Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 21:55
Static task
static1
Behavioral task
behavioral1
Sample
f8d4c26af8b41108412d38cac0f5f0c7_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f8d4c26af8b41108412d38cac0f5f0c7_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f8d4c26af8b41108412d38cac0f5f0c7_JaffaCakes118.exe
-
Size
4.5MB
-
MD5
f8d4c26af8b41108412d38cac0f5f0c7
-
SHA1
43312b4fa4b37dce79eb34b921c59c009321fb19
-
SHA256
5869bb5d7fa0d15adb7d2987c0ec21625443f58ce8fc9f8ed21d08866a3ffee5
-
SHA512
9178abb44ce60ffc3ca4835d016790f1bd74bac8da85a76a47bcbb70cbc0119937e8a1f61f718b470fb468c2b35efcfa215d54fb896be11894aeac81a9215f61
-
SSDEEP
98304:bvbnDNxb+poegJf6PD3Nmn7AJEgLYXMKUCCCNYzQEr0WO0Yk84doGAYJ7Km5b7j:zf+eJiPD3Nm7AJEgLYX8CNYzQEr0WO0v
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\TKQZMWDN\hosts f8d4c26afMPTG.exe -
Deletes itself 1 IoCs
pid Process 4720 f8d4c26afMPTG.exe -
Executes dropped EXE 1 IoCs
pid Process 4720 f8d4c26afMPTG.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2300 4720 WerFault.exe 85 -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 3044 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4720 f8d4c26afMPTG.exe 4720 f8d4c26afMPTG.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4720 f8d4c26afMPTG.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4144 wrote to memory of 4720 4144 f8d4c26af8b41108412d38cac0f5f0c7_JaffaCakes118.exe 85 PID 4144 wrote to memory of 4720 4144 f8d4c26af8b41108412d38cac0f5f0c7_JaffaCakes118.exe 85 PID 4144 wrote to memory of 4720 4144 f8d4c26af8b41108412d38cac0f5f0c7_JaffaCakes118.exe 85 PID 4720 wrote to memory of 228 4720 f8d4c26afMPTG.exe 88 PID 4720 wrote to memory of 228 4720 f8d4c26afMPTG.exe 88 PID 4720 wrote to memory of 228 4720 f8d4c26afMPTG.exe 88 PID 228 wrote to memory of 3044 228 cmd.exe 92 PID 228 wrote to memory of 3044 228 cmd.exe 92 PID 228 wrote to memory of 3044 228 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8d4c26af8b41108412d38cac0f5f0c7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f8d4c26af8b41108412d38cac0f5f0c7_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\f8d4c26afMPTG.exe-yue2⤵
- Drops file in Drivers directory
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\cmd.execmd /c ipconfig /flushdns3⤵
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns4⤵
- Gathers network information
PID:3044
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4720 -s 9803⤵
- Program crash
PID:2300
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4720 -ip 47201⤵PID:2008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.5MB
MD5acb9fbcce5bf8846e99b97fd08099f9f
SHA1b237ed7bffc3f8787e80c753031d0ab5e2a9a247
SHA256f758e58166d449b9a5f55b8f40f69165f5da44ae756230abe0c0eb60fec4c476
SHA512d389d6a3c8be80f4536c3eebe863cab552877408cb614ace791b604811dd51857b3fff139c95a44f1137a9515eac137b29b297e66a73cf1e4b8abc3a01f80942