Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2024, 16:33
Static task
static1
Behavioral task
behavioral1
Sample
c88dc765a7c177418c78681e6c997ff4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c88dc765a7c177418c78681e6c997ff4_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
c88dc765a7c177418c78681e6c997ff4_JaffaCakes118.exe
-
Size
2.3MB
-
MD5
c88dc765a7c177418c78681e6c997ff4
-
SHA1
a1c6b7a24474ffd02ac9a3d515ffb9c1a255259e
-
SHA256
a815984315b712dc2067fcf34bc1ba95b9badebb78e20afb7fb3068bcdf1dbb7
-
SHA512
7680712c56b8fda096d8115d82dad75f44723f2b9298820a3d4b08276502584ac2f83d3930a27ed7ecad47f2774f4296870d9cf4bf10eafa15ae0d146451ebe1
-
SSDEEP
49152:4fSA5sZBZ2bLAqFEBjlqDnlhPYEwXYP5Rw3t8BxDemj2KgH:+16kRFEBjlanMGR6twpekg
Malware Config
Extracted
stealthworker
3.11
http://176.121.14.113:8888
Signatures
-
StealthWorker
StealthWorker is golang-based brute force malware.
-
Stealthworker family
-
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchoost .exe cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchoost .exe cmd.exe -
resource yara_rule behavioral2/memory/3508-3-0x0000000000400000-0x0000000000AE5000-memory.dmp upx behavioral2/memory/3508-8-0x0000000000400000-0x0000000002E34000-memory.dmp upx behavioral2/memory/3508-12-0x0000000000400000-0x0000000000AE5000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c88dc765a7c177418c78681e6c997ff4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3508 wrote to memory of 2120 3508 c88dc765a7c177418c78681e6c997ff4_JaffaCakes118.exe 91 PID 3508 wrote to memory of 2120 3508 c88dc765a7c177418c78681e6c997ff4_JaffaCakes118.exe 91 PID 3508 wrote to memory of 2120 3508 c88dc765a7c177418c78681e6c997ff4_JaffaCakes118.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\c88dc765a7c177418c78681e6c997ff4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c88dc765a7c177418c78681e6c997ff4_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\SysWOW64\cmd.execmd /Q /C C:\Users\Admin\AppData\Local\Temp/s.bat2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
305B
MD571b616e6a039339d8d805b180c5fb9ad
SHA11b1d9fbee32b71d9bd4b125a6be4a694a926ca2e
SHA25695e61578f1b14f4421c388872cbc940608ff6ecb1a3c6ec446d46a7554506507
SHA512bcd5e935265417c3a71097d68fb2f83b87bd06fb6d67e3019f4cddee953af9aab12dee61f7da8aa2f8131f090b3b7bc0c332a89b46e07effb156b4f491ef34e0