize

    4KB

  • memory/384-7-0x0000000002520000-0x0000000002521000-memory.dmp

    Filesize

    4KB

  • memory/384-6-0x0000000002530000-0x0000000002531000-memory.dmp

    Filesize

    4KB

  • memory/384-5-0x00000000023C0000-0x00000000023C1000-memory.dmp

    Filesize

    4KB

  • memory/384-4-0x0000000002540000-0x0000000002541000-memory.dmp

    Filesize

    4KB

  • memory/384-3-0x00000000023E0000-0x00000000023E1000-memory.dmp

    Filesize

    4KB

  • memory/384-2-0x0000000002510000-0x0000000002511000-memory.dmp

    Filesize

    4KB

  • memory/384-46-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/384-52-0x00000000022D0000-0x0000000002324000-memory.dmp

    Filesize

    336KB

  • memory/2340-48-0x0000000000D30000-0x0000000000D84000-memory.dmp

    Filesize

    336KB

  • memory/2340-47-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/2340-54-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/2340-55-0x0000000000D30000-0x0000000000D84000-memory.dmp

    Filesize

    336KB