Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/02/2025, 07:48

General

  • Target

    JaffaCakes118_0a8f3230035eb9a733d4f9e4fb494e01.exe

  • Size

    471KB

  • MD5

    0a8f3230035eb9a733d4f9e4fb494e01

  • SHA1

    13cdf1d81d0b5c54e6046404eedd2980a2f969cc

  • SHA256

    66807ab5bc04055670b7b63fbbd00537279e4c9e39c40406c76ce50cf9758b7f

  • SHA512

    cecaddf885f55a6297e027b1efacc38284d4d23be3b190a3a093c09077ac29d45cae3dd7debe46d897f832e04165c4a3673f5fdfbadfbd100177c4943faea6b0

  • SSDEEP

    12288:KlC9p23TK3F5dQhQXe+CM9M3z701ybN0uPWK:KDCF5d+QXeg9MD701EO

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 2 IoCs

    When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0a8f3230035eb9a733d4f9e4fb494e01.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0a8f3230035eb9a733d4f9e4fb494e01.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:432
    • C:\Windows\SysWOW64\cmd.exe
      "cmd"
      2⤵
      • Subvert Trust Controls: Mark-of-the-Web Bypass
      • System Location Discovery: System Language Discovery
      • NTFS ADS
      PID:4384
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0a8f3230035eb9a733d4f9e4fb494e01.exe
      JaffaCakes118_0a8f3230035eb9a733d4f9e4fb494e01.exe
      2⤵
        PID:4100
      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\Credentials\taskhostt.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\Credentials\taskhostt.exe"
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4808
        • C:\Windows\SysWOW64\cmd.exe
          "cmd"
          3⤵
          • Subvert Trust Controls: Mark-of-the-Web Bypass
          • System Location Discovery: System Language Discovery
          • NTFS ADS
          PID:3456
        • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\Credentials\wmpnetvk.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\Credentials\wmpnetvk.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1084
          • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\Credentials\wmpnetvk.exe
            wmpnetvk.exe
            4⤵
              PID:3588

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\Credentials\taskhostt.exe

        Filesize

        8KB

        MD5

        7b82b2f80d81897ef6fdfd4f3821c6e5

        SHA1

        c5d2bf5a4134df0b7b23a134c2610bbd84b999cb

        SHA256

        77a9dc848022de79981a1a1667e2b59658e806c6d8874c325b129a36e51e515e

        SHA512

        81c330f841945033c0ceec57ff709be4cc6350edca1419e254ab3f4231f8991efaf227b989127d6bb746c5d961a224105f3d191a96e5711091681075e4b53ebf

      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\Credentials\wmpnetvk.exe

        Filesize

        471KB

        MD5

        0a8f3230035eb9a733d4f9e4fb494e01

        SHA1

        13cdf1d81d0b5c54e6046404eedd2980a2f969cc

        SHA256

        66807ab5bc04055670b7b63fbbd00537279e4c9e39c40406c76ce50cf9758b7f

        SHA512

        cecaddf885f55a6297e027b1efacc38284d4d23be3b190a3a093c09077ac29d45cae3dd7debe46d897f832e04165c4a3673f5fdfbadfbd100177c4943faea6b0

      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\Credentials\wmpnetvk.exe:ZONE.identifier

        Filesize

        27B

        MD5

        130a75a932a2fe57bfea6a65b88da8f6

        SHA1

        b66d7530d150d45c0a390bb3c2cd4ca4fc404d1c

        SHA256

        f2b79cae559d6772afc1c2ed9468988178f8b6833d5028a15dea73ce47d0196e

        SHA512

        6cd147c6f3af95803b7b0898e97ec2ed374c1f56a487b50e3d22003a67cec26a6fa12a3920b1b5624bde156f9601469ae3c7b7354fa8cf37be76c84121767eed

      • memory/432-26-0x0000000074EF0000-0x00000000754A1000-memory.dmp

        Filesize

        5.7MB

      • memory/432-2-0x0000000074EF0000-0x00000000754A1000-memory.dmp

        Filesize

        5.7MB

      • memory/432-1-0x0000000074EF0000-0x00000000754A1000-memory.dmp

        Filesize

        5.7MB

      • memory/432-24-0x0000000074EF0000-0x00000000754A1000-memory.dmp

        Filesize

        5.7MB

      • memory/432-25-0x0000000074EF2000-0x0000000074EF3000-memory.dmp

        Filesize

        4KB

      • memory/432-0-0x0000000074EF2000-0x0000000074EF3000-memory.dmp

        Filesize

        4KB

      • memory/1084-22-0x0000000074EF0000-0x00000000754A1000-memory.dmp

        Filesize

        5.7MB

      • memory/1084-23-0x0000000074EF0000-0x00000000754A1000-memory.dmp

        Filesize

        5.7MB

      • memory/1084-29-0x0000000074EF0000-0x00000000754A1000-memory.dmp

        Filesize

        5.7MB

      • memory/4808-18-0x0000000074EF0000-0x00000000754A1000-memory.dmp

        Filesize

        5.7MB

      • memory/4808-19-0x0000000074EF0000-0x00000000754A1000-memory.dmp

        Filesize

        5.7MB

      • memory/4808-27-0x0000000074EF0000-0x00000000754A1000-memory.dmp

        Filesize

        5.7MB

      • memory/4808-28-0x0000000074EF0000-0x00000000754A1000-memory.dmp

        Filesize

        5.7MB