Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2024, 23:59
Static task
static1
Behavioral task
behavioral1
Sample
e3990bdc213c9277e5da5974df16db18_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e3990bdc213c9277e5da5974df16db18_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e3990bdc213c9277e5da5974df16db18_JaffaCakes118.exe
-
Size
20KB
-
MD5
e3990bdc213c9277e5da5974df16db18
-
SHA1
71e78e640fd2deb40c22ddca091ad43b7cc6a645
-
SHA256
26cddaeeb7e6a597a38114e27a0cc287e6c8b060dbfd3bad9a97f7661b58a6f8
-
SHA512
eb96295b173cb2bf798654d7608e33e0a9250513747180387ae4ccc9b5adb386e3d5e4d36c35bb39b752d911135d49a6f121eba42103628bc52735be929b7381
-
SSDEEP
384:e6NIZA7hW1fqguR1+jZEt8sNrrfeK017uSlI9dATJApQ4GulmCCK:RCy7cqglaJNrrfumfQ4GuECCK
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 4048 e3990bdc213c9277e5da5974df16db18_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DiskMan32 = "C:\\Windows\\DiskMan32.exe" e3990bdc213c9277e5da5974df16db18_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\DiskMan32.dll e3990bdc213c9277e5da5974df16db18_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\DiskMan32.exe e3990bdc213c9277e5da5974df16db18_JaffaCakes118.exe File opened for modification C:\Windows\DiskMan32.exe e3990bdc213c9277e5da5974df16db18_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4048 e3990bdc213c9277e5da5974df16db18_JaffaCakes118.exe 4048 e3990bdc213c9277e5da5974df16db18_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4048 e3990bdc213c9277e5da5974df16db18_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4048 e3990bdc213c9277e5da5974df16db18_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4048 wrote to memory of 3452 4048 e3990bdc213c9277e5da5974df16db18_JaffaCakes118.exe 56 PID 4048 wrote to memory of 3452 4048 e3990bdc213c9277e5da5974df16db18_JaffaCakes118.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3452
-
C:\Users\Admin\AppData\Local\Temp\e3990bdc213c9277e5da5974df16db18_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e3990bdc213c9277e5da5974df16db18_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD588243a8843f5aa8be8ceb3af0a6deba7
SHA17f2b7227ebc88dcd68bb9c8e44cdbaf026c77bd9
SHA2560e4889ca67c9df4391a97546eabbb43dcee73746e09c0f21e180718cd38ca19c
SHA5124a26509fb20fb7038815ed19a0eeafd978f096aef28029875bd0b04db5179b6edf643a63b31af6bc2302ad840e98b0ad369b8dfd800c593a89df5cd07c8ec9b6