Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/07/2024, 22:02

General

  • Target

    266292080bbba5b1f2e03d0a82426ac3_JaffaCakes118.exe

  • Size

    136KB

  • MD5

    266292080bbba5b1f2e03d0a82426ac3

  • SHA1

    29dff12cd9ae389d1328d7d47437deebd564092a

  • SHA256

    eb0c944e1325de5859e5a2bd08f1c2e4b1b55b36daff121d1702dec931c2fc06

  • SHA512

    855b6fffde48be31f7df7f394e3cdd84a70938abb892f1a1ce55c5e3018e2252a564e34183fa95057a42f00dbf9cd01348d322729ee4f5661077458bdea34519

  • SSDEEP

    1536:NhmqXOTy6npK9x5WPjeATvbtjYYVHdzqZgIYEOCozOZD:yqX8jI93WPyAdYZgI2CozAD

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 50 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\266292080bbba5b1f2e03d0a82426ac3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\266292080bbba5b1f2e03d0a82426ac3_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1288
    • C:\Users\Admin\heuepe.exe
      "C:\Users\Admin\heuepe.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\heuepe.exe

    Filesize

    136KB

    MD5

    7839b323159cd736a7e581bd368bd176

    SHA1

    20c28ab9d981c1b09e0f6de259deb6e2ebca8c9c

    SHA256

    123ac09f8abf26119bb55a6e07560648da95f59196a9c726d6ec04b5bef6d0e7

    SHA512

    eaefd43f897574689fd37979311ef0081014860dd7b21e63520c826fe99fa5fc192afedee6e2971bb8252ec0cbed1f168198a1cc30032967db8d89b988667217