Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30/04/2024, 18:21
Static task
static1
Behavioral task
behavioral1
Sample
0a50b7dea61723bbd18af6cabf932b78_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0a50b7dea61723bbd18af6cabf932b78_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
0a50b7dea61723bbd18af6cabf932b78_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
0a50b7dea61723bbd18af6cabf932b78
-
SHA1
fa7673b9c5ac51d4207beb36d967987c8628605c
-
SHA256
9d382ae20062547591beb52e0208745a887d2e9e88c1f5b6fffdb98cbcfc4fef
-
SHA512
3fdb6b158704a464db7d7060221b16dcea666b5d246b1a0cc7286bb71815a24f41146c49e7286041d4ff4fe2b4792cf955521f5446aef7e7e9c1bf304e723d25
-
SSDEEP
24576:W7blxYQ7TkIuWq1Vux9LcvXn9UmCvYN267aRq8Imj4Y2:W75OgoDWJWXn9Ua+sm8Y2
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3672 0a50b7dea61723bbd18af6cabf932b78_JaffaCakes118.tmp 3412 zu.exe -
Loads dropped DLL 2 IoCs
pid Process 3672 0a50b7dea61723bbd18af6cabf932b78_JaffaCakes118.tmp 3672 0a50b7dea61723bbd18af6cabf932b78_JaffaCakes118.tmp -
Program crash 2 IoCs
pid pid_target Process procid_target 2804 3672 WerFault.exe 82 884 3672 WerFault.exe 82 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4392 wrote to memory of 3672 4392 0a50b7dea61723bbd18af6cabf932b78_JaffaCakes118.exe 82 PID 4392 wrote to memory of 3672 4392 0a50b7dea61723bbd18af6cabf932b78_JaffaCakes118.exe 82 PID 4392 wrote to memory of 3672 4392 0a50b7dea61723bbd18af6cabf932b78_JaffaCakes118.exe 82 PID 3672 wrote to memory of 3412 3672 0a50b7dea61723bbd18af6cabf932b78_JaffaCakes118.tmp 84 PID 3672 wrote to memory of 3412 3672 0a50b7dea61723bbd18af6cabf932b78_JaffaCakes118.tmp 84 PID 3672 wrote to memory of 3412 3672 0a50b7dea61723bbd18af6cabf932b78_JaffaCakes118.tmp 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a50b7dea61723bbd18af6cabf932b78_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0a50b7dea61723bbd18af6cabf932b78_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\is-FUGKQ.tmp\0a50b7dea61723bbd18af6cabf932b78_JaffaCakes118.tmp"C:\Users\Admin\AppData\Local\Temp\is-FUGKQ.tmp\0a50b7dea61723bbd18af6cabf932b78_JaffaCakes118.tmp" /SL5="$501C2,1022046,57856,C:\Users\Admin\AppData\Local\Temp\0a50b7dea61723bbd18af6cabf932b78_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\is-BNCRP.tmp\zu.exe"C:\Users\Admin\AppData\Local\Temp\is-BNCRP.tmp\zu.exe" -o -P pwzx bb.zip3⤵
- Executes dropped EXE
PID:3412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 9603⤵
- Program crash
PID:2804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 9683⤵
- Program crash
PID:884
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3672 -ip 36721⤵PID:3096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3672 -ip 36721⤵PID:2668
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD591e70aa4279ab1d4839d0f9f053c7d0c
SHA12fad5637170ed36ed7431449c1bf0df19ed9fcc5
SHA256f3c9a20f81c401f99aba3457f8a139b3ffa8ba7c93af07d04b6ebf9a4ff0930f
SHA5129b81de4cc6f5a7e34aa72c60b38d478d64ae141469d7a9c4978ac1fe946ad0cc2014ce3b7a2358c16a61579a41233c234dae03b10a9ca98d44b6dc2eaef0b0e6
-
Filesize
708KB
MD5d11f58daf5eeeee12ee04c1d92750774
SHA19890b9b80e11b9acd259f14795c237602ac13ccb
SHA2562a41ca5721fdf2d185d905b9798d7fd7577e22136e1e1ab7501c6e29fc83c6bf
SHA512ab448ef42ef4cb282b4ecb025a1e673385d2ad781ff8127654ac60a577a33251d0fc7c4e1afe28fcd6e58f27cbb72e77a39d889e275835e71efb7dcd8bbf4607
-
Filesize
875KB
MD52fd562fbbc45091218c9942458d8f250
SHA1e8c364f4dbf2d139ba43400fac1cdc30592da985
SHA2564676fc3d3d5e409ab416cb348210a7d1ff4dd675d1eb62dafeeb9455943875a1
SHA512315392fb743682546c609daab6fc3162f8e91a7b70888bfac04ba3bf87e34c9bfd3df3d943ac0ddb02aa490a77cd7757c5cb64b5d1faa0adc39e46ab3f68dd1a
-
Filesize
164KB
MD575375c22c72f1beb76bea39c22a1ed68
SHA1e1652b058195db3f5f754b7ab430652ae04a50b8
SHA2568d9b5190aace52a1db1ac73a65ee9999c329157c8e88f61a772433323d6b7a4a
SHA5121b396e78e189185eefb8c6058aa7e6dfe1b8f2dff8babfe4ffbee93805467bf45760eea6efb8d9bb2040d0eaa56841d457b1976dcfe13ed67931ade01419f55a
-
Filesize
697KB
MD5832dab307e54aa08f4b6cdd9b9720361
SHA1ebd007fb7482040ecf34339e4bf917209c1018df
SHA256cc783a04ccbca4edd06564f8ec88fe5a15f1e3bb26cec7de5e090313520d98f3
SHA512358d43522fd460eb1511708e4df22ea454a95e5bc3c4841931027b5fa3fb1dda05d496d8ad0a8b9279b99e6be74220fe243db8f08ef49845e9fb35c350ef4b49