Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    94s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/10/2024, 11:31

General

  • Target

    178382b439672c15c090cd1bba5fb1ca_JaffaCakes118.exe

  • Size

    14KB

  • MD5

    178382b439672c15c090cd1bba5fb1ca

  • SHA1

    a541e5c3907d1e2d9e7a62f3568099e900f50462

  • SHA256

    c72e21c99bb7564425dc9b451465b30d83e7d2cc3673c416a1145bf239e6f608

  • SHA512

    08655c4f2f3c346229b49fcb394ad4fa12192120f91eb33421a5b081d0713d3cb3ec380e86fe7c14cf1dd1daf0d4fc681634f118a976333128aeb3de258cf684

  • SSDEEP

    192:i76QyruGELq8mLI+u0TZbNGTOIP/3F/SPTwe+bXY1CDO8A:iIKGTLI+u0TZbYTOw/SseV1H

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\178382b439672c15c090cd1bba5fb1ca_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\178382b439672c15c090cd1bba5fb1ca_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:5004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\251212f.exe

    Filesize

    1KB

    MD5

    8400f70b01d5572305b5a982f337851e

    SHA1

    7dcaa8fb78811f987de18f05626b65718501ccfc

    SHA256

    409a364939d05af2b7195ada4570b260ba8da741fc3407342113fc7e956f284f

    SHA512

    2dac378126e83935f5a302bd1750438bae50092ef03355add1097fed4ea1f1d85ffdd4b8c28fb4e73dde53dbc244ac6e854df2d95c7f0eec223d251115cd5248

  • memory/5004-0-0x0000000075022000-0x0000000075023000-memory.dmp

    Filesize

    4KB

  • memory/5004-1-0x0000000075020000-0x00000000755D1000-memory.dmp

    Filesize

    5.7MB

  • memory/5004-2-0x0000000075020000-0x00000000755D1000-memory.dmp

    Filesize

    5.7MB

  • memory/5004-3-0x0000000075020000-0x00000000755D1000-memory.dmp

    Filesize

    5.7MB

  • memory/5004-4-0x0000000075020000-0x00000000755D1000-memory.dmp

    Filesize

    5.7MB

  • memory/5004-5-0x0000000075020000-0x00000000755D1000-memory.dmp

    Filesize

    5.7MB

  • memory/5004-6-0x0000000075020000-0x00000000755D1000-memory.dmp

    Filesize

    5.7MB

  • memory/5004-22-0x0000000075020000-0x00000000755D1000-memory.dmp

    Filesize

    5.7MB

  • memory/5004-23-0x0000000075020000-0x00000000755D1000-memory.dmp

    Filesize

    5.7MB

  • memory/5004-62-0x0000000075022000-0x0000000075023000-memory.dmp

    Filesize

    4KB

  • memory/5004-63-0x0000000075020000-0x00000000755D1000-memory.dmp

    Filesize

    5.7MB