Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/07/2024, 20:10

General

  • Target

    64a196046475050ed52beced2f720f0a_JaffaCakes118.exe

  • Size

    106KB

  • MD5

    64a196046475050ed52beced2f720f0a

  • SHA1

    e2d6a0b74008303dfea21255400a549451c949c3

  • SHA256

    032e9862298a2f663cccaef747da9c672f3365cb4cdf7641de45a1516e0c309f

  • SHA512

    1721fed6db10b7e133d3e9a351c46bef193ed45198b4c694d98616087c526ac4dadcd8b6982fafd0bb2ae5a5ea9615d85b9ad1122755c25e729c168e30bd5713

  • SSDEEP

    3072:OSJKxamnBJ6WGx8AilK8q8x10QkdWjWZ8M6ZPENOL5wepcJfsbR/zgZc8lGnjvko:xcLZfPPfL

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\64a196046475050ed52beced2f720f0a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\64a196046475050ed52beced2f720f0a_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3152
    • C:\Users\Admin\youjaas.exe
      "C:\Users\Admin\youjaas.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\youjaas.exe

    Filesize

    106KB

    MD5

    09e95ffbd84bd985ec2d3fd04d6139a3

    SHA1

    572cf3a4b88b98b6e0f8fedcffa5a2e50a1f2dfa

    SHA256

    35216dac6a3d834e0e13c147c8d14db1608f1b543cb42c9b9b1b777277884d27

    SHA512

    d6be1cab1878c7aaef60e719bf5c946ed3d80034baba6ee15d43f58cb6457fb34998c1fc8412cf9ee54d48078ce55fb4308ce967b3d3fc2fbe2dc9255007aca1