Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    25s
  • max time network
    39s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2024, 03:22

Errors

Reason
Machine shutdown

General

  • Target

    11a13418d08527a1df11a91aa6560863_JaffaCakes118.exe

  • Size

    282KB

  • MD5

    11a13418d08527a1df11a91aa6560863

  • SHA1

    ff4fb55fe1aa7ffbb79775b16ade23afd395d39b

  • SHA256

    737ba07e36e4c3eeb668b5425b332178c504194abe72000e2605a53555087b90

  • SHA512

    74af708b092a83bdeb8d7c0b0e72ecb7e2508241360d8d8861b333180c9823ae3cd19feb9436d8fc8239791d63970622daa8fde1276b39c7cd33e9aafda50536

  • SSDEEP

    6144:Izf/4vdu9hHaZBynO1qQZq2kwJD7DOZa6emP/CvL:Izf/X9hHXQY2kqD7DOw6eeaT

Malware Config

Signatures

  • Modifies security service 2 TTPs 1 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Disables taskbar notifications via registry modification
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 27 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 11 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\11a13418d08527a1df11a91aa6560863_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\11a13418d08527a1df11a91aa6560863_JaffaCakes118.exe"
    1⤵
    • Modifies security service
    • Adds Run key to start application
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:4376
    • C:\Users\Admin\AppData\Local\Temp\11a13418d08527a1df11a91aa6560863_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\11a13418d08527a1df11a91aa6560863_JaffaCakes118.exe startC:\Users\Admin\AppData\Roaming\56321\E5AD1.exe%C:\Users\Admin\AppData\Roaming\56321
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4256
    • C:\Users\Admin\AppData\Local\Temp\11a13418d08527a1df11a91aa6560863_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\11a13418d08527a1df11a91aa6560863_JaffaCakes118.exe startC:\Program Files (x86)\21DCB\lvvm.exe%C:\Program Files (x86)\21DCB
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3480
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3052
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:636
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
      PID:2508
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
        PID:4064
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
          PID:2140
        • C:\Windows\explorer.exe
          explorer.exe
          1⤵
            PID:4372
          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
            1⤵
              PID:4164
            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
              1⤵
                PID:4872

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9

                Filesize

                471B

                MD5

                6a406ad96e5b0fb95b19fd5c525659e8

                SHA1

                89c48a17daeb402c78a406ed31980ce381c1e66a

                SHA256

                fff6d4beb65672c459a492cf64ebdcc3ae0b5e635533fd761876300e1f4da6a5

                SHA512

                c336db63c06d794ea67bd2d779db15777d1caf244119e76bd640e58e0168afc52dd744be20dfa4bdeb45dfb9435e3cc187099c1ac745d8a7e19ed9a343d886de

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9

                Filesize

                420B

                MD5

                b3e1373f7de40116f803aaff016b74bd

                SHA1

                41f0df17f271b896d4f82fd6d83cbddffdc8ed64

                SHA256

                b583caa78c719c82870b6ae330a683002a439bfcf93ada6efb5882e651a7eda6

                SHA512

                ce11f581dd3fd221915f63f8d93186de38a7f959705d843c667e05d1d53eb2fa0c026dd4be1a9edfe2e6c22bcdc79c3edb1d8af288fc5d3bc29f000fbac22122

              • C:\Users\Admin\AppData\Roaming\56321\1DCB.632

                Filesize

                996B

                MD5

                a221aef49058dd083cf55ccee16a3925

                SHA1

                2ef3577a539c99a446a9a3e2b534f7d9aeb05720

                SHA256

                6ed85758acea29a69e969ce96b4321f262743969ecf6a29b70169897b4bb2a4c

                SHA512

                4deb59ae9a000a98726966e1173d41887ef1f75116e730904fb783235c903edaec050c6a6271d04f9b2b507b35ca0cfc8be54989a973dd7857e75a627d08c11c

              • C:\Users\Admin\AppData\Roaming\56321\1DCB.632

                Filesize

                600B

                MD5

                1672c197f8a69919103d99bb4e332129

                SHA1

                1f4e9ba8c93d4710003080660b942368c33cf4e2

                SHA256

                ea1004d2dbd2276fd74a53c81b2dc095588fcacaa13c8869ec41744fbe2c9614

                SHA512

                e0a4914061281d41344a996d5520781ee36d87001ade83806b883553bd5c75269c96d355c895b5155d8954c755e30c071d9b8f1cfd05ffed1e0e1a3622d060cf

              • C:\Users\Admin\AppData\Roaming\56321\1DCB.632

                Filesize

                1KB

                MD5

                f287354d540c831528ec25ade43bbf98

                SHA1

                c8cf3dfd8228a75b85df6798e3f2634b256626b0

                SHA256

                cb363ab200ba6a04090b13cff1821213aae89976003c2048054a8a6d02895245

                SHA512

                95fefd2c22a01f72ac30a2916d3775da9faee405d005c007ca121a0ceaec03584b2f20c0f0a1c4bdfec6f138597d5209418499a076b20870aef0eecb811bdba7

              • C:\Users\Admin\AppData\Roaming\56321\1DCB.632

                Filesize

                300B

                MD5

                28396d5db9ec67731c558c7a9ee624b8

                SHA1

                e8e9856383b7250f552edca9f641e1d9cc459755

                SHA256

                7f1dd112a970d0a843dd1d81ba35bdf710544f4dd7eaeb448f37ba4aa3bf015f

                SHA512

                9b5db57c0ab244a7e4d954294fe31babdc1c17c5f93ae34a7b97f261b482c62dcbcf4b4e28e3a9b813590ffc390f0f1b8617ec00131980ee3d1fa5a68fb78f56

              • memory/3480-118-0x0000000000400000-0x000000000046B000-memory.dmp

                Filesize

                428KB

              • memory/4256-14-0x0000000000400000-0x000000000046B000-memory.dmp

                Filesize

                428KB

              • memory/4256-15-0x0000000000400000-0x000000000046B000-memory.dmp

                Filesize

                428KB

              • memory/4372-317-0x00000000035B0000-0x00000000035B1000-memory.dmp

                Filesize

                4KB

              • memory/4376-13-0x0000000000400000-0x0000000000468000-memory.dmp

                Filesize

                416KB

              • memory/4376-116-0x0000000000400000-0x000000000046B000-memory.dmp

                Filesize

                428KB

              • memory/4376-1-0x0000000000400000-0x0000000000468000-memory.dmp

                Filesize

                416KB

              • memory/4376-11-0x0000000000400000-0x000000000046B000-memory.dmp

                Filesize

                428KB

              • memory/4376-2-0x0000000000400000-0x000000000046B000-memory.dmp

                Filesize

                428KB

              • memory/4872-324-0x0000027AD3CE0000-0x0000027AD3D00000-memory.dmp

                Filesize

                128KB

              • memory/4872-336-0x0000027AD3CA0000-0x0000027AD3CC0000-memory.dmp

                Filesize

                128KB

              • memory/4872-355-0x0000027AD42C0000-0x0000027AD42E0000-memory.dmp

                Filesize

                128KB