Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/07/2024, 16:14

General

  • Target

    357614cb12357fd105e61022e6d7016f_JaffaCakes118.exe

  • Size

    212KB

  • MD5

    357614cb12357fd105e61022e6d7016f

  • SHA1

    9144243880847a7a3c82c8585fe4eb58645177a0

  • SHA256

    eb459fda3b3ee1edb1f2567bd681565df41ecee778cbd055a0ec977503c8c56f

  • SHA512

    976d797fed91909073ee1bce24abe641c98541fd469c28e7b8ac9fbfc638cba83a6b20992d7bdcb4a51a6ccd97664ac7d6dc4743c20cf98321a5473b236a4dbf

  • SSDEEP

    6144:ep4VZIrqJQNbufrI4ukDnx/8vtvwzsmMAEu3Wev5kBirl87VFt6En9x7Xf7oufag:ep4UmGbMrI4ukDnx/8vtvwzsmMAEGHvk

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\357614cb12357fd105e61022e6d7016f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\357614cb12357fd105e61022e6d7016f_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4744
    • C:\Users\Admin\guijix.exe
      "C:\Users\Admin\guijix.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4304

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\guijix.exe

    Filesize

    212KB

    MD5

    f73e4f6e0d126745a9f9ffcd2bc4ca63

    SHA1

    3cc280767179ecb64e8c7d0967ebd090e91cb836

    SHA256

    0381429ceec6d65bebf7eb5ca1a21270acdbbdaabe8c170ce458f7411daa744a

    SHA512

    6d8b07303c1d86689004c05cb47ac4bf6b35e5d309070ac50536180592739ee937e7e6b4145e193b82b299e27abe7e724ac5540ac15e6eac852dd7e826f98733