Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/07/2024, 23:04

General

  • Target

    29874717228ce7bf0dcdb9f5fa948ecb_JaffaCakes118.exe

  • Size

    152KB

  • MD5

    29874717228ce7bf0dcdb9f5fa948ecb

  • SHA1

    077a09db5bf8610bd92b2d00dee5c632b3e7981c

  • SHA256

    f246c8f3da995f23eb12c1b0430bcb723a2d3a3c9b447d9b588a002ad34f5396

  • SHA512

    c13b87f215fc4995b8fec285e08ab6b61ec1b45287b442ce7e12017ced1c13a82d9c86b376bee92222f1d99b336acb0c22574c9125a0352a73a469ff8948b33e

  • SSDEEP

    3072:LMG4PYYh0Z1+7DxNUbaxIcz93bOButK+ooO:L+7DxVh3bHdO

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\29874717228ce7bf0dcdb9f5fa948ecb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\29874717228ce7bf0dcdb9f5fa948ecb_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:404
    • C:\Users\Admin\haaapiz.exe
      "C:\Users\Admin\haaapiz.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\haaapiz.exe

    Filesize

    152KB

    MD5

    fd5341eed42f7efde1168e9b15c814e4

    SHA1

    e49626adec229dd8f8f0707aecf9f8de4a5d0722

    SHA256

    9915769d6ae7ac43f31e861553c54a90c79d9a09797b0da74fd4266d8a603734

    SHA512

    942668f9a411c63a050af8f0ee2d520ce07919382dbe3adfc84869eefc1bc21eadc5534ea9cc62c4184d1587ec39caf75eae205c6298b58903e12dcea8305e71