Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 14:39
Behavioral task
behavioral1
Sample
f3b22de5f1a7447113175cac77ca3f27_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f3b22de5f1a7447113175cac77ca3f27_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f3b22de5f1a7447113175cac77ca3f27_JaffaCakes118.exe
-
Size
318KB
-
MD5
f3b22de5f1a7447113175cac77ca3f27
-
SHA1
182c753221cd4a77a23767f076d881e8ba8c2ae5
-
SHA256
e19cb18be54dda935b8ddd7853823121ecde831743d3903f949f608aaece75c7
-
SHA512
4d2e40ddbc661f774b5397319ec08ff8bcb8aba417229975a90cd93a80fd02284af958a2a06a31f60470911121710620c41fa710c99f7ed6b943fe5ccc4ad6b9
-
SSDEEP
6144:ElZ/zUMu4pDSxsCMRzf7x3SfS1JAzXBtL76lLIGz:EHLUMuiv9RgfSjAzRtyTz
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4744-0-0x0000000000400000-0x00000000004B8000-memory.dmp upx behavioral2/memory/4744-1-0x0000000000400000-0x00000000004B8000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4744-1-0x0000000000400000-0x00000000004B8000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4744 f3b22de5f1a7447113175cac77ca3f27_JaffaCakes118.exe 4744 f3b22de5f1a7447113175cac77ca3f27_JaffaCakes118.exe 4744 f3b22de5f1a7447113175cac77ca3f27_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4744 f3b22de5f1a7447113175cac77ca3f27_JaffaCakes118.exe 4744 f3b22de5f1a7447113175cac77ca3f27_JaffaCakes118.exe 4744 f3b22de5f1a7447113175cac77ca3f27_JaffaCakes118.exe