Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    50s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/06/2024, 15:59

General

  • Target

    09760e935e89ebe55bce3b0e6ac51458_JaffaCakes118.exe

  • Size

    96KB

  • MD5

    09760e935e89ebe55bce3b0e6ac51458

  • SHA1

    20afaed827dec36628c91294566cccfc60f85fb2

  • SHA256

    c1914827c240a42b977b9fc07ff9fec9b04f7cb44dfbd7128b4b45f75bb0f377

  • SHA512

    af6d85518162740d97a450f3f964edaa6a4111472d51546e2681f382c363c2174171ea38086b8f829075f582034fe3ed635aadeb629dc73e4d66433b5125b472

  • SSDEEP

    1536:zQQBHXf6cO/hYikGulSc16l6u+NMMl/KlYv1Tq5ThFQNIjnZT:nEhKlu8CFFQCnh

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09760e935e89ebe55bce3b0e6ac51458_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\09760e935e89ebe55bce3b0e6ac51458_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Users\Admin\ziasaag.exe
      "C:\Users\Admin\ziasaag.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\ziasaag.exe

    Filesize

    96KB

    MD5

    8daf5c1c881a44d6fcf870eff611bbca

    SHA1

    0241062cfddadbd031bcb96b96fee385229707c7

    SHA256

    e93c0b601a488e7aa85da2669c0bd8cba727b59c4f0eba0ccd2cd14e08b3ac1c

    SHA512

    c4e44bcd53af9f3774d36e4c4db8bac4247464d45364fda80590b394f06d21356c8c72e6a982d27bb9d116904d47a315905b1089b012552747c3bc0c257fc598