Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/10/2024, 05:10

General

  • Target

    55a2ed99ab5f90b3adab07d03cc944d9_JaffaCakes118.exe

  • Size

    116KB

  • MD5

    55a2ed99ab5f90b3adab07d03cc944d9

  • SHA1

    27ad81e203cc0e5e193331147418b6c17a3e9822

  • SHA256

    b340b8ea5192145edfbee4b08fca0367531f7755b3356b751ef6c9d938edb4d4

  • SHA512

    e43f74d862c3edca7dae15fdabfc7ddbd3a94f9f464e554041fb343094c745f8d182faca3c7d617c55ebd22d1f3b7b4150241e6d732ecf8b37c4781c2965555c

  • SSDEEP

    1536:YGuryWkfL/+EHKwe+nEfJ/8LkDRouai7Of+YkKk7e9AeIuSDKP:YGuOzmEqwhMJ/8LkmuF7q+Yk7jeIuS2P

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3440
      • C:\Users\Admin\AppData\Local\Temp\55a2ed99ab5f90b3adab07d03cc944d9_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\55a2ed99ab5f90b3adab07d03cc944d9_JaffaCakes118.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4436
        • C:\Users\Admin\AppData\Local\Temp\55a2ed99ab5f90b3adab07d03cc944d9_JaffaCakes118.exe
          "C:\Users\Admin\AppData\Local\Temp\55a2ed99ab5f90b3adab07d03cc944d9_JaffaCakes118.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2728

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\chdkCJ7dF6.log

      Filesize

      4KB

      MD5

      e902586126f6819d70c276951934060e

      SHA1

      70c5fff85d05ee06f8feb095ff4c2e17c1758ed5

      SHA256

      8c927fb27e3fad539adead2a6902ba36bc07c4165d3cf8e5a463f805f7c15a2a

      SHA512

      60b3fbfc4a878dc1fd7bf789e0a6270bfd48ef488109dc27a8d0edefee918a6587915184d70a8776061394cd07aee3aa5343b477b31ac8323809d5bebf5fecec

    • memory/2728-19-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/2728-23-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/2728-27-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/2728-24-0x0000000000400000-0x000000000041A000-memory.dmp

      Filesize

      104KB

    • memory/4436-17-0x0000000002320000-0x0000000002330000-memory.dmp

      Filesize

      64KB

    • memory/4436-20-0x0000000002320000-0x0000000002330000-memory.dmp

      Filesize

      64KB

    • memory/4436-26-0x0000000002320000-0x0000000002330000-memory.dmp

      Filesize

      64KB

    • memory/4436-16-0x0000000002320000-0x0000000002330000-memory.dmp

      Filesize

      64KB

    • memory/4436-15-0x0000000002320000-0x0000000002330000-memory.dmp

      Filesize

      64KB

    • memory/4436-12-0x0000000002320000-0x0000000002330000-memory.dmp

      Filesize

      64KB

    • memory/4436-10-0x0000000002320000-0x0000000002330000-memory.dmp

      Filesize

      64KB