Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    16/04/2024, 04:07

General

  • Target

    f2a79052d9ca830d0cf78df0a62f57d0_JaffaCakes118.exe

  • Size

    385KB

  • MD5

    f2a79052d9ca830d0cf78df0a62f57d0

  • SHA1

    fa6ded35082361b6efdf9edfe60b403fe0c56a93

  • SHA256

    1db8959ecb7aac6a6ab5f73d844556472df891b890eab8baee3ab371af373648

  • SHA512

    9d0dee17edd93d50e4418a9270ac7706c6c795727a93cf87051ec705223a73b299b7565d6e3c91579bdb0d9d17c2ff61460379d3bc1aac0aefd8d2b60ea52238

  • SSDEEP

    12288:mX6Jf5Nmif9bmlr+fGVZAsg5Xna2KeWSwrB:v5EiVOafEW5XHKesrB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f2a79052d9ca830d0cf78df0a62f57d0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f2a79052d9ca830d0cf78df0a62f57d0_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Users\Admin\AppData\Local\Temp\f2a79052d9ca830d0cf78df0a62f57d0_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\f2a79052d9ca830d0cf78df0a62f57d0_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\f2a79052d9ca830d0cf78df0a62f57d0_JaffaCakes118.exe

    Filesize

    385KB

    MD5

    ea37c94efbf2be09b02d3a4ab8e9a13e

    SHA1

    d9a028f6c1f7a6676d4d13c4e2500b6bacc5256a

    SHA256

    e9c1c0171273f602164a0f7ed6d5fd75bfd861aee4a9b825baad20f0e1bbfa03

    SHA512

    59a6f4909eb4df24772a1db173eac5493d69bd359a4db79fc33e72cd2953744d235f84d0154872ed3f2da9cb4324b56e30bc93b8e12807c4e099314f9207b8dd

  • memory/2008-14-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2008-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2008-2-0x0000000000220000-0x0000000000286000-memory.dmp

    Filesize

    408KB

  • memory/2008-12-0x0000000001470000-0x00000000014D6000-memory.dmp

    Filesize

    408KB

  • memory/2008-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2508-17-0x0000000000190000-0x00000000001F6000-memory.dmp

    Filesize

    408KB

  • memory/2508-20-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/2508-23-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2508-26-0x0000000000310000-0x000000000036F000-memory.dmp

    Filesize

    380KB

  • memory/2508-45-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2508-50-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2508-51-0x000000000ED70000-0x000000000EDAC000-memory.dmp

    Filesize

    240KB