Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
97s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 14:29
Static task
static1
Behavioral task
behavioral1
Sample
f146fdcad0bc853f2a8df574551033bd_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
f146fdcad0bc853f2a8df574551033bd_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f146fdcad0bc853f2a8df574551033bd_JaffaCakes118.exe
-
Size
57KB
-
MD5
f146fdcad0bc853f2a8df574551033bd
-
SHA1
ba525806d8acacbfcd6f360d898876af52598ba1
-
SHA256
10df1727cc3a6072b978c72fff96d92d3290b3ccc731ea9d6b1d720ed7d756f4
-
SHA512
e3b2737c3675b7aceb8e2810ffc698822e1b85b517342dd2653eceb3f81fb404b0f52311dcbf4b57246858cde36a7aeb863a46759a678c4f0cbf90ec94e587b8
-
SSDEEP
768:GG3SIdZwXJ92W5LUSGlcrIFVq9eXVA4Hmsz6WDbVCptShoiFXBkf4jcLT7JZbO7A:/3SiZwZ92W5BAFV7V0A8pwDmNLviLF6
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 764 f146fdcad0bc853f2a8df574551033bd_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 764 f146fdcad0bc853f2a8df574551033bd_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1704 f146fdcad0bc853f2a8df574551033bd_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1704 f146fdcad0bc853f2a8df574551033bd_JaffaCakes118.exe 764 f146fdcad0bc853f2a8df574551033bd_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1704 wrote to memory of 764 1704 f146fdcad0bc853f2a8df574551033bd_JaffaCakes118.exe 86 PID 1704 wrote to memory of 764 1704 f146fdcad0bc853f2a8df574551033bd_JaffaCakes118.exe 86 PID 1704 wrote to memory of 764 1704 f146fdcad0bc853f2a8df574551033bd_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\f146fdcad0bc853f2a8df574551033bd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f146fdcad0bc853f2a8df574551033bd_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\f146fdcad0bc853f2a8df574551033bd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f146fdcad0bc853f2a8df574551033bd_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:764
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD53545963022ee1617d66964a8fd8a2b23
SHA100c68aae7505eabb16bd597ce9fa163425de7e06
SHA25601dbe533995e6147b14449147a759a1709ad61bb3437c132f0515e0e18490cf2
SHA5129e8f33aee661747b1597123305e4ad447df7c18180303c63e34e18b70719661b4a133398ae0e4572511c8af07342255a19b864fa521b8fae02a5350cb924638a