Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/04/2024, 14:47

General

  • Target

    fa87fd28fc92dd89efc9bf0215aa6ebb_JaffaCakes118.exe

  • Size

    252KB

  • MD5

    fa87fd28fc92dd89efc9bf0215aa6ebb

  • SHA1

    485ea45c96d00d36634c7eabf7a0f41871357d02

  • SHA256

    50480142a432b6c1770e4a026ae416d784acfe8e449ed336aba1f6a2bbfcced5

  • SHA512

    d73fe547cbbd9d6a8b58ceadb9bc269c277e9b36235ba1a5aa5c9c8e6e7e19da640638ede899699fdda79ec1cb7012f83d99581f67923b96e96f215c2307d208

  • SSDEEP

    3072:gY7jaHLUCX34dmgJYsozBm2tfyXu1h5CeriHACqH/1ptrMAoSeLv5YXm:gAqUCXIdm/NBm2tuMpBeS

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa87fd28fc92dd89efc9bf0215aa6ebb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fa87fd28fc92dd89efc9bf0215aa6ebb_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2324
    • C:\Users\Admin\duufoul.exe
      "C:\Users\Admin\duufoul.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\duufoul.exe

    Filesize

    252KB

    MD5

    fb575eefe805d4ab38369f7a2eddc37e

    SHA1

    4d1934f12920092e9291c9c2ca7215062eda776c

    SHA256

    7bac4db0bf16b6a66a21584200a701256de7861a3fa4e5eaaf28cfb915452486

    SHA512

    b055aa2308e8b0312f70a2ff7bc09dad08202e2ff26912510f60f487da36b8b4a53f9e28c7b17278ad09ab0a98d51650ccc041914ae176a51080f5831a4ab734