Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/07/2024, 11:12

General

  • Target

    5bb1b51f497b8ab025bdb4d0305d177d_JaffaCakes118.exe

  • Size

    156KB

  • MD5

    5bb1b51f497b8ab025bdb4d0305d177d

  • SHA1

    cbb6d975e6c5c2513e04eb3b249b24043a101927

  • SHA256

    c4b32f6fc9b8f78d79b00cd40efada235d08ff7077fb4a183c11772b5daf36b9

  • SHA512

    683a884ea95df5ad43a09cf786cfbe0c86e24843fb60a64370e329e1ca7325a6d7e4e31c6d6a2ef08c0ceb08572d284a2705f3c8f060e0fd82e0764e25504f33

  • SSDEEP

    3072:xANPhL3YsZtSxch3Z1C5GbWyleXkbxy6cg48Af4oQZiEh3:+PhcsZ5b1OGbU0NByhWL

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5bb1b51f497b8ab025bdb4d0305d177d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5bb1b51f497b8ab025bdb4d0305d177d_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3180
    • C:\Users\Admin\noaqek.exe
      "C:\Users\Admin\noaqek.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1592

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\noaqek.exe

    Filesize

    156KB

    MD5

    a161b8d6e2ff6db0880750d9b602e07d

    SHA1

    be8343f202f357df0588801978755d1f4ce57b58

    SHA256

    4590d6afb096c81d42e87d89a277e79925ff0a56aa0d9960b3d2eb8da6620e26

    SHA512

    3e404c4264868c7e805f8d8640e8ac9d006a4c4dfdf7fb153e9f9d12b1c91b78135a5d2d29bffc9cf7413b3172f1697bd9ea437a6a5d941cd259771a273946c9