Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/07/2024, 20:39

General

  • Target

    2db86f4331060dde01d8e6da4d006632_JaffaCakes118.exe

  • Size

    100KB

  • MD5

    2db86f4331060dde01d8e6da4d006632

  • SHA1

    556bff46ce0840844b9b85d52a4a8521b2215907

  • SHA256

    2f27e76b9d5a0961e49d4e5de6153e981075f1724b7b1cb2669723e8dc843dbd

  • SHA512

    a0362ad8b1ae4e94571963a95ca476f2bb43e23f935da79bb490586c3c88cc2963ae5d8fa4aa91566e8661bcf1e1ce59b75f44a1188b7cb92a94ecc8e7aa781f

  • SSDEEP

    1536:WqtGR82NTzwTqMGAc4ohrPXo+73Rez8b0SyuNIjnZq:4wTNurPX7CuCnY

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2db86f4331060dde01d8e6da4d006632_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2db86f4331060dde01d8e6da4d006632_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2900
    • C:\Users\Admin\suoore.exe
      "C:\Users\Admin\suoore.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1136

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\suoore.exe

    Filesize

    100KB

    MD5

    3bc392c6bbb26938368e1a6ab0e3097c

    SHA1

    f593eb63ef63eed7cec2c0e7a6885f3282eb63a6

    SHA256

    ee9701a26d79c74ebc3253f96768f9000cfb2259370a0387f2add69f5ad850f5

    SHA512

    6a20699bd3c556ff95431bf32446340a6a3adc1b4384c67e06c78b56ad862817710274e008b7dec4735fc886e5b23743d232f1a59cc51db269b0a10420e3f65f