Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 16:35
Behavioral task
behavioral1
Sample
f85c48f901a45c22c9b0d3ddee563c4d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f85c48f901a45c22c9b0d3ddee563c4d_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f85c48f901a45c22c9b0d3ddee563c4d_JaffaCakes118.exe
-
Size
2.9MB
-
MD5
f85c48f901a45c22c9b0d3ddee563c4d
-
SHA1
d7e6d4bff630b733ba8f03e43a1704cc9cb8671b
-
SHA256
ac930bd06b65b403396f3fade120ef6d4fe22b6a407ae8cf742fa3ca380023ff
-
SHA512
d2216df971bab0a508d1d6322bfb06212ab73d7332bf25105831f9bff1a99cc986bb3342e391cf4225b4e1fe97e51d91c5786953970f170844d1817ed93b451e
-
SSDEEP
49152:fWA8w4yn3jLs03HLBt6/3M00N74NH5HUyNRcUsCVOzetdZJ:+A8wDzYULGUP4HBUCczzM3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2880 f85c48f901a45c22c9b0d3ddee563c4d_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2880 f85c48f901a45c22c9b0d3ddee563c4d_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/448-0-0x0000000000400000-0x00000000008EF000-memory.dmp upx behavioral2/files/0x00070000000233ed-11.dat upx behavioral2/memory/2880-13-0x0000000000400000-0x00000000008EF000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 448 f85c48f901a45c22c9b0d3ddee563c4d_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 448 f85c48f901a45c22c9b0d3ddee563c4d_JaffaCakes118.exe 2880 f85c48f901a45c22c9b0d3ddee563c4d_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 448 wrote to memory of 2880 448 f85c48f901a45c22c9b0d3ddee563c4d_JaffaCakes118.exe 90 PID 448 wrote to memory of 2880 448 f85c48f901a45c22c9b0d3ddee563c4d_JaffaCakes118.exe 90 PID 448 wrote to memory of 2880 448 f85c48f901a45c22c9b0d3ddee563c4d_JaffaCakes118.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\f85c48f901a45c22c9b0d3ddee563c4d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f85c48f901a45c22c9b0d3ddee563c4d_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Users\Admin\AppData\Local\Temp\f85c48f901a45c22c9b0d3ddee563c4d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f85c48f901a45c22c9b0d3ddee563c4d_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2880
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD57d005d24b78cca2ed9432771dacca9fa
SHA199ede36f7c401abb60a162a72f518098e4d17230
SHA2565636a1c4d6412159013262ee538402f4d05e1b94f431f0a8910fa695d7131d92
SHA512c95426d264665ad7d28b4a7eeeedc31c02e89e89367b2b47f6d6636353f8346580282a8bd37e83a2c69d578aadb2fb363e71eb751653c90b42cf8df272512136