Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/10/2024, 01:14

General

  • Target

    159a0a7bf6c1ee8085430cbf30d554fc_JaffaCakes118.exe

  • Size

    116KB

  • MD5

    159a0a7bf6c1ee8085430cbf30d554fc

  • SHA1

    d7d11f0e995f8c3c4e4e337d74be8546f1875ede

  • SHA256

    9ad212c6a644a9a0b6b95fc0f554682a0bea61266f85875fcf31d2dbcfa26d46

  • SHA512

    abbc8fe7e24f2a9d723c77696b1bc2be3a37e6a85c707644b7470614620f2698709890ae4b7ef3628b254d7662bd21c07b8463f4a237417b0ec1fbf9c6b3fb74

  • SSDEEP

    3072:98RTVXDNJqxSA5HDc3I3nNoOsRXurRUQzj+5o/U:SZRcx5VMpOKXur2Qf+5o

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\159a0a7bf6c1ee8085430cbf30d554fc_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\159a0a7bf6c1ee8085430cbf30d554fc_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Windows\Ubuzya.exe
      C:\Windows\Ubuzya.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      PID:4632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Twain001.Mtx

    Filesize

    2B

    MD5

    309fc7d3bc53bb63ac42e359260ac740

    SHA1

    2064f80f811db79a33c4e51c10221454e30c74ae

    SHA256

    ac11339ffa8f270c4f781e0a3922bb1c80d9dee6e4b6911ca34538ed9ae03caa

    SHA512

    77dd27d30f4e13a0bcd6fd27ae7567c136d87393e5ee632bccf05b0a0d2bbcc2fc0fd777a8508e26cc4fc579c8da0ab56b7bf179b1adc70f28f7d0eee89fa5f8

  • C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job

    Filesize

    390B

    MD5

    44fbe35dcb674a3586138c566bf6b5a8

    SHA1

    72bda52a5c99a9e7164cab8a3682a695e568f795

    SHA256

    56cdcaba29401a6b85f724535057fd52f4a0731f8217c33a8b068cbc7845c622

    SHA512

    a9ad4492a06d63a59ecaa63c44eb5a3e083060106eb6c15f14aafa485a66b618d52664efd031a0e9f85eca0cbdd73a19228a2aca5ed40c16a0aff3fb74b0c651

  • C:\Windows\Ubuzya.exe

    Filesize

    116KB

    MD5

    159a0a7bf6c1ee8085430cbf30d554fc

    SHA1

    d7d11f0e995f8c3c4e4e337d74be8546f1875ede

    SHA256

    9ad212c6a644a9a0b6b95fc0f554682a0bea61266f85875fcf31d2dbcfa26d46

    SHA512

    abbc8fe7e24f2a9d723c77696b1bc2be3a37e6a85c707644b7470614620f2698709890ae4b7ef3628b254d7662bd21c07b8463f4a237417b0ec1fbf9c6b3fb74

  • memory/1240-1-0x0000000002100000-0x0000000002123000-memory.dmp

    Filesize

    140KB

  • memory/1240-2-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1240-85534-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1240-22640-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/4632-75587-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/4632-37069-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/4632-11-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/4632-93633-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/4632-110858-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/4632-133156-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/4632-133157-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/4632-133158-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/4632-133160-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/4632-133164-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB