Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/07/2024, 18:29

General

  • Target

    42d70e497677df40c6d2e506db979fee_JaffaCakes118.exe

  • Size

    124KB

  • MD5

    42d70e497677df40c6d2e506db979fee

  • SHA1

    c72c06b23e3a5a08b1b5d724ab17cb29a7541ea7

  • SHA256

    72a705d351211e9ec40f79105cb63b1e85aa74ee41027f6b1120d606610e1986

  • SHA512

    10c637bb9f0df951a744ddc36aa5c3409f61929af88fe9f7c9fd7fec19f16e639fc1dfccbf540cf44067e45c8976da94d93af9460af5e3b08152afe7e0126c0d

  • SSDEEP

    1536:lLEf4wRVuBxLDtVdHa27J14lWxporZ45iMNeG0h/y:1Ef4wRVkLt6gJ1uPt45eq

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 50 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\42d70e497677df40c6d2e506db979fee_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\42d70e497677df40c6d2e506db979fee_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4824
    • C:\Users\Admin\wauqaa.exe
      "C:\Users\Admin\wauqaa.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\wauqaa.exe

    Filesize

    124KB

    MD5

    4bbff7ad94ff3ab5ebad8d0eef1a3ece

    SHA1

    8e06d5f0fd5b84a335a5f8348bfa79309fee0b69

    SHA256

    9940d579747ce8b61e85845b8f83cbc488fcf024d004114b91389db022c0018d

    SHA512

    142fce17a4d8fe0b188a48e2a1baf623739a4fdcc52b03085054c1bd18c3553e049d2bd6ee992054366a8474f889d7d45688eaf68242724142a010804a9ac07d