Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2024, 09:54

General

  • Target

    0a1604b307eeaf470ba503a7f9b7ef5c_JaffaCakes118.exe

  • Size

    173KB

  • MD5

    0a1604b307eeaf470ba503a7f9b7ef5c

  • SHA1

    329ac8273929c70f0ae70fc71b90cc2770155435

  • SHA256

    7842e6dce6549a3fb02280c676c7ee65c26d48dc0e22eab1f10e692bba2532d9

  • SHA512

    7f3d6cb30daebc47ed848f41b2c7b1d8686d66c973c99f70270b24de1dc726a74fcfe0648ba2e1bcf3a4fbd9cfdffb75ab12292670bbb8b32e1d34bfdc41d8a1

  • SSDEEP

    3072:1pzRNYuluupWyvbOijh7UAoaI52pySvl3nW0CWcscGF8ZHmt4qCWX4wj:1ZRvupm9UX5WflXW5Wc88wGhonj

Malware Config

Signatures

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 8 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a1604b307eeaf470ba503a7f9b7ef5c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0a1604b307eeaf470ba503a7f9b7ef5c_JaffaCakes118.exe"
    1⤵
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:5088
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv
    1⤵
      PID:2488

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Instant Access\DesktopIcons\NoCreditCard.lnk

      Filesize

      2KB

      MD5

      557f4b6e4f62e0601144a5c5d7cadea7

      SHA1

      132d6d39a330158d0841165124e24fd33a680666

      SHA256

      f64ff78defd554ad628b9fad63bb3f6115c497baa3e21f3613306b37af9e6be6

      SHA512

      8c7663ad35df5a9545f3fee72e4cbb3875f913fe6e1c51276b9613104e591045c79ebbc3c3302cd26ad23912044e3e9df60344b9e31f3e5f6f5da79aade9c16c

    • C:\Program Files (x86)\Instant Access\Multi\20100105020150\instant access.exe

      Filesize

      173KB

      MD5

      0a1604b307eeaf470ba503a7f9b7ef5c

      SHA1

      329ac8273929c70f0ae70fc71b90cc2770155435

      SHA256

      7842e6dce6549a3fb02280c676c7ee65c26d48dc0e22eab1f10e692bba2532d9

      SHA512

      7f3d6cb30daebc47ed848f41b2c7b1d8686d66c973c99f70270b24de1dc726a74fcfe0648ba2e1bcf3a4fbd9cfdffb75ab12292670bbb8b32e1d34bfdc41d8a1

    • C:\Windows\dialerexe.ini

      Filesize

      807B

      MD5

      664e966a342edc18c400cda96ac9571d

      SHA1

      addb31a2fbce6418bc366c43ace648914130cf4b

      SHA256

      5bc7897ade84c52627bfe83cfd10ab95c61d75d5e262e9a8206e3c2ec6e5323b

      SHA512

      3a6c75bdd94fa75a2c9aa377538c3430f9401adb317c0dad07f999feaf01a5569b5bbca9955c93ea114b8004ad4a8e0c06ddbe8443ef5b6424464755c825e5e1

    • memory/5088-0-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/5088-4-0x0000000010000000-0x000000001004C000-memory.dmp

      Filesize

      304KB

    • memory/5088-1-0x0000000010000000-0x000000001004C000-memory.dmp

      Filesize

      304KB

    • memory/5088-5-0x0000000000400000-0x0000000000443908-memory.dmp

      Filesize

      270KB

    • memory/5088-3-0x0000000010000000-0x000000001004C000-memory.dmp

      Filesize

      304KB