Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    92s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/04/2024, 03:39

General

  • Target

    e9211fc030fb4fe8d87d84abfab719fe_JaffaCakes118.exe

  • Size

    385KB

  • MD5

    e9211fc030fb4fe8d87d84abfab719fe

  • SHA1

    e8eef7398bb9786a4d80518bf02889353a66618f

  • SHA256

    45384c40b455d4a20f22e43453e265ab39ec075737c1e2692b7f76f61c37a8eb

  • SHA512

    39f296bcbdf164bce94ed533cb90573db20acac9c1e775d8334a5aa218ba5383b7927998b048efada3ab5858f89d39eb6b97b90433ea940764f328f847d4baa9

  • SSDEEP

    12288:EJzZDN3E/ad+IP9wOBUxIz05Yh4dMbGJYLxVWPB1LslWxDV0ucYsB:0L36itegj43DV0fB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e9211fc030fb4fe8d87d84abfab719fe_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e9211fc030fb4fe8d87d84abfab719fe_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4844
    • C:\Users\Admin\AppData\Local\Temp\e9211fc030fb4fe8d87d84abfab719fe_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\e9211fc030fb4fe8d87d84abfab719fe_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\e9211fc030fb4fe8d87d84abfab719fe_JaffaCakes118.exe

    Filesize

    385KB

    MD5

    5c6c1d5de17dd2fc3d0adc1dfe4856d9

    SHA1

    6d041c22f0efe596c0b2c11fe21da173fd471c73

    SHA256

    dd7d7d9a992fd039ad32e4211ecccdf5890c2f560cb34821b6c1c2bacc7fc1c7

    SHA512

    80d5438fba67d4e74b5abb06d91daffeab7325aaaef8c0868cf98ac27f827a41e7b28ae6006695d3b3257fcaed874057f743181a3810573098bfa10b63c180bd

  • memory/744-13-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/744-19-0x00000000015D0000-0x0000000001636000-memory.dmp

    Filesize

    408KB

  • memory/744-20-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/744-21-0x0000000004E80000-0x0000000004EDF000-memory.dmp

    Filesize

    380KB

  • memory/744-30-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/744-36-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/744-32-0x000000000B7B0000-0x000000000B7EC000-memory.dmp

    Filesize

    240KB

  • memory/4844-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/4844-1-0x00000000015A0000-0x0000000001606000-memory.dmp

    Filesize

    408KB

  • memory/4844-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/4844-11-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB