Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2024, 20:39

General

  • Target

    36b3356906581a9501b10b8f2cb1414e_JaffaCakes118.exe

  • Size

    647KB

  • MD5

    36b3356906581a9501b10b8f2cb1414e

  • SHA1

    f0dea476f2fa001a364590635de5cf6691489f5e

  • SHA256

    d675f81960e27a32b69e02cae2dd6c58327c5378bce4a9e6142630d7fffdb051

  • SHA512

    4a4f3c511aaed6b65bd4edefda540ef791ce11fe8a7acd8dc6eee18c6cb16de9fadc5c0417434da29ceb9fb328075b3b6167cf6336c96cbfcfb97686a6d2f61d

  • SSDEEP

    12288:twZ+r2ML1m+WEB3b6zZwlAAG72vDj6knSFcYTnKuVPYlFdRAT:tg+rdL2EB3uz6A172v6kndeKOPYluT

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36b3356906581a9501b10b8f2cb1414e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\36b3356906581a9501b10b8f2cb1414e_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1884
    • C:\Windows\SysWOW64\install.exe
      "C:\Windows\system32\install.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1340
      • C:\Windows\SysWOW64\mfc140fra.exe
        "C:\Windows\SysWOW64\mfc140fra.exe" [*]install.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:2036
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s C:\Windows\system32\5ny7.dll
      2⤵
      • Loads dropped DLL
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:1724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\8jnpreb.sys

    Filesize

    647KB

    MD5

    36b3356906581a9501b10b8f2cb1414e

    SHA1

    f0dea476f2fa001a364590635de5cf6691489f5e

    SHA256

    d675f81960e27a32b69e02cae2dd6c58327c5378bce4a9e6142630d7fffdb051

    SHA512

    4a4f3c511aaed6b65bd4edefda540ef791ce11fe8a7acd8dc6eee18c6cb16de9fadc5c0417434da29ceb9fb328075b3b6167cf6336c96cbfcfb97686a6d2f61d

  • C:\Windows\SysWOW64\5ny7.dll

    Filesize

    330KB

    MD5

    01e06192968763153af268754f32145f

    SHA1

    61c7df72f2b87187c98cfe7d6584105576b07691

    SHA256

    8301d66d0a02ee47734f8bed9ea94b124ea99aa2c623396d1f34a86455d9fcd0

    SHA512

    5e79667d5d13c843c1fb6a66f3d3635e58461e24448aae203da06fb4538f1e1ea5e234f41c06a0da1d00a3fd377290f7e9cc81b105cada7d47df2807ccdb9fd9

  • C:\Windows\SysWOW64\install.exe

    Filesize

    39KB

    MD5

    f337301737e731703a679b1f57935e6b

    SHA1

    73f2375c3e2fce1f19c861dea67a2016236310f3

    SHA256

    9d17f711e76f5ceff9692473e422a782adb10c32e3a0bf7e0fc942a5baf088f6

    SHA512

    cd83f58be56f39dd279b4528ba542e4673e2237a0f203954bd7e366b4787c8f6c6185815ecd217336f215efb2f91d3691a27b7c6b643de06600b0a38756fe418

  • C:\Windows\SysWOW64\mfc140fra.exe

    Filesize

    53KB

    MD5

    d28eec2092ea8c17f5a8d8ef52806b01

    SHA1

    225ceb74c7de5a00fcc74c71bc57d7e5d973645f

    SHA256

    a833e01ab3197afbfd0ab24c0d39eadc706b120702ca745a7b336c8829165f3d

    SHA512

    e2e537e359fd181861933d259d5cd00feb84bf5a6700296b7517c4ecb86ac350271f5649c619b6447823c7bf5c3467968826689be556700516d73415d64d53b1

  • memory/1340-23-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/1340-37-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/1724-59-0x00000000021B0000-0x000000000221A000-memory.dmp

    Filesize

    424KB

  • memory/1724-58-0x00000000021B0000-0x000000000221A000-memory.dmp

    Filesize

    424KB

  • memory/2036-63-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2036-62-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2036-60-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2036-64-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2036-65-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2036-66-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2036-67-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2036-68-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2036-69-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2036-70-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2036-71-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2036-72-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2036-73-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB