Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/07/2024, 10:50

General

  • Target

    457d793b3596a22e316ce2b366307636_JaffaCakes118.exe

  • Size

    92KB

  • MD5

    457d793b3596a22e316ce2b366307636

  • SHA1

    887bade56139e44578372cf8b6029e4bbbcd4a14

  • SHA256

    0e3d11914c9f888d8a57ea29a94bd2f3f543b4583a2025401edb4d160c3cbb62

  • SHA512

    bd2318f94fa4a221ab7e75fafdf95c23b90b8aaed127f14f48b95acf7de6335bbd55ce7a1dbc261dbfc1a419ede7c4451e5f6fb0ddcbad21a1dc0aba56b14178

  • SSDEEP

    1536:BGxBaPKsZLyJxFdhXgI0TRQP/FY0Y6Y2YkYGYHRHNxtwv4RaoacXcmKdHEa:GaPDpCH6QP/uRNBcx5

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\457d793b3596a22e316ce2b366307636_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\457d793b3596a22e316ce2b366307636_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4008
    • C:\Users\Admin\xooexu.exe
      "C:\Users\Admin\xooexu.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\xooexu.exe

    Filesize

    92KB

    MD5

    6ba7cf018fc7b63698e4703a14f4cc55

    SHA1

    9b77118df519f9c4c46ae8acff2c7c6c48ce30e8

    SHA256

    32e3fe8862ef85bc12bf674876406ecee646cbc50f6df876378ede09781cb2a7

    SHA512

    905546a996fb80e3ab3382dfb8a3fd711914b029e4b8cc49ab12d8ac075f1efd29a0e356c5aa7d1abd722f29ed27ee4a123c6b2be6aab9e751971172ebb3a7ea