Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 11:16
Static task
static1
Behavioral task
behavioral1
Sample
eaf0b16d7b5fa059bf4bc3338aa45d85_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eaf0b16d7b5fa059bf4bc3338aa45d85_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
eaf0b16d7b5fa059bf4bc3338aa45d85_JaffaCakes118.exe
-
Size
239KB
-
MD5
eaf0b16d7b5fa059bf4bc3338aa45d85
-
SHA1
1e98641e0f98d7e47a72461df9a90bc3755cb5ee
-
SHA256
13acb2a0cfc213abdbb8f42ae25b2def0c11116aead93ac2cb75b2d965cbb682
-
SHA512
6092fd178b0ca7d57889e31a432036b4b47619ab2f7d1c701dc68d7551aaa47f17e94314650640749971247ad913593179647e7a28e134fb653b98d68748312b
-
SSDEEP
3072:R410tNnOvYL/XcPBsLBkIcyYpZ0OFGkw+ALtjHyN3yeW8Wf8NFldNnD7SXlDfRVW:u2nGQ/WeJcyCZzFXsqo8DSX9fRb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4300 X -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3868 set thread context of 3472 3868 eaf0b16d7b5fa059bf4bc3338aa45d85_JaffaCakes118.exe 86 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4300 X 4300 X -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeShutdownPrivilege 3376 Explorer.EXE Token: SeCreatePagefilePrivilege 3376 Explorer.EXE Token: SeShutdownPrivilege 3376 Explorer.EXE Token: SeCreatePagefilePrivilege 3376 Explorer.EXE Token: SeShutdownPrivilege 3376 Explorer.EXE Token: SeCreatePagefilePrivilege 3376 Explorer.EXE Token: SeShutdownPrivilege 3376 Explorer.EXE Token: SeCreatePagefilePrivilege 3376 Explorer.EXE Token: SeShutdownPrivilege 3376 Explorer.EXE Token: SeCreatePagefilePrivilege 3376 Explorer.EXE Token: SeShutdownPrivilege 3376 Explorer.EXE Token: SeCreatePagefilePrivilege 3376 Explorer.EXE Token: SeShutdownPrivilege 3376 Explorer.EXE Token: SeCreatePagefilePrivilege 3376 Explorer.EXE Token: SeShutdownPrivilege 3376 Explorer.EXE Token: SeCreatePagefilePrivilege 3376 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3376 Explorer.EXE 3376 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3376 Explorer.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3868 wrote to memory of 3472 3868 eaf0b16d7b5fa059bf4bc3338aa45d85_JaffaCakes118.exe 86 PID 3868 wrote to memory of 3472 3868 eaf0b16d7b5fa059bf4bc3338aa45d85_JaffaCakes118.exe 86 PID 3868 wrote to memory of 3472 3868 eaf0b16d7b5fa059bf4bc3338aa45d85_JaffaCakes118.exe 86 PID 3868 wrote to memory of 4300 3868 eaf0b16d7b5fa059bf4bc3338aa45d85_JaffaCakes118.exe 87 PID 3868 wrote to memory of 4300 3868 eaf0b16d7b5fa059bf4bc3338aa45d85_JaffaCakes118.exe 87 PID 4300 wrote to memory of 3376 4300 X 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of UnmapMainImage
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\eaf0b16d7b5fa059bf4bc3338aa45d85_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eaf0b16d7b5fa059bf4bc3338aa45d85_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\explorer.exe00000180*3⤵PID:3472
-
-
C:\Users\Admin\AppData\Local\43357333\X193.105.154.210:803⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4300
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5686b479b0ee164cf1744a8be359ebb7d
SHA18615e8f967276a85110b198d575982a958581a07
SHA256fcfbb4c648649f4825b66504b261f912227ba32cbaabcadf4689020a83fb201b
SHA5127ed8022e2b09f232150b77fc3a25269365b624f19f0b50c46a4fdf744eeb23294c09c051452c4c9dbb34a274f1a0bfc54b3ff1987ec16ae2e54848e22a97ed64