Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/07/2024, 09:20

General

  • Target

    2fcbf302035901dbdc0edc92d5eef4ca_JaffaCakes118.exe

  • Size

    200KB

  • MD5

    2fcbf302035901dbdc0edc92d5eef4ca

  • SHA1

    f8882b732f8488a84bcfd826cb1e2d17bc65dedd

  • SHA256

    0767570da9e3bf0713f618f5a97ca37d62507d0a3770ae26c003ac6944419ea3

  • SHA512

    dc95953f88e40d5f0a228c423d6d0648aa514800dba57eaa50e5e3c8af59f411db2a87660a112026461f6ac143f7d0938d683482e2623e198697c9bc9a365185

  • SSDEEP

    3072:WCATo/0YxM0tQ9nLHbB9WPliBs2HWWEakGJm9Ad:WCF+4QxL7B9WPli+yWWEazf

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2fcbf302035901dbdc0edc92d5eef4ca_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2fcbf302035901dbdc0edc92d5eef4ca_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4672
    • C:\Users\Admin\yailuov.exe
      "C:\Users\Admin\yailuov.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\yailuov.exe

    Filesize

    200KB

    MD5

    d465afebe8d70fff7e77d58a0350e00d

    SHA1

    ef5c2cd6fedcf0f8ea4b945d00c72bfdc0fbdbc1

    SHA256

    45dbffccfeaf60da27bd45730b9413672f48a85b12c63c889e6a84c5f8fc3457

    SHA512

    13896f2a361a9f8b8cf2657efe9abef956627e8d0adac919a00e94d230cb6926ce764f47efbc46d238f34eb0fa3e52880a66f0f528a2b8dc33a849a06b526f6d