Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/10/2024, 02:32

General

  • Target

    293f8f7cacddb3c34aed75bf23880006_JaffaCakes118.exe

  • Size

    206KB

  • MD5

    293f8f7cacddb3c34aed75bf23880006

  • SHA1

    8a18563d7d4611b50a3e0f0b9c672e1e7a927bc6

  • SHA256

    6d9c4ee598caf7761ac3ffe0af646a8f286c38a92a4d73448671e8291afc0b05

  • SHA512

    6fedba46d76e903b58c9a0773d4086c2a7d6f515509865d66d98d2997e2610b690f3163826da9c260c0573b792c4fe5f27aa2dcb951d1b6a5ef5630eb18b378e

  • SSDEEP

    6144:QOE0uuVK9uzOLapTiFVfJ/QiNdND1Wk4bH:u0fRoFVR/QiLvW7

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\293f8f7cacddb3c34aed75bf23880006_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\293f8f7cacddb3c34aed75bf23880006_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:4872
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 660
      2⤵
      • Program crash
      PID:2760
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4872 -ip 4872
    1⤵
      PID:1176

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\sshnas21.dll

      Filesize

      172KB

      MD5

      c65cf94c5d399d6cc65111e39d458970

      SHA1

      6044e43668e8cc555d5e7ceac9fdbf827ac3fff7

      SHA256

      12054c864c5050e25f2f88fb69fde56169aedbe6dd0502cc83b593a70e2291ec

      SHA512

      4b7c8f893fc54729cec048b2faa4a08ad9e9ef6a189a7279880020627714a4b23b035abbaec032ee8e12df666e21babcb8a55c49e0916bc8dd8ac1053d3c77f7

    • memory/4872-1-0x00000000004F0000-0x0000000000504000-memory.dmp

      Filesize

      80KB

    • memory/4872-2-0x0000000000404000-0x0000000000405000-memory.dmp

      Filesize

      4KB

    • memory/4872-9-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB

    • memory/4872-10-0x0000000000400000-0x0000000000436000-memory.dmp

      Filesize

      216KB