Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/09/2024, 20:21

General

  • Target

    fad9a80024332efb7f5609b61c00ff56_JaffaCakes118.exe

  • Size

    174KB

  • MD5

    fad9a80024332efb7f5609b61c00ff56

  • SHA1

    31e2caada015dcbb888dd351f06474d7177437a1

  • SHA256

    e746832c45b60f90fefd8738d0d9540df167674fbf101dd9b974b966cde62457

  • SHA512

    80599d1cebe327d7cb6bab1ce88dec2b0a35310b48e1d2784cb1685eec2456602fd7a965b5194e5499345a63d237dc252013bf3b877e5079860e6874b7fb8acb

  • SSDEEP

    3072:2a6pmM3xy6bpgy4Zyv7q6RYZZeyqfEkQGUSQyYLWwA5pyAQ/NxgSiD9s8FlI6:wy62y4ZI7qoYXizQGUhfK5pVQ/M52

Malware Config

Signatures

  • Event Triggered Execution: AppCert DLLs 1 TTPs

    Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppCert DLLs loaded into processes.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fad9a80024332efb7f5609b61c00ff56_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fad9a80024332efb7f5609b61c00ff56_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1384
    • C:\Windows\System32\rundll32.exe
      "C:\Windows\System32\rundll32.exe" "C:\Windows\system32\Credtvol64.dll",CreateProcessNotify
      2⤵
      • Loads dropped DLL
      PID:4136
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\240639031.bat" "C:\Users\Admin\AppData\Local\Temp\fad9a80024332efb7f5609b61c00ff56_JaffaCakes118.exe""
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:4652
      • C:\Windows\SysWOW64\attrib.exe
        attrib -r -s -h"C:\Users\Admin\AppData\Local\Temp\fad9a80024332efb7f5609b61c00ff56_JaffaCakes118.exe"
        3⤵
        • Views/modifies file attributes
        PID:2280
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4652 -s 492
        3⤵
        • Program crash
        PID:1084
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4652 -s 528
        3⤵
        • Program crash
        PID:4688
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 1384 -ip 1384
    1⤵
      PID:2336
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4652 -ip 4652
      1⤵
        PID:4888
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4652 -ip 4652
        1⤵
          PID:3560

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\240639031.bat

          Filesize

          75B

          MD5

          17382142b2ccb199865f2a1b5ca42dc8

          SHA1

          5a13d091b08402c4fcbb46abd4fff313967bf858

          SHA256

          5cceceac5650fcd9273a5a5b54686b2036da073e870b191cf10db2ad0270bb40

          SHA512

          4f217b614e52805ee27bbc2b90be81ead04b528b09e15d063cb32c280a970255dec3dffb72c50e3c209c154b5000452e245f7f7e2f407258a2e9715d9bd25a00

        • C:\Windows\SysWOW64\Credtvol.dll

          Filesize

          54KB

          MD5

          6564e07076dda55f1da5ccc8c40edeb8

          SHA1

          ef685e0491fe98a92ee4df180869f0c9cad95f98

          SHA256

          62d1e48d0bd38236c7f679da0f81760f91b44ae28310b4a4c53ff231238dd0d7

          SHA512

          2a6b0d35f5de4962be5f2d5f7d8d98a41915b1f24910a256760ec9d18719945d0aa0b335549f9338e8fc477d655c92e0579ce437c5d171502fd1746866a1d326

        • C:\Windows\System32\Credtvol64.dll

          Filesize

          62KB

          MD5

          d99463764fb1cb6608f2e2fea36bb016

          SHA1

          87a5518f3ef2db86930ed355d5b4f81362bd6418

          SHA256

          8557f233873fd2aa7bb675e48ac58d7d5fd60470033ad26660352bdbbacae65f

          SHA512

          268f9869d6fdc5673bc6fd6ef80e7b697bf172913b249b8b8626738eda387097ea00f6f5af7af56a60c8409f3bcc634502fa22599081c998874b9d5fa9a44938

        • memory/1384-0-0x0000000000C60000-0x0000000000C61000-memory.dmp

          Filesize

          4KB

        • memory/1384-1-0x0000000001000000-0x000000000102E000-memory.dmp

          Filesize

          184KB

        • memory/1384-6-0x00000000030E0000-0x00000000030E1000-memory.dmp

          Filesize

          4KB

        • memory/1384-7-0x0000000010000000-0x0000000010012000-memory.dmp

          Filesize

          72KB

        • memory/1384-9-0x0000000001000000-0x000000000102E000-memory.dmp

          Filesize

          184KB

        • memory/1384-10-0x0000000010000000-0x0000000010012000-memory.dmp

          Filesize

          72KB

        • memory/1384-17-0x0000000001000000-0x000000000102E000-memory.dmp

          Filesize

          184KB

        • memory/4136-14-0x0000016068B30000-0x0000016068B31000-memory.dmp

          Filesize

          4KB

        • memory/4652-22-0x0000000010000000-0x0000000010012000-memory.dmp

          Filesize

          72KB