Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2024, 01:19

General

  • Target

    113de567b602ba220e0b39a41cd6e822_JaffaCakes118.exe

  • Size

    37KB

  • MD5

    113de567b602ba220e0b39a41cd6e822

  • SHA1

    0c04c9114bce6ece5ff0d024d07428a7180d11e3

  • SHA256

    704a0149a7ff05d10390fffe02a658c55b7820d5a8c81142e9d2565b71b91b4d

  • SHA512

    555e854a707bac9d8352d047b333eb2cad1be8854fc3b57e80a335ac01ae21dc80f143d2b008e428881bffda6b4653a043da4655ad467f41f4c939e1c2fbe2fb

  • SSDEEP

    768:vd2nri/EW9z07uyJt99Fc54hHm6Xl+gW7odjLyfR/dnbcuyD7U:vd0rUNv4FS4hG6VBWFdnouy8

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Launches sc.exe 6 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 22 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\113de567b602ba220e0b39a41cd6e822_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\113de567b602ba220e0b39a41cd6e822_JaffaCakes118.exe"
    1⤵
    • Adds policy Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3076
    • C:\Windows\SysWOW64\net.exe
      net.exe stop "Security Center"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3336
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop "Security Center"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4184
    • C:\Windows\SysWOW64\sc.exe
      sc config wscsvc start= DISABLED
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:1392
    • C:\Windows\SysWOW64\net.exe
      net.exe stop "Windows Firewall/Internet Connection Sharing (ICS)"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2548
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:696
    • C:\Windows\SysWOW64\sc.exe
      sc config SharedAccess start= DISABLED
      2⤵
      • Launches sc.exe
      • System Location Discovery: System Language Discovery
      PID:4424
    • C:\Users\Admin\AppData\Local\Temp\vo0xz1.exe
      C:\Users\Admin\AppData\Local\Temp\vo0xz1.exe
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4832
      • C:\Windows\SysWOW64\net.exe
        net.exe stop "Security Center"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3136
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop "Security Center"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3828
      • C:\Windows\SysWOW64\sc.exe
        sc config wscsvc start= DISABLED
        3⤵
        • Launches sc.exe
        • System Location Discovery: System Language Discovery
        PID:264
      • C:\Windows\SysWOW64\net.exe
        net.exe stop "Windows Firewall/Internet Connection Sharing (ICS)"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5064
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1388
      • C:\Windows\SysWOW64\sc.exe
        sc config SharedAccess start= DISABLED
        3⤵
        • Launches sc.exe
        • System Location Discovery: System Language Discovery
        PID:5104
      • C:\Users\Admin\AppData\Local\Temp\vo0xz1.exe
        C:\Users\Admin\AppData\Local\Temp\vo0xz1.exe -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
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3208
        • C:\Windows\SysWOW64\net.exe
          net.exe stop "Security Center"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4552
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Security Center"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:5028
        • C:\Windows\SysWOW64\sc.exe
          sc config wscsvc start= DISABLED
          4⤵
          • Launches sc.exe
          • System Location Discovery: System Language Discovery
          PID:944
        • C:\Windows\SysWOW64\net.exe
          net.exe stop "Windows Firewall/Internet Connection Sharing (ICS)"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4468
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Windows Firewall/Internet Connection Sharing (ICS)"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1448
        • C:\Windows\SysWOW64\sc.exe
          sc config SharedAccess start= DISABLED
          4⤵
          • Launches sc.exe
          • System Location Discovery: System Language Discovery
          PID:3876
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\skyrlu2qp.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2252

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\skyrlu2qp.bat

    Filesize

    218B

    MD5

    8403dc3b6b6b579277425ea932cd85e1

    SHA1

    2544934914b61b56a2a30dd879fbdeeb127c0f98

    SHA256

    823c9292d3e3d560262b43da21b44e2eeea21d3e295b62954f9572338a9cc0c0

    SHA512

    49e6ff322c63d86bd59a50664f408301a44c5cc11ca9e3b926d5d116c9b979b6f308c4098e2fa6ea73b21d1c41c856c90f0fa80382711b25cba298955a377206

  • C:\Users\Admin\AppData\Local\Temp\vo0xz1.exe

    Filesize

    37KB

    MD5

    113de567b602ba220e0b39a41cd6e822

    SHA1

    0c04c9114bce6ece5ff0d024d07428a7180d11e3

    SHA256

    704a0149a7ff05d10390fffe02a658c55b7820d5a8c81142e9d2565b71b91b4d

    SHA512

    555e854a707bac9d8352d047b333eb2cad1be8854fc3b57e80a335ac01ae21dc80f143d2b008e428881bffda6b4653a043da4655ad467f41f4c939e1c2fbe2fb

  • memory/3076-0-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3076-12-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3208-15-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3208-20-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3208-25-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4832-18-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4832-28-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB