Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 22:17
Static task
static1
Behavioral task
behavioral1
Sample
21f52ba8ab460d1a1e9351944752ad7a_JaffaCakes118.exe
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
21f52ba8ab460d1a1e9351944752ad7a_JaffaCakes118.exe
Resource
win10v2004-20240419-en
2 signatures
150 seconds
General
-
Target
21f52ba8ab460d1a1e9351944752ad7a_JaffaCakes118.exe
-
Size
466KB
-
MD5
21f52ba8ab460d1a1e9351944752ad7a
-
SHA1
65b236ce20049c0184e96480915e2ef16a4fbd29
-
SHA256
10933f83b52b380ab7ce7ec881f4f6eedc4c80191437380d1602dc9bcce9da04
-
SHA512
0c54bfcbe4ec44ca25f1cde06758c3ecefd80ffe10af7796a617f3279dcbf5092611770dc3c69d1e1dbe62a91d0ee6054b0e47a2af066054099cce499c9aa527
-
SSDEEP
12288:g0Hr6Apk5OCmEJ8AeQ8YspTBLBbSHGDg/btFv:ri8s85BBluG+t
Score
1/10
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5040 PING.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5116 wrote to memory of 4436 5116 21f52ba8ab460d1a1e9351944752ad7a_JaffaCakes118.exe 98 PID 5116 wrote to memory of 4436 5116 21f52ba8ab460d1a1e9351944752ad7a_JaffaCakes118.exe 98 PID 5116 wrote to memory of 4436 5116 21f52ba8ab460d1a1e9351944752ad7a_JaffaCakes118.exe 98 PID 4436 wrote to memory of 5040 4436 cmd.exe 100 PID 4436 wrote to memory of 5040 4436 cmd.exe 100 PID 4436 wrote to memory of 5040 4436 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\21f52ba8ab460d1a1e9351944752ad7a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\21f52ba8ab460d1a1e9351944752ad7a_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\21f52ba8ab460d1a1e9351944752ad7a_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:5040
-
-