Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/06/2024, 15:13

General

  • Target

    09410cd64e4c3ddc45a0f7a9e705093c_JaffaCakes118.exe

  • Size

    60KB

  • MD5

    09410cd64e4c3ddc45a0f7a9e705093c

  • SHA1

    e6446fd06fa7efbb34f345677f6d6a571eb9fe86

  • SHA256

    e2c6c075e5337f1c29781972cbd7a849486fcf2a9aab258a5848104739e334bb

  • SHA512

    9de6a85292a9ee121c493057395328f3d446dc8d47154a649b8b32a3717f734a456087cb9702f13d7a343e01327d66af924bf5798e0f547901a71cd6175e4373

  • SSDEEP

    768:+XWmpnBOFlpJ1VUU6+9A/v/bVlbdfs3OfKDHGIHY56WX:+XWNpJXd6y43wY56WX

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09410cd64e4c3ddc45a0f7a9e705093c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\09410cd64e4c3ddc45a0f7a9e705093c_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4408
    • C:\Users\Admin\puoiw.exe
      "C:\Users\Admin\puoiw.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\puoiw.exe

    Filesize

    60KB

    MD5

    f4ac83ec72fab79efc24ff8d54b6cb56

    SHA1

    a7afe32a2d5bccca1f140a55f8ac18020a6ecaa1

    SHA256

    6d866230e8da8ac239d8bf20319d7c2859b3f260e29caa1dd1365eed7438e501

    SHA512

    f58b50a9f6e5e487ad7fc66fe800c859a59e0b9b0bc6d34784ed7d1be676f317f18a19097415ee81596958e7d86a12b60c1b421014b5a223b47684ae5e51c980