Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/10/2024, 06:13

General

  • Target

    4637b458169f1a616b39dbd69be2c588_JaffaCakes118.exe

  • Size

    115KB

  • MD5

    4637b458169f1a616b39dbd69be2c588

  • SHA1

    fd8e3085fa61867d9ab71dec5772eb3b1bb4022a

  • SHA256

    a8726e2dca08427204b95ce057baeee7959482719223d4f457088d3f9249c6d8

  • SHA512

    15b8f8f350de5985798f7adf4b28026e0dd3e19028ea76c8ab5ada55ec46a8bd9f1ae3c2cb973accb8411c862b4848df6da4a1d05b2b753670b7525116de0f5f

  • SSDEEP

    3072:SXu/MVID9mJ0oV2vDVylswCRWBifUQsNzQEnvs4M4:SjCQ2vRylqRuiNsNdnvs4t

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4637b458169f1a616b39dbd69be2c588_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4637b458169f1a616b39dbd69be2c588_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2276
    • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
      "C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:4776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsw8965.tmp\InstallOptions.dll

    Filesize

    12KB

    MD5

    07f3b3445f66e1089567796bf3c8be78

    SHA1

    851eb574c1067b23a654f8aa47b17ef599b24d1c

    SHA256

    a505e6c537a5ce0166227dda9f7671605395592ac9f1a3764e8a01b713939db1

    SHA512

    8c56308fff3a947b26fd0d98dbdd96c406ddf967f5d7abee8cba082b6c46a4e575094bb0bb981551ac5160bb5089cf6fb125dd17a659c427e28c07402adab1c3

  • C:\Users\Admin\AppData\Local\Temp\nsw8965.tmp\ioSpecial.ini

    Filesize

    586B

    MD5

    278ad09c4e58fe833eac2ff9e096526f

    SHA1

    635bcab4585606945dfc5e30115ddb820d4d39c4

    SHA256

    e4d8b0bdf71e7d739d222cd672c4b9fcc9c69d320d14bea250d8232b0aa7f879

    SHA512

    f7fb08f700176a50f258610ce83f10ae41649e0781f4085bb97aa47fafc5225e4e097e8bf3e55512e150eb067c15f8a01c1b924d4cd87f6bb62b57847433ce50

  • C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe

    Filesize

    115KB

    MD5

    4637b458169f1a616b39dbd69be2c588

    SHA1

    fd8e3085fa61867d9ab71dec5772eb3b1bb4022a

    SHA256

    a8726e2dca08427204b95ce057baeee7959482719223d4f457088d3f9249c6d8

    SHA512

    15b8f8f350de5985798f7adf4b28026e0dd3e19028ea76c8ab5ada55ec46a8bd9f1ae3c2cb973accb8411c862b4848df6da4a1d05b2b753670b7525116de0f5f