Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 14:52
Static task
static1
Behavioral task
behavioral1
Sample
f3b8261e7b45594fc95edbb128c03767_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f3b8261e7b45594fc95edbb128c03767_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f3b8261e7b45594fc95edbb128c03767_JaffaCakes118.exe
-
Size
165KB
-
MD5
f3b8261e7b45594fc95edbb128c03767
-
SHA1
4238d9efc121435de35613329e9ba5453a86d900
-
SHA256
7152201233fd830708fc3f78f06534fe3f63acf58e1619da31b6a5ce80714285
-
SHA512
5ad0490e44565b4ecbdc2cd448806ea5745ce2601e89caeb601c0be971a103e4849d2a5f63b790cf1ec177527cb083f043925304c608aaab000158d281d9affd
-
SSDEEP
3072:hstqlDOl97O29ztFp+0WH9HQ3Zz8tjWgf1KNWMIU38ziZ:cnhO2FtDAHshgjW0cWMI2
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4584-1-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/3328-3-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4584-13893-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4584-30912-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4584-46135-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4584-62197-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4584-78698-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4584-94856-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4584-109462-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4584-125458-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4584-141702-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4584-156328-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4584-158981-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4584-158982-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4584-158983-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4584-158984-0x0000000000400000-0x000000000045C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cognac = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f3b8261e7b45594fc95edbb128c03767_JaffaCakes118.exe" f3b8261e7b45594fc95edbb128c03767_JaffaCakes118.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\{783AF354-B514-42d6-970E-3E8BF0A5279C}.job f3b8261e7b45594fc95edbb128c03767_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{783AF354-B514-42d6-970E-3E8BF0A5279C}.job f3b8261e7b45594fc95edbb128c03767_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Software\Microsoft\Internet Explorer\International f3b8261e7b45594fc95edbb128c03767_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4584 f3b8261e7b45594fc95edbb128c03767_JaffaCakes118.exe 4584 f3b8261e7b45594fc95edbb128c03767_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3328 wrote to memory of 4584 3328 f3b8261e7b45594fc95edbb128c03767_JaffaCakes118.exe 86 PID 3328 wrote to memory of 4584 3328 f3b8261e7b45594fc95edbb128c03767_JaffaCakes118.exe 86 PID 3328 wrote to memory of 4584 3328 f3b8261e7b45594fc95edbb128c03767_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3b8261e7b45594fc95edbb128c03767_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3b8261e7b45594fc95edbb128c03767_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Users\Admin\AppData\Local\Temp\f3b8261e7b45594fc95edbb128c03767_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f3b8261e7b45594fc95edbb128c03767_JaffaCakes118.exe2⤵
- Adds Run key to start application
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4584
-