Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/07/2024, 11:24

General

  • Target

    6763416d3a5f38070cb64a532f1dc856_JaffaCakes118.exe

  • Size

    92KB

  • MD5

    6763416d3a5f38070cb64a532f1dc856

  • SHA1

    5bbc6c8e30981ab8b8f74723094435420c4a5bd7

  • SHA256

    f5ac6d5ec49661b7269ece4edaa931545a7902c767bd91cde1dbc9c8d128bf84

  • SHA512

    0e3c765673935688ab283c905b5f636b3ab130164f645ec2ab1a8115ab69a0455a70fc83913b6f0c8563c516979dccf5256de3cff99fe6af5a59044d8bba569f

  • SSDEEP

    1536:tahiOd0FEJ6kri7hwj4Pnv/rvyvJvSvbvfv3yPHpi+a:MhiOdW1mmyPQX

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 51 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6763416d3a5f38070cb64a532f1dc856_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\6763416d3a5f38070cb64a532f1dc856_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3952
    • C:\Users\Admin\kuorih.exe
      "C:\Users\Admin\kuorih.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\kuorih.exe

    Filesize

    92KB

    MD5

    dea39484e82a160f09e2001ecaf30053

    SHA1

    b20f24869ca231f79902a9e1d6c2d9f2ba936e16

    SHA256

    203bfe0b2bd3a8471f65556a082615ebf9eb2ba82a5dacc20b90fdef863dd334

    SHA512

    ca0b67be4f1f4290fece5c7416fb4ee58007d184d268b60e64f269b0505a1eb76c53162d8a5bfcd5a6e33cc27ac98692d6405964f2689beb3649923daf2465ba