Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 07:01 UTC
Static task
static1
Behavioral task
behavioral1
Sample
e96a9dbcc089237f78ec8c2fb417cd43_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e96a9dbcc089237f78ec8c2fb417cd43_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e96a9dbcc089237f78ec8c2fb417cd43_JaffaCakes118.exe
-
Size
336KB
-
MD5
e96a9dbcc089237f78ec8c2fb417cd43
-
SHA1
3bd4a49dc3efe6a3ad06e67a8dc4bae8a8a8b6c4
-
SHA256
c06acd7f6f4c44fc52d9f07b430079e12dc1b857c346818f0bd2064774d8df7b
-
SHA512
386fc40141d7a8e4295b1c00959eacb6414c3d450ec02bae6449bc3183dc5d9212098471d8023e2101ecba82595811273e98cd1a0128479511adac3a7936c1aa
-
SSDEEP
6144:208bRhsVZdfF8oVnzhstpwQvK+w8B0aRGJi4oAle0esKPUN4b8j7xyUg5JVcS:2B4V/fFbUpwTn8GJi4cxUN4b8jkUg5Jm
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4184 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2312 X -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 456 set thread context of 4184 456 e96a9dbcc089237f78ec8c2fb417cd43_JaffaCakes118.exe 96 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2312 X 2312 X -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 456 e96a9dbcc089237f78ec8c2fb417cd43_JaffaCakes118.exe Token: SeShutdownPrivilege 3536 Explorer.EXE Token: SeCreatePagefilePrivilege 3536 Explorer.EXE Token: SeShutdownPrivilege 3536 Explorer.EXE Token: SeCreatePagefilePrivilege 3536 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3536 Explorer.EXE 3536 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3536 Explorer.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 456 wrote to memory of 2312 456 e96a9dbcc089237f78ec8c2fb417cd43_JaffaCakes118.exe 87 PID 456 wrote to memory of 2312 456 e96a9dbcc089237f78ec8c2fb417cd43_JaffaCakes118.exe 87 PID 2312 wrote to memory of 3536 2312 X 57 PID 456 wrote to memory of 4184 456 e96a9dbcc089237f78ec8c2fb417cd43_JaffaCakes118.exe 96 PID 456 wrote to memory of 4184 456 e96a9dbcc089237f78ec8c2fb417cd43_JaffaCakes118.exe 96 PID 456 wrote to memory of 4184 456 e96a9dbcc089237f78ec8c2fb417cd43_JaffaCakes118.exe 96 PID 456 wrote to memory of 4184 456 e96a9dbcc089237f78ec8c2fb417cd43_JaffaCakes118.exe 96
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of UnmapMainImage
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\e96a9dbcc089237f78ec8c2fb417cd43_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e96a9dbcc089237f78ec8c2fb417cd43_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\32698158\X193.105.154.210:803⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2312
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Deletes itself
PID:4184
-
-
Network
-
Remote address:8.8.8.8:53Request133.211.185.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request82.90.14.23.in-addr.arpaIN PTRResponse82.90.14.23.in-addr.arpaIN PTRa23-14-90-82deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request22.160.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request232.168.11.51.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request183.59.114.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request206.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.210.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request91.90.14.23.in-addr.arpaIN PTRResponse91.90.14.23.in-addr.arpaIN PTRa23-14-90-91deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request14.227.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request85.65.42.20.in-addr.arpaIN PTRResponse
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
73 B 147 B 1 1
DNS Request
133.211.185.52.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
82.90.14.23.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
22.160.190.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
232.168.11.51.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
183.59.114.20.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
206.23.85.13.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.210.232.199.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
91.90.14.23.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
14.227.111.52.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
85.65.42.20.in-addr.arpa
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5686b479b0ee164cf1744a8be359ebb7d
SHA18615e8f967276a85110b198d575982a958581a07
SHA256fcfbb4c648649f4825b66504b261f912227ba32cbaabcadf4689020a83fb201b
SHA5127ed8022e2b09f232150b77fc3a25269365b624f19f0b50c46a4fdf744eeb23294c09c051452c4c9dbb34a274f1a0bfc54b3ff1987ec16ae2e54848e22a97ed64