Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/04/2024, 20:13

General

  • Target

    f69466447da5986d13a70f1166e3cf59_JaffaCakes118.exe

  • Size

    431KB

  • MD5

    f69466447da5986d13a70f1166e3cf59

  • SHA1

    9c8eb16cff3e8ac2fae223e367dcc953a40a8365

  • SHA256

    14f75ba266b38ccf8041f234d9a89c59d0df1962d21090606b1fce4099cf4a71

  • SHA512

    029ca578e52763beee87811505674276194e1511821f5120f47619cceab972d7ef681885cb5ac45fde900d2de6f758aa75ae9e7c51ef5bdf376442147d1394ec

  • SSDEEP

    12288:ZM7j6Tbmj3p3jD/6CPIjQCcZzE5mE3BNtBlDDd:ZA8kHiotZzSmENBF

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f69466447da5986d13a70f1166e3cf59_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f69466447da5986d13a70f1166e3cf59_JaffaCakes118.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3928
    • C:\ProgramData\cLpNjFp15403\cLpNjFp15403.exe
      "C:\ProgramData\cLpNjFp15403\cLpNjFp15403.exe" "C:\Users\Admin\AppData\Local\Temp\f69466447da5986d13a70f1166e3cf59_JaffaCakes118.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:3296

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\cLpNjFp15403\cLpNjFp15403.exe

    Filesize

    431KB

    MD5

    913e475c38616310314c79bdcbdd21b4

    SHA1

    ae0a6d2cd67d4553a4c48b08c4d352afcf2932fd

    SHA256

    94bb1b31859e5c8e4a41fdd1cf3b2fc8db4cc24ae53b6d938a25c1858c55a450

    SHA512

    499b59dd60574778307878d2b49d20a259d377b30db5d8454e2235845905cde15edb3412011968933161ab1d3701dc4b4f3b862fc90b748f689d4f0136810278

  • memory/3296-13-0x0000000000620000-0x0000000000720000-memory.dmp

    Filesize

    1024KB

  • memory/3296-12-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/3296-17-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/3296-21-0x0000000000620000-0x0000000000720000-memory.dmp

    Filesize

    1024KB

  • memory/3296-30-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/3928-1-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/3928-2-0x0000000000660000-0x0000000000760000-memory.dmp

    Filesize

    1024KB

  • memory/3928-16-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB

  • memory/3928-20-0x0000000000660000-0x0000000000760000-memory.dmp

    Filesize

    1024KB

  • memory/3928-37-0x0000000000400000-0x00000000004B7000-memory.dmp

    Filesize

    732KB