Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    139s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2024, 03:06

General

  • Target

    0d9ddb184039ff999e81ef7b60ab58f8_JaffaCakes118.exe

  • Size

    5.0MB

  • MD5

    0d9ddb184039ff999e81ef7b60ab58f8

  • SHA1

    8a37520bff1d9835af624a2c8fd3394a2d1777c1

  • SHA256

    abd15b81597018a7c433492d496317942e07935f249da14b9bfc95a813df3585

  • SHA512

    9f9e7e73c3ed0323b602e8113f9a1e9430eaf732e70c0f7ce998998f56a96ceb742731743fef43d41be1e6700fa4ce4c4f2d21154b1aa5d1ede300aee623febe

  • SSDEEP

    98304:qRgk0xOXhMUjwbRDXoI7GuS9/bYVZ0FX8Ipaky:ag98dcbRDXoI7TS9/W2xL

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d9ddb184039ff999e81ef7b60ab58f8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0d9ddb184039ff999e81ef7b60ab58f8_JaffaCakes118.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Identifies Wine through registry keys
    • Enumerates connected drives
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3376
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.copytrans.net/support.php?utm_source=CTP&utm_medium=software&utm_campaign=CTP&utm_nooverride=1&topic=ris
      2⤵
        PID:4484
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4400,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=4512 /prefetch:8
      1⤵
        PID:4956
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --field-trial-handle=4128,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=5100 /prefetch:1
        1⤵
          PID:1988
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --field-trial-handle=3828,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=4944 /prefetch:1
          1⤵
            PID:4000
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --field-trial-handle=5416,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=5608 /prefetch:1
            1⤵
              PID:2392
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --field-trial-handle=5812,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=5760 /prefetch:8
              1⤵
                PID:1052
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --field-trial-handle=6024,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=6076 /prefetch:1
                1⤵
                  PID:3112
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --field-trial-handle=6056,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=6284 /prefetch:1
                  1⤵
                    PID:4664
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=3964,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=6396 /prefetch:8
                    1⤵
                      PID:4316
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --field-trial-handle=5644,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=5832 /prefetch:8
                      1⤵
                        PID:4852

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • memory/3376-0-0x0000000000400000-0x0000000001482000-memory.dmp

                        Filesize

                        16.5MB

                      • memory/3376-1-0x0000000076F94000-0x0000000076F96000-memory.dmp

                        Filesize

                        8KB

                      • memory/3376-2-0x0000000000401000-0x00000000006A4000-memory.dmp

                        Filesize

                        2.6MB

                      • memory/3376-3-0x0000000000400000-0x0000000001482000-memory.dmp

                        Filesize

                        16.5MB

                      • memory/3376-4-0x0000000000400000-0x0000000001482000-memory.dmp

                        Filesize

                        16.5MB

                      • memory/3376-5-0x0000000000400000-0x0000000001482000-memory.dmp

                        Filesize

                        16.5MB

                      • memory/3376-6-0x0000000000400000-0x0000000001482000-memory.dmp

                        Filesize

                        16.5MB

                      • memory/3376-7-0x0000000000400000-0x0000000001482000-memory.dmp

                        Filesize

                        16.5MB

                      • memory/3376-8-0x0000000000400000-0x0000000001482000-memory.dmp

                        Filesize

                        16.5MB

                      • memory/3376-9-0x0000000000400000-0x0000000001482000-memory.dmp

                        Filesize

                        16.5MB

                      • memory/3376-10-0x0000000000400000-0x0000000001482000-memory.dmp

                        Filesize

                        16.5MB

                      • memory/3376-11-0x0000000000400000-0x0000000001482000-memory.dmp

                        Filesize

                        16.5MB

                      • memory/3376-12-0x0000000000400000-0x0000000001482000-memory.dmp

                        Filesize

                        16.5MB

                      • memory/3376-14-0x0000000000400000-0x0000000001482000-memory.dmp

                        Filesize

                        16.5MB