Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/10/2024, 07:52

General

  • Target

    2d8c23cabf2b8f977a0fb81afc5898b3_JaffaCakes118.exe

  • Size

    353KB

  • MD5

    2d8c23cabf2b8f977a0fb81afc5898b3

  • SHA1

    2de9cd4a829b31bbab5d6bbf1b0506b5e1a25f30

  • SHA256

    12e2ec4b3f47131bfe2fbcf6d70e050aec6c3c31156eaf84d9d16b25b3743d5e

  • SHA512

    733bead745ad83d84b3d4b390cbf2af230112ca0dfa08f823ae28aa60aded6d5a7a1059c7964f52e102ccda4e2c8d3f9d4f940d74810f496e715673b9fba3475

  • SSDEEP

    6144:mDbUG6uRJRNWN2Bl89riCwCGBNgQ9L1QKk38hH/ygXCU8BOGkdc1kGdrlE:mDl6ENOGSrpwCWLG85GTsWkF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d8c23cabf2b8f977a0fb81afc5898b3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2d8c23cabf2b8f977a0fb81afc5898b3_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4460
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Windows\uninstal.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4012
  • C:\Windows\SysWOW64\vistc.exe
    C:\Windows\SysWOW64\vistc.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:1380

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\vistc.exe

    Filesize

    353KB

    MD5

    2d8c23cabf2b8f977a0fb81afc5898b3

    SHA1

    2de9cd4a829b31bbab5d6bbf1b0506b5e1a25f30

    SHA256

    12e2ec4b3f47131bfe2fbcf6d70e050aec6c3c31156eaf84d9d16b25b3743d5e

    SHA512

    733bead745ad83d84b3d4b390cbf2af230112ca0dfa08f823ae28aa60aded6d5a7a1059c7964f52e102ccda4e2c8d3f9d4f940d74810f496e715673b9fba3475

  • C:\Windows\uninstal.bat

    Filesize

    218B

    MD5

    84606c34b3b30d79bbc2e18b53889b3d

    SHA1

    e6928772bf81d4b5a4d1eadaee992e1431342363

    SHA256

    8e258ccf21a3c259f752f49d27c0260a61da15f5a8fbd395081911d851c3841e

    SHA512

    bdc1edeff47e74b1ba6435c4a890898883a65ee6914c32b783ebdd369ccb5eee97bc3639be802153c7ac88b09443a167c18b735d21cb95988f368496987a92df

  • memory/1380-7-0x0000000000400000-0x00000000004CA000-memory.dmp

    Filesize

    808KB

  • memory/1380-8-0x0000000000400000-0x00000000004CA000-memory.dmp

    Filesize

    808KB

  • memory/1380-9-0x0000000000400000-0x00000000004CA000-memory.dmp

    Filesize

    808KB

  • memory/4460-0-0x0000000000400000-0x00000000004CA000-memory.dmp

    Filesize

    808KB

  • memory/4460-1-0x00000000004C5000-0x00000000004C7000-memory.dmp

    Filesize

    8KB

  • memory/4460-2-0x0000000000400000-0x00000000004CA000-memory.dmp

    Filesize

    808KB

  • memory/4460-12-0x0000000000400000-0x00000000004CA000-memory.dmp

    Filesize

    808KB