Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/09/2024, 09:32

General

  • Target

    00a070f995feeb6cef385e2795d3d267_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    00a070f995feeb6cef385e2795d3d267

  • SHA1

    392beb989ceaeaf87f163c50348689f9c3f228cb

  • SHA256

    dc14091dd283ea5503280f9378c2abd570f658b08b97a901586b9d1f268f493d

  • SHA512

    474f440a935509f1cc88990c5711f992b4473c217558d3352ef61da42210d0857d27265a08fc2ab290fbeecc9e9db89950148dc7d66978768e06fe3de7432627

  • SSDEEP

    24576:hAkWrPamBGBL2Vp/Z9x6VFoas4+0U8hdHgyVo+F4CbdKy6vcr:hkZGBL27kwap+0U8hJE+FXd7lr

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 13 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 38 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00a070f995feeb6cef385e2795d3d267_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\00a070f995feeb6cef385e2795d3d267_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3052
    • C:\Windows\SysWOW64\explorer.exe
      explorer C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1668
    • C:\Windows\SysWOW64\7533b0\W43D57A.EXE
      C:\Windows\system32\\7533b0\W43D57A.EXE
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2680
      • C:\Windows\SysWOW64\7533b0\NT-52616889.EXE
        C:\Windows\SysWOW64\7533b0\NT-52616889.EXE 4|-|SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6EDEC5|-|C:\Windows\SysWOW64\7533b0\W43D57A.EXE|-|0
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4196
  • C:\Windows\explorer.exe
    C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3528
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:660

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\E_N4\dp1.fne

      Filesize

      124KB

      MD5

      c6c43f32ffc97272fddeb3dd480657b1

      SHA1

      311d8c071c8aa9fc1443803e552301bbf06e990e

      SHA256

      8832bdbc8231842a6d79c972cc9a6d8327ef674a4a2310fa43c731dea3383c17

      SHA512

      e00d1a818a33fde84ad04253e00115cc885cddfcb773c1a96820f9b8b27daa6f28ec3bd9f2e31912f8e2e6fa61d4b437edc796a9498605aeff90ebbff1fb699e

    • C:\Users\Admin\AppData\Local\Temp\E_N4\krnln.fnr

      Filesize

      1.1MB

      MD5

      54e586fb1643679e7d6ce885ad679a78

      SHA1

      899a490553e6460d63c8ba41999873652943ce8a

      SHA256

      60034f94c565dc91fa569019685efbfcf475ebf967d0bbab02b8177dfab0619c

      SHA512

      a129b24855429ce804467103846832ab3b126fb190ec6ccf473cd6db7455689abef6799c42a874a2531af74b29d74c2882ca4b11ca748be3adef91d147d51727

    • C:\Windows\SysWOW64\7533b0\HtmlView.fne

      Filesize

      212KB

      MD5

      4c9e8f81bf741a61915d0d4fc49d595e

      SHA1

      d033008b3a0e5d3fc8876e0423ee5509ecb3897c

      SHA256

      951d725f4a12cd4ff713ca147fa3be08a02367db6731283c3f1ba30445990129

      SHA512

      cf2c6f8f471c8a5aad563bc257035515860689b73ce343599c7713de8bc8338a031a722f366e005bc1907d6fc97b68b8b415e8ff05b7324fb1040c5dc02315d7

    • C:\Windows\SysWOW64\7533b0\W43D57A.EXE

      Filesize

      47KB

      MD5

      0271e117f0345ba46ffea502d03c86d2

      SHA1

      2350ad29d9462f99e867ee8022c4cbb3c8b8b4de

      SHA256

      21d719955b0893032aa7ffde54d8abd3c219181c6a9a29871c0a7eb536306346

      SHA512

      5fa36016d8cc1d8853b9e455345e873f32b3b263f019566a3ce35b65a69c8f8020942cd85c563f5ca647f18224ac4e3fc3f94eeb2bdfebefe435a57981158c6e

    • C:\Windows\SysWOW64\7533b0\eAPI.fne

      Filesize

      328KB

      MD5

      7bcb58659e959d65514c45cd01bfc8e4

      SHA1

      c2f41529a536c746ac0cf92c026dea65798f3ee7

      SHA256

      f37248aa68d84818fba2b1ea160d7eec4d3f426eeca4d215c8db8d8389d18388

      SHA512

      0b33bbcb059de95e74e9e115fb09ca73846720041113c9cab10e5dec40024136241d66a92181527e36db714c4c96ee532b7df00ae2c10798d8bea947f6762217

    • memory/2680-27-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/2680-45-0x00000000026B0000-0x00000000026D1000-memory.dmp

      Filesize

      132KB

    • memory/2680-31-0x0000000010000000-0x000000001011D000-memory.dmp

      Filesize

      1.1MB

    • memory/2680-68-0x00000000026B0000-0x00000000026D1000-memory.dmp

      Filesize

      132KB

    • memory/2680-35-0x0000000002220000-0x0000000002258000-memory.dmp

      Filesize

      224KB

    • memory/2680-67-0x0000000010000000-0x000000001011D000-memory.dmp

      Filesize

      1.1MB

    • memory/2680-40-0x00000000023D0000-0x0000000002431000-memory.dmp

      Filesize

      388KB

    • memory/2680-66-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/3052-47-0x0000000000400000-0x000000000046A000-memory.dmp

      Filesize

      424KB

    • memory/3052-48-0x0000000010000000-0x000000001011D000-memory.dmp

      Filesize

      1.1MB

    • memory/3052-0-0x0000000000400000-0x000000000046A000-memory.dmp

      Filesize

      424KB

    • memory/3052-4-0x0000000010000000-0x000000001011D000-memory.dmp

      Filesize

      1.1MB

    • memory/3052-21-0x0000000002490000-0x00000000024B1000-memory.dmp

      Filesize

      132KB

    • memory/4196-62-0x00000000020F0000-0x0000000002128000-memory.dmp

      Filesize

      224KB

    • memory/4196-64-0x0000000000400000-0x000000000040F000-memory.dmp

      Filesize

      60KB

    • memory/4196-65-0x0000000010000000-0x000000001011D000-memory.dmp

      Filesize

      1.1MB