Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/07/2024, 10:51

General

  • Target

    62f1da67aaf7838c06c36691f28556c8_JaffaCakes118.exe

  • Size

    100KB

  • MD5

    62f1da67aaf7838c06c36691f28556c8

  • SHA1

    982f718cb308c3c91e95ea2c9717166ef60ebcf1

  • SHA256

    7d6a92e7a77ad88a17af2a6eb5f15f9c28779a4cde9471d2ee2b4dad0768f420

  • SHA512

    0cbe13dc7ec337eba8da49128da3afcee3427a870f769cb96bb5afb465899337d3444fa311e0a7b79314d66150d6bb049c9ad6d6e7c4e2bba66ca1723f96d34a

  • SSDEEP

    1536:9AtGx82NTzwz3rMGAc4ohrPXo+73Rez8b0SyuNIjnZq:/wz3+urPX7CuCnY

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 53 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\62f1da67aaf7838c06c36691f28556c8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\62f1da67aaf7838c06c36691f28556c8_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2764
    • C:\Users\Admin\naiqad.exe
      "C:\Users\Admin\naiqad.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\naiqad.exe

    Filesize

    100KB

    MD5

    4c9fc416454deac83395d36c5185cd75

    SHA1

    5a7df147f40df33a1bba0c0c32b5fee63801d667

    SHA256

    4841dba423ce711d0065ba7d534c7498dc0008f8ead49d6465461b0eb947f89a

    SHA512

    a195cd9e3902b5fefaaadaffb1ee18933d6a3e579809fe50fef70d5900d6f87fc076f73263b689e4fc0fdb5ec911d06c5cb202e42275f8b26b0386d127bdb554