Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    126s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2024, 21:00

General

  • Target

    3c02f47aebb8dc7a63f5518616c7933c_JaffaCakes118.exe

  • Size

    382KB

  • MD5

    3c02f47aebb8dc7a63f5518616c7933c

  • SHA1

    021795252aa12e46f8e2d5a0eebe47661eb7f5c7

  • SHA256

    90742c57c39f84b452f86e7cc0002f082169a051df7c9f8cec31eba35cc5055a

  • SHA512

    95e6046fdcb231c2e2872ad6f1592ef132e1ba14469abf6553715b62a20e2189806decc9a8e022ced6d3c12801b95b94db8b51533d4a781881a0446b48a039fc

  • SSDEEP

    6144:r4awFL5sjPQHwTUHy0njrmp7fULaP7qBJDP+2IWTU/BAeM1XY7pu:sawFLiPg8kFuP702QCBmh

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c02f47aebb8dc7a63f5518616c7933c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3c02f47aebb8dc7a63f5518616c7933c_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4916
    • C:\Users\Admin\AppData\Local\Temp\3c02f47aebb8dc7a63f5518616c7933c_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\3c02f47aebb8dc7a63f5518616c7933c_JaffaCakes118.exe -rc
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2532
      • C:\program files (x86)\Internet Explorer\iexplore.exe
        "C:\program files (x86)\Internet Explorer\iexplore.exe" ya.ru
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2400
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE" ya.ru
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4016
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4016 CREDAT:17410 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\F30G0L6Z\ya[1].xml

    Filesize

    86B

    MD5

    87526c73e486749e12369f3b95d5f260

    SHA1

    bc5477e0d38ccae1adbbdf3126dd01e434fc2a74

    SHA256

    a820385a384e824a4553707aeac1e13d157760a08f844199cc5097e6b4070003

    SHA512

    f8b27fdffa83017eeba4cbd24473547553c999c1194324e616abd5f9631bbfc1e6f42642b1310fdd8c9b26c30ad28f6c4e2615eaaf6246c2ce74c5f28dfc6c9e

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\F30G0L6Z\ya[1].xml

    Filesize

    418B

    MD5

    37ee24e9cc74abfb1ce024519e1390e2

    SHA1

    20cc36e9bb32f7a13a6cc189e63e8d8211776139

    SHA256

    2fa7adbb0d978de79321c06d2d9f57afc97088986c50d8a3795a2298684e2794

    SHA512

    23049297b3261ed113561a49e0dbdc7da7d3d00234d3c92ba58a430e20a67874e55095058f40fd7fd19926b79aa38a7f5c27324596648aa6deb4da82a76dae84

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\vnm23y5\imagestore.dat

    Filesize

    597B

    MD5

    815178f36f493f80cb2916eaffd266dc

    SHA1

    c69babbd1ddc406fb45108bc40208e6d5219028a

    SHA256

    5ac419c500145e8cab029c3f4fe57fadbc479be15b1fbb8ad12b82b7e1f6f43e

    SHA512

    eacab3bf5b293070adc2920d4e6aca24b8425c3fd91488abcb6cbadfb9502f100ec9980bad3b62129b175e998d5a69160e21e321e48cdb50485e11d0c670c5d3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0BHOTC3C\213b7d745e28ebdb29d654ef909665d3[1].png

    Filesize

    397B

    MD5

    5c336a88c551e6d484b80bfe7d839457

    SHA1

    e777044cf3cb2427f53485015e7009cf00e84dfd

    SHA256

    0c222f4e596fdd2b9e7f04b8076c3697657d6f9bc2d56e74b259a546c88c7a77

    SHA512

    c969ddc9a34a5cae2f3cf3c360d4895d3cbae46dfcfbd35ce08e0d8b41a8d9c0d2259bf02658f79ed597f9d03304cf4f1389e0b3dba0572c6faedd5ded60817c

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0BHOTC3C\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee