Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 18:41
Behavioral task
behavioral1
Sample
ffeb6b1e31e811cb25faa096c7050724_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
ffeb6b1e31e811cb25faa096c7050724_JaffaCakes118.exe
-
Size
784KB
-
MD5
ffeb6b1e31e811cb25faa096c7050724
-
SHA1
11f0cf0f85eaa0d3ecd76c0497b687e6d86c5a58
-
SHA256
4dc14c5c11b68cb5a9e95deb2663361daa9ce41e7fc2649725491d1c6920a487
-
SHA512
7b243a97733c95d2e57d195fc2157dce0b3d220ead5254597bea54430d81e654f41e22ffcab098fdb925c0db6ebbbd33c534c7d5f5a9582ddaf74401c265f664
-
SSDEEP
12288:D+SxS+EpOAlrbbPIOpwSKl3tyiX+4D5DFBFyWsZHHVQ6wmPsUi39cHpEcxkTB:acSJEAhpwS23hvJF3uHHVrPsUc9aeTB
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/4792-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4792-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2008-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2008-20-0x00000000053C0000-0x0000000005553000-memory.dmp xmrig behavioral2/memory/2008-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/2008-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2008 ffeb6b1e31e811cb25faa096c7050724_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2008 ffeb6b1e31e811cb25faa096c7050724_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/4792-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x000500000002326e-11.dat upx behavioral2/memory/2008-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4792 ffeb6b1e31e811cb25faa096c7050724_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4792 ffeb6b1e31e811cb25faa096c7050724_JaffaCakes118.exe 2008 ffeb6b1e31e811cb25faa096c7050724_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4792 wrote to memory of 2008 4792 ffeb6b1e31e811cb25faa096c7050724_JaffaCakes118.exe 87 PID 4792 wrote to memory of 2008 4792 ffeb6b1e31e811cb25faa096c7050724_JaffaCakes118.exe 87 PID 4792 wrote to memory of 2008 4792 ffeb6b1e31e811cb25faa096c7050724_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffeb6b1e31e811cb25faa096c7050724_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ffeb6b1e31e811cb25faa096c7050724_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\ffeb6b1e31e811cb25faa096c7050724_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ffeb6b1e31e811cb25faa096c7050724_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2008
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5f1e54924f4566728c50ee751ee5a7739
SHA1564a831477891aaebafcda8bb70e5784dfa4e42c
SHA2562eedaaab791fe2538f7d5473cdd06b70b1f2dd65ebd5a934b6a63ed82cf04b1c
SHA5127b4b061781c929475cb98bba94375bf8def2693ffb0d0f3d0e4954f4ded667b62fab43461c212301d503d7c414bdecd324006cdb90fc5e43a31c4ba07af9ffe4