Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/04/2024, 11:34

General

  • Target

    d29be6e2c008ada25460b0dddb64fee1_JaffaCakes118.exe

  • Size

    1.9MB

  • MD5

    d29be6e2c008ada25460b0dddb64fee1

  • SHA1

    26ec752f67fb01dadce8415065730ed98258e5a0

  • SHA256

    295a3b6dd2930ef076a0d8253ca01f72821d301a999a4c7e959d2e17612ea380

  • SHA512

    fbd7d71ab060b7fb106ef309486aeeaf2181815a6de87093462d86fe43d7695522a870d84f301a0758b16d5c7fbf1e8cdf371bc126487d8e2a5d5ce6a65ac204

  • SSDEEP

    49152:Qoa1taC070d9lxNr8qqu8BQkKvqhwW5mNk:Qoa1taC0KbaAC5Gk

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d29be6e2c008ada25460b0dddb64fee1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d29be6e2c008ada25460b0dddb64fee1_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3092
    • C:\Users\Admin\AppData\Local\Temp\3335.tmp
      "C:\Users\Admin\AppData\Local\Temp\3335.tmp" --splashC:\Users\Admin\AppData\Local\Temp\d29be6e2c008ada25460b0dddb64fee1_JaffaCakes118.exe DA33BE8C732F77BE2B06EE8B57A9B1C09A21D4559A29EEDA1DFE079FBA2091A968393785AF591949A53E5EDF484B66EA5EAA3C458D8CBA36FF59B35D7DEE8EBB
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1092

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3335.tmp

    Filesize

    1.9MB

    MD5

    9458d5f693fe3eeb53a080feb4c87c89

    SHA1

    5406133eda3aea0085d19f7c42cb59d7dc0708f0

    SHA256

    7ac69496cc2dd7494d404be719ead6ee8f017263702df48cdfe99717c179b834

    SHA512

    22643af9a07b42fd53057aa15f6413192755ce4bd10c41e0c56f5f3a13664698b659b4ef6c588f84fbc1359cf6d6cc26bb69b151570ff5caaa6f256ede403ceb

  • memory/1092-5-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB

  • memory/3092-0-0x0000000000400000-0x00000000005E6000-memory.dmp

    Filesize

    1.9MB