Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/08/2024, 09:30

General

  • Target

    89da15f64d54f5b3d77ea700915d73ca_JaffaCakes118.exe

  • Size

    100KB

  • MD5

    89da15f64d54f5b3d77ea700915d73ca

  • SHA1

    672ef440d55ee51e2eee02511fdf57f2677833de

  • SHA256

    bab1b628eaea5df14881393b10962cca0f42b4e137ba21a192c72ec0b10e822b

  • SHA512

    bea390dbf64a793d1c8c2644af2dd22beb29b73bc8814c06b1c796db0d03d7297b3c60b9ca1230aaa6f8cfbe21865eabadbb89a5966c698527ab043decbbe225

  • SSDEEP

    1536:AL18iAuismywsjLw0wF9MGM9K/oKtNgCMbA1bL3N+NM5UfFNIjnZ6k:gj/KLOM5OCnEk

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 50 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\89da15f64d54f5b3d77ea700915d73ca_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\89da15f64d54f5b3d77ea700915d73ca_JaffaCakes118.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Checks computer location settings
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4040
    • C:\Users\Admin\lfbek.exe
      "C:\Users\Admin\lfbek.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:4988

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\lfbek.exe

    Filesize

    100KB

    MD5

    d6567efac35390edb061aa4df30bde2a

    SHA1

    3899c67f8981fa17b6ca59986ca5f8cdb8c22dee

    SHA256

    84df29e01e58709002dbed071fb99ac16473ac496581273c8426f6b0eb44c550

    SHA512

    763e1145ed25c276ea50178f94eaae7d8020ef2777568153bcb724da40c283d501f04448ea4f13634174252709333dd506b6da30a09cb1c624bec952d23718e1