Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 20:59
Behavioral task
behavioral1
Sample
ebf94cd5bcfd688b0400cb0c1ea7980a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ebf94cd5bcfd688b0400cb0c1ea7980a_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ebf94cd5bcfd688b0400cb0c1ea7980a_JaffaCakes118.exe
-
Size
2.9MB
-
MD5
ebf94cd5bcfd688b0400cb0c1ea7980a
-
SHA1
4c8b7da2e587eec6f9c328275f96f4cb706f7ac2
-
SHA256
6b6338a1a0f1abe8054fec5de4b27b45636ed845f50ce7e0a07bdab766d90041
-
SHA512
45f9745effa25f6dee780e5a3cba4c55a7e0a1ef95653f99fa401c1c1d95c8e4314e838b74cc927d2cd1520cd465031044ea107cd1f416744a66de2ee2364cc6
-
SSDEEP
49152:HN2PwmaDoPQ+/NdzQ9JiAgd2ya5E6kveMkY/M/x1RlgMVFBdDl6VqJ2:YPwF7+/HzQ9MAgdRa5EvvlJ017NVvI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4436 ebf94cd5bcfd688b0400cb0c1ea7980a_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4436 ebf94cd5bcfd688b0400cb0c1ea7980a_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/392-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x0007000000023215-11.dat upx behavioral2/memory/4436-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 392 ebf94cd5bcfd688b0400cb0c1ea7980a_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 392 ebf94cd5bcfd688b0400cb0c1ea7980a_JaffaCakes118.exe 4436 ebf94cd5bcfd688b0400cb0c1ea7980a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 392 wrote to memory of 4436 392 ebf94cd5bcfd688b0400cb0c1ea7980a_JaffaCakes118.exe 84 PID 392 wrote to memory of 4436 392 ebf94cd5bcfd688b0400cb0c1ea7980a_JaffaCakes118.exe 84 PID 392 wrote to memory of 4436 392 ebf94cd5bcfd688b0400cb0c1ea7980a_JaffaCakes118.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebf94cd5bcfd688b0400cb0c1ea7980a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ebf94cd5bcfd688b0400cb0c1ea7980a_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\ebf94cd5bcfd688b0400cb0c1ea7980a_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ebf94cd5bcfd688b0400cb0c1ea7980a_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4436
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5fd5afb4ad111e7be04e8d725cd5974e9
SHA1d14f150536cd88464015147116bde3dce88485e1
SHA25665741f4c332add55f72470e5be973cfef4d442d2737a54561db50dfab54cf630
SHA512200b8be67d19eff36c70cc384ba408ad3d6686204ae15c1d4d0bf3919fcba6ab1e990f2510b05fd65a67036db2c1d98b7746b841332c4b36a262348932c53fc7