Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/12/2024, 18:03

General

  • Target

    de05d6e9059d16c24eb5fbd8f83af700_JaffaCakes118.exe

  • Size

    2.6MB

  • MD5

    de05d6e9059d16c24eb5fbd8f83af700

  • SHA1

    6927b2015eca6a33b5812e2806bf1f2ad06a718c

  • SHA256

    c962634c994cac4d2722ce8bc5b73aa10e0a3d46c0ee0b7f24d0cfe522ef00d1

  • SHA512

    4c60ce4d69f40e0ce662f12a4af708261672b753b5b8df3be4b60378d04cd0cc6f6ecababfa4752f1b40b72f6caf804100f3f4d22892b67122c436e4db40d6d4

  • SSDEEP

    24576:IVYbWzOiA80yE23Z5EU22lH1QnxBxabsM8KGH7Co0OLeGrIocE5lArjPPA:hWzOryrZOU22lcx08KGbNLeGMb4unA

Malware Config

Signatures

  • Drops file in Drivers directory 12 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de05d6e9059d16c24eb5fbd8f83af700_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\de05d6e9059d16c24eb5fbd8f83af700_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:1640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\AppInfoDocument\Microsoft.VisualStudio.Tools.Office.AppInfoDocument\ToolsStudio.exe

    Filesize

    2.6MB

    MD5

    de05d6e9059d16c24eb5fbd8f83af700

    SHA1

    6927b2015eca6a33b5812e2806bf1f2ad06a718c

    SHA256

    c962634c994cac4d2722ce8bc5b73aa10e0a3d46c0ee0b7f24d0cfe522ef00d1

    SHA512

    4c60ce4d69f40e0ce662f12a4af708261672b753b5b8df3be4b60378d04cd0cc6f6ecababfa4752f1b40b72f6caf804100f3f4d22892b67122c436e4db40d6d4

  • C:\Program Files (x86)\Common Files\System\Ole DB\WindowsWindows.exe

    Filesize

    2.6MB

    MD5

    3593aa4f0c27ab8d9af031b90ec37d75

    SHA1

    8937c3cf7bad87e564c63d9d3c0c68de0511f9db

    SHA256

    1b98283eceea8cce2c7dc80e48c915b7cb8eaddfc0469c1ea2d5c12e13f486d6

    SHA512

    47825ed57d19f033699e6242c40fdd20b769a8f06129684d6c130dd3c23d037864d336730c7e5f3678f70a5d1f5a378747596151d3203a032b3c813642f0fa5e

  • C:\Program Files (x86)\Windows NT\Accessories\WindowsWordpadFilter.exe

    Filesize

    3.2MB

    MD5

    d63b2f2650b9c5b0b414012e3656cf8f

    SHA1

    e2b0dde1849c968a9c4ebe6ab36cf507d4bdbc2e

    SHA256

    2d7ed0024325e2beb193d9e824482eb723517e5daaca79c4ad04af65406e0cb3

    SHA512

    b63cebae0d2306a6f31b41ca8a6d9ae9181e7c02fa2aea42855d7417e3e3a78b29b1304b25a67ee2ce29e180b3f210609e81ee51d9cf0a916cbcfe1b1a57e16c