Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/04/2024, 09:44

General

  • Target

    f7bd33413aa0dd9198dc68359d338bd9_JaffaCakes118.exe

  • Size

    385KB

  • MD5

    f7bd33413aa0dd9198dc68359d338bd9

  • SHA1

    1175318f5d45e2ed92c7778783502d8c22bfe9ba

  • SHA256

    fe3f37a73044ec63dd38c6e0dfa7310b6e4aa8f716abf5186a8919afaa6a60c0

  • SHA512

    3faca7c5f8455bf675bcfecd7db46117f01fd8447df45f10338f8f081600ef2a548dc37113fbac6233d189e7321833ff9792c9d6b9de2eb523b2e952c35570f7

  • SSDEEP

    6144:it9hXpWBJRzcnNNGf0uICA2kfEvUjxUvcKqwM7O14AhHtjB:wazcnOfdId2bvUjxm6aKsB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7bd33413aa0dd9198dc68359d338bd9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f7bd33413aa0dd9198dc68359d338bd9_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:564
    • C:\Users\Admin\AppData\Local\Temp\f7bd33413aa0dd9198dc68359d338bd9_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\f7bd33413aa0dd9198dc68359d338bd9_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:1092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\f7bd33413aa0dd9198dc68359d338bd9_JaffaCakes118.exe

    Filesize

    385KB

    MD5

    9a96c715966015e7840444f11d8a09af

    SHA1

    0eebcfb7e4d71bdeccbde59d7dce56e622323991

    SHA256

    d95cf9e30359b5ab543b63912b45b453b7369d7488ac6ca3f43d90d40be6ee1f

    SHA512

    aca42f307aa8c9624227db661ac078c7e1288df8af65234f2123ee068ec7352e54912084ae6742f1db8fb979e5679ccd6f68864d114eef67e36c3b239b8eda23

  • memory/564-0-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/564-1-0x0000000001470000-0x00000000014D6000-memory.dmp

    Filesize

    408KB

  • memory/564-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/564-11-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1092-13-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/1092-15-0x0000000001470000-0x00000000014D6000-memory.dmp

    Filesize

    408KB

  • memory/1092-20-0x0000000004EC0000-0x0000000004F1F000-memory.dmp

    Filesize

    380KB

  • memory/1092-21-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/1092-35-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/1092-38-0x000000000C7E0000-0x000000000C81C000-memory.dmp

    Filesize

    240KB

  • memory/1092-41-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB