Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/04/2024, 15:40

General

  • Target

    f3cb4153bd361d1c59dcde9eeddfde3f_JaffaCakes118.exe

  • Size

    385KB

  • MD5

    f3cb4153bd361d1c59dcde9eeddfde3f

  • SHA1

    355d729aa2dc2821bcc550ba9cf907c64b060a8f

  • SHA256

    51e4d481b8ee1d700189dc094abad0a147be123a16c6208051cc1129c2fa0705

  • SHA512

    2eedd15aed8610eed38f77730fbad9cfd5fcd48c637ab3921f4efd1b406b166985245e8350b22dbd02105077c93e2fd495c7353f278bcf1fad2e0e111fb686a9

  • SSDEEP

    12288:6PnWpEArAD1gjq8/7RXY5NDnDa6F993IB:CWpLE5olXaa6OB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f3cb4153bd361d1c59dcde9eeddfde3f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f3cb4153bd361d1c59dcde9eeddfde3f_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:4484
    • C:\Users\Admin\AppData\Local\Temp\f3cb4153bd361d1c59dcde9eeddfde3f_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\f3cb4153bd361d1c59dcde9eeddfde3f_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:4580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\f3cb4153bd361d1c59dcde9eeddfde3f_JaffaCakes118.exe

    Filesize

    385KB

    MD5

    27d25eaaee8c4929dabba8d942121d74

    SHA1

    718593083cb4f8ded60f8a856c3fe032b6425ed1

    SHA256

    526ebe049211a4c87319fbe99345f15df373b03b2bc9d12d1ef7c4a40efc82f8

    SHA512

    9589d98969e282e8c2cf2b0e7d1fb58cd0bdf26e9f2181b48f8ea4354553766e44a8541f5e4190145c71f4f67912f795c73b019258fe38d9a545bc568dbf9b1f

  • memory/4484-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/4484-1-0x0000000001470000-0x00000000014D6000-memory.dmp

    Filesize

    408KB

  • memory/4484-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/4484-12-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/4580-13-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/4580-14-0x0000000001470000-0x00000000014D6000-memory.dmp

    Filesize

    408KB

  • memory/4580-20-0x0000000001660000-0x00000000016BF000-memory.dmp

    Filesize

    380KB

  • memory/4580-21-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/4580-35-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/4580-40-0x000000000C7D0000-0x000000000C80C000-memory.dmp

    Filesize

    240KB

  • memory/4580-41-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB