Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 12:14
Static task
static1
Behavioral task
behavioral1
Sample
fa45d307be36d1e6d37c9037a17275f7_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
fa45d307be36d1e6d37c9037a17275f7_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fa45d307be36d1e6d37c9037a17275f7_JaffaCakes118.exe
-
Size
771KB
-
MD5
fa45d307be36d1e6d37c9037a17275f7
-
SHA1
ec9eec5d2a3984b221bd6296f079c1fb7d60576a
-
SHA256
283451b3d8cb54269e70f77665414899c7c6fa6cc14899f2659b841cd24a5a80
-
SHA512
bd5814770bd546789c742ff2d77561915ec7703f4b959c2e450417f531fb17778bb0e5b325f55d3ecdba198785edcf46b5ffd863448ff03b4f41f872d67d8353
-
SSDEEP
24576:LsMovkgmhcoDVhKb4ub10hJaothZ2/T6FBBB:gjcgRoD/yD/ofT
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3300 fa45d307be36d1e6d37c9037a17275f7_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3300 fa45d307be36d1e6d37c9037a17275f7_JaffaCakes118.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 pastebin.com 6 pastebin.com -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1404 fa45d307be36d1e6d37c9037a17275f7_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1404 fa45d307be36d1e6d37c9037a17275f7_JaffaCakes118.exe 3300 fa45d307be36d1e6d37c9037a17275f7_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1404 wrote to memory of 3300 1404 fa45d307be36d1e6d37c9037a17275f7_JaffaCakes118.exe 86 PID 1404 wrote to memory of 3300 1404 fa45d307be36d1e6d37c9037a17275f7_JaffaCakes118.exe 86 PID 1404 wrote to memory of 3300 1404 fa45d307be36d1e6d37c9037a17275f7_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa45d307be36d1e6d37c9037a17275f7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fa45d307be36d1e6d37c9037a17275f7_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\fa45d307be36d1e6d37c9037a17275f7_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fa45d307be36d1e6d37c9037a17275f7_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:3300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
771KB
MD54c0e7576d946f380dbeaf03e53d020b5
SHA1072ed0088d74745c37699de987bf154b2ae138b3
SHA25693a347add0d7cc0fa4738ef98bf0ca32daec03025a449f6d4dc0290b6ef96658
SHA51220b078c6fc900ed74ced950acb38fe565d2c384426d0e35481892afe42d30f01e5b935c33afa190f5df398bfe0ca0bf63c7acdac46dcb50f8003fef3a01da565