Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    95s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/09/2024, 09:36

General

  • Target

    00a5ca3c9719d62297458cff03a8b0fc_JaffaCakes118.exe

  • Size

    57KB

  • MD5

    00a5ca3c9719d62297458cff03a8b0fc

  • SHA1

    d4955ee5ba0ebb0037ae136f15e1109a1b49eb2e

  • SHA256

    76bd93f54f36f3ee5edc3c39384b0de80fb74dcff6f5bed78932017949a1461e

  • SHA512

    436a8ff0def3cb5c45894969ee4022f0d1e6c80594f2476dc96befe9a05398c6e3c78bfadc095615c0cf7832e55837425bf5fd690234d88210c27ec524175742

  • SSDEEP

    1536:KqFFRu9XQl5den7SfLCnWdQFzCF4kM0XNCl1NgH7Lr:94x7SfLCmSzkrdc16H7Lr

Malware Config

Signatures

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00a5ca3c9719d62297458cff03a8b0fc_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\00a5ca3c9719d62297458cff03a8b0fc_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:2260

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2260-0-0x00007FFE4D965000-0x00007FFE4D966000-memory.dmp

    Filesize

    4KB

  • memory/2260-1-0x000000001B750000-0x000000001B7F6000-memory.dmp

    Filesize

    664KB

  • memory/2260-2-0x00007FFE4D6B0000-0x00007FFE4E051000-memory.dmp

    Filesize

    9.6MB

  • memory/2260-3-0x000000001BCE0000-0x000000001C1AE000-memory.dmp

    Filesize

    4.8MB

  • memory/2260-4-0x000000001C2B0000-0x000000001C34C000-memory.dmp

    Filesize

    624KB

  • memory/2260-5-0x00007FFE4D6B0000-0x00007FFE4E051000-memory.dmp

    Filesize

    9.6MB

  • memory/2260-6-0x0000000000F60000-0x0000000000F68000-memory.dmp

    Filesize

    32KB

  • memory/2260-7-0x00007FFE4D6B0000-0x00007FFE4E051000-memory.dmp

    Filesize

    9.6MB

  • memory/2260-8-0x00007FFE4D6B0000-0x00007FFE4E051000-memory.dmp

    Filesize

    9.6MB

  • memory/2260-9-0x00007FFE4D6B0000-0x00007FFE4E051000-memory.dmp

    Filesize

    9.6MB

  • memory/2260-10-0x00007FFE4D6B0000-0x00007FFE4E051000-memory.dmp

    Filesize

    9.6MB

  • memory/2260-11-0x00007FFE4D6B0000-0x00007FFE4E051000-memory.dmp

    Filesize

    9.6MB

  • memory/2260-12-0x000000001E730000-0x000000001E792000-memory.dmp

    Filesize

    392KB

  • memory/2260-13-0x000000001EC90000-0x000000001EF9E000-memory.dmp

    Filesize

    3.1MB

  • memory/2260-37-0x00007FFE4D965000-0x00007FFE4D966000-memory.dmp

    Filesize

    4KB

  • memory/2260-38-0x00007FFE4D6B0000-0x00007FFE4E051000-memory.dmp

    Filesize

    9.6MB

  • memory/2260-39-0x00007FFE4D6B0000-0x00007FFE4E051000-memory.dmp

    Filesize

    9.6MB