Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/09/2024, 14:25

General

  • Target

    fa9222e8ce965d866f91d34c44d9e786_JaffaCakes118.exe

  • Size

    240KB

  • MD5

    fa9222e8ce965d866f91d34c44d9e786

  • SHA1

    84872d3b60e7e5e1820f15985bf34753f63b4cb0

  • SHA256

    c1b7b8c8a1b6a623c554d32dbaf7e997d3f52c30435b3a80bcb375f169cf9269

  • SHA512

    48888db7e9cf3a26c8dcf8fa574d4b8de89fa66446495d38e66d92d5b77b3ceb1276ceef252332203bbb16c9eecfef436bd9599dbb51f6528aa25ea69682ef1e

  • SSDEEP

    6144:qzZZdN5LxGFUCwKz/S6DT6Dcs2GGxErGtCSaGw6:qzZfXFCUCxzAcs2GGx+wbaG

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa9222e8ce965d866f91d34c44d9e786_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fa9222e8ce965d866f91d34c44d9e786_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:1184

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nst81C4.tmp\System.dll

    Filesize

    11KB

    MD5

    959ea64598b9a3e494c00e8fa793be7e

    SHA1

    40f284a3b92c2f04b1038def79579d4b3d066ee0

    SHA256

    03cd57ab00236c753e7ddeee8ee1c10839ace7c426769982365531042e1f6f8b

    SHA512

    5e765e090f712beffce40c5264674f430b08719940d66e3a4d4a516fd4ade859f7853f614d9d6bbb602780de54e11110d66dbb0f9ca20ef6096ede531f9f6d64

  • C:\Users\Admin\AppData\Local\Temp\nst81C4.tmp\inetc.dll

    Filesize

    23KB

    MD5

    7760daf1b6a7f13f06b25b5a09137ca1

    SHA1

    cc5a98ea3aa582de5428c819731e1faeccfcf33a

    SHA256

    5233110ed8e95a4a1042f57d9b2dc72bc253e8cb5282437637a51e4e9fcb9079

    SHA512

    d038bea292ffa2f2f44c85305350645d504be5c45a9d1b30db6d9708bfac27e2ff1e41a76c844d9231d465f31d502a5313dfded6309326d6dfbe30e51a76fdb5

  • C:\Users\Admin\AppData\Local\Temp\nst81C4.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    f7b92b78f1a00a872c8a38f40afa7d65

    SHA1

    872522498f69ad49270190c74cf3af28862057f2

    SHA256

    2bee549b2816ba29f81c47778d9e299c3a364b81769e43d5255310c2bd146d6e

    SHA512

    3ad6afa6269b48f238b48cf09eeefdef03b58bab4e25282c8c2887b4509856cf5cbb0223fbb06c822fb745aeea000dd1eee878df46ad0ba7f2ef520a7a607f79

  • memory/1184-50-0x0000000003770000-0x0000000003771000-memory.dmp

    Filesize

    4KB

  • memory/1184-51-0x0000000010004000-0x0000000010005000-memory.dmp

    Filesize

    4KB

  • memory/1184-53-0x0000000010004000-0x0000000010005000-memory.dmp

    Filesize

    4KB