Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 22:10
Static task
static1
Behavioral task
behavioral1
Sample
fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe
-
Size
199KB
-
MD5
fb4683c057c42b98351707c3e7191ac0
-
SHA1
337a0e63086cbfc2dd1cbf73d99ea5419ab07304
-
SHA256
cab8207f49b7f4d82e264c60e5a70b902e5e27b8a8905e58ad10e72aab3c7d08
-
SHA512
3fae8953327deaaa96d0c87bbf8777355be7ca3eb2cfdd60ead793d0efe3542b2250c887437c1cca0d5b6570d1e0a658821d9adbd6cac0ba106e80aa9ecdfdec
-
SSDEEP
6144:lnqujU/i1qUaw2HEg+TuDTiWns0hN7rBLP8Nh/j:lpjQi1qxXkRYiWns0/md
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1768 explorer.exe -
Executes dropped EXE 1 IoCs
pid Process 2416 mzoaemh.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4824 set thread context of 1768 4824 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 86 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\mzoaemh.exe fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe File opened for modification C:\Windows\mzoaemh.exe fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4824 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 4824 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 4824 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 4824 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 4824 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 4824 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 4824 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 4824 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 4824 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 4824 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 4824 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 4824 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 4824 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 4824 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 4824 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 4824 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 4824 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 4824 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 4824 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 4824 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 4824 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 4824 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 4824 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 4824 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 2416 mzoaemh.exe 2416 mzoaemh.exe 2416 mzoaemh.exe 2416 mzoaemh.exe 2416 mzoaemh.exe 2416 mzoaemh.exe 2416 mzoaemh.exe 2416 mzoaemh.exe 2416 mzoaemh.exe 2416 mzoaemh.exe 2416 mzoaemh.exe 2416 mzoaemh.exe 2416 mzoaemh.exe 2416 mzoaemh.exe 2416 mzoaemh.exe 2416 mzoaemh.exe 2416 mzoaemh.exe 2416 mzoaemh.exe 2416 mzoaemh.exe 2416 mzoaemh.exe 2416 mzoaemh.exe 2416 mzoaemh.exe 2416 mzoaemh.exe 2416 mzoaemh.exe 2416 mzoaemh.exe 2416 mzoaemh.exe 2416 mzoaemh.exe 2416 mzoaemh.exe 2416 mzoaemh.exe 2416 mzoaemh.exe 2416 mzoaemh.exe 2416 mzoaemh.exe 2416 mzoaemh.exe 2416 mzoaemh.exe 2416 mzoaemh.exe 2416 mzoaemh.exe 2416 mzoaemh.exe 2416 mzoaemh.exe 2416 mzoaemh.exe 2416 mzoaemh.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4824 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4824 wrote to memory of 2416 4824 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 85 PID 4824 wrote to memory of 2416 4824 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 85 PID 4824 wrote to memory of 2416 4824 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 85 PID 2416 wrote to memory of 3416 2416 mzoaemh.exe 56 PID 4824 wrote to memory of 1768 4824 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 86 PID 4824 wrote to memory of 1768 4824 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 86 PID 4824 wrote to memory of 1768 4824 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 86 PID 4824 wrote to memory of 1768 4824 fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe 86 PID 2416 wrote to memory of 3416 2416 mzoaemh.exe 56 PID 2416 wrote to memory of 3416 2416 mzoaemh.exe 56 PID 2416 wrote to memory of 3416 2416 mzoaemh.exe 56 PID 2416 wrote to memory of 3416 2416 mzoaemh.exe 56 PID 2416 wrote to memory of 3416 2416 mzoaemh.exe 56 PID 2416 wrote to memory of 3416 2416 mzoaemh.exe 56 PID 2416 wrote to memory of 3416 2416 mzoaemh.exe 56 PID 2416 wrote to memory of 3416 2416 mzoaemh.exe 56 PID 2416 wrote to memory of 3416 2416 mzoaemh.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3416
-
C:\Users\Admin\AppData\Local\Temp\fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb4683c057c42b98351707c3e7191ac0_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\mzoaemh.exeC:\Windows\mzoaemh.exe a3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2416
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Deletes itself
PID:1768
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
199KB
MD59f143378bd048cc37c15206d4346b1d2
SHA17386f29f11aaa81185b566a2615bb07b4dc8c178
SHA2565a03d2dc993bfef141473f134c85506cafa8b71c5d5b3acb0cbaf49acb7e1a06
SHA512f39e80c1399d7b24cb027b9ad32963df0ff6ba5742aef68746697b03a43158a45894c6e0ff62a068a621b14b29cd0f7e2acf8765846902d53e6dfdc0ded8675f