Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/04/2024, 21:39

General

  • Target

    e3582e1202a0db99c881b1905092010b_JaffaCakes118.exe

  • Size

    248KB

  • MD5

    e3582e1202a0db99c881b1905092010b

  • SHA1

    733eaa5b059e370fe9575faca6c4519fc169e525

  • SHA256

    bd2e5907d8cd980222629e406b520184dfe32628b550aeab607e6b28ab355f62

  • SHA512

    df21f1061c5dbd3d8a7999682e0f35085b099c7aff4501a5970015282ccac6b63ae047e51bb4d6b7bda1089d0c47cf3bb12f0dfa402097c5a58a5d0fdd03c0aa

  • SSDEEP

    1536:A63K2xSC61wkNKPo56NMgErGzC4h4a0HHrnw2SiYT+zRs5bMA1W07u4Fi53bXHRO:/gCg8PWGT7Aw2mi53THvbs7sEn

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e3582e1202a0db99c881b1905092010b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e3582e1202a0db99c881b1905092010b_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\Users\Admin\gpkur.exe
      "C:\Users\Admin\gpkur.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\gpkur.exe

    Filesize

    248KB

    MD5

    87205b1d67554faf3da391e43072d688

    SHA1

    d31aa8fca1c04d149b121fa33b8150ac10beb24d

    SHA256

    cca00ff3eca744b57dea69f09906ab0c1776db6799bb1749fa6d1d9fcaac4acf

    SHA512

    867c1cefb7d8f501ae36dd5b5b5e1d11d3a2e4f7b6b55872e9517764d81af07a7dd925496f748e3866a2c4d9656724427acd8cdb99fe10af28c63400e89464c2