Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    113s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/04/2024, 11:26

General

  • Target

    fa325461d6d806334e04129e09cfbff4_JaffaCakes118.exe

  • Size

    244KB

  • MD5

    fa325461d6d806334e04129e09cfbff4

  • SHA1

    ed18bb158cb42bb1834c97fb217d45ac949997a2

  • SHA256

    3d6ae7ee68a0a0743a4c0882ed9a69e74bb35b4c5fbb1f344ceab5c6329e8b8e

  • SHA512

    93385ce18f03b8fd1176d4772d0dda18911b6edc16cc63fbeef27d0463803578e8eacde10f522708434d6039a8b227cb6e3b88df4d24a303ca3f7b2c1f68b957

  • SSDEEP

    768:1lvMaLiJvypwbjMPkG1VuW/wqvRXMXp677yCzdXZRT2Nq1MaQnepMri14PGBEj6m:1Rl+Ja+lGVs4emEFbsP0

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa325461d6d806334e04129e09cfbff4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fa325461d6d806334e04129e09cfbff4_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:940
    • C:\Users\Admin\foateo.exe
      "C:\Users\Admin\foateo.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3492

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\foateo.exe

    Filesize

    244KB

    MD5

    ffb03ac9a92c5306e1d8d6b749fbd2d0

    SHA1

    9e2f073d4333cce83ebc2f5c0dbb78fb248a570f

    SHA256

    1f03b2150ed85ef0c09e232d6edf68e75fbb5a0118c1db44cf17401fa55d3083

    SHA512

    c7d20da91d0cfc992f818f1cd967b1b99172438457f65bf458c06b64be63f06463691d770f5b18f67f247de0c3b82a5fbc20e45cac732ba3b916c75c1d349c8e

  • memory/940-0-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/3492-33-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB