Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/05/2024, 22:10

General

  • Target

    26f7e5c5148dd565538cf01247b4c48a_JaffaCakes118.exe

  • Size

    312KB

  • MD5

    26f7e5c5148dd565538cf01247b4c48a

  • SHA1

    d664d6ff18e1ccf7e52af73e46d712b76ec51de6

  • SHA256

    2365a790e2be885b9f4c22de9648cd082252013ba5141548ad414d5524146c62

  • SHA512

    35fe538375f70ab684d9f9ffceda45d7b0e4644afb0f53b9bb35e443af6a19741a4365d1e961021c2ebce4059ee6a6fef3b045d4ec88a57f647eddbec7779da9

  • SSDEEP

    6144:sweks+CRE0mfLS8zW1Osdnp1PuJ93ZLYG:peknCO0mzS8Unpa5

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26f7e5c5148dd565538cf01247b4c48a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\26f7e5c5148dd565538cf01247b4c48a_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4412

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\bhs64B5.tmp

    Filesize

    242KB

    MD5

    46abad63ed5a1a264515f158a08dd410

    SHA1

    96bf993cbf8245c2adcdf305f6f8b2e2579f5707

    SHA256

    7df243e7fef0e6894b7b5ca9ed12598c61ad92706d54b795c871ff32559199e7

    SHA512

    17d6d52b04ee0d29aa18ec7eacf468cf62414479165ce11bef23e1446780611ff41fb1f2b596f34e67c90e691d3ddece87f9acf26c4569b28df3d8dbdaa58243

  • memory/4412-7-0x0000000005580000-0x000000000558A000-memory.dmp

    Filesize

    40KB

  • memory/4412-3-0x0000000001610000-0x0000000001652000-memory.dmp

    Filesize

    264KB

  • memory/4412-4-0x0000000074950000-0x0000000075100000-memory.dmp

    Filesize

    7.7MB

  • memory/4412-5-0x0000000005B90000-0x0000000006134000-memory.dmp

    Filesize

    5.6MB

  • memory/4412-6-0x00000000055E0000-0x0000000005672000-memory.dmp

    Filesize

    584KB

  • memory/4412-0-0x000000007495E000-0x000000007495F000-memory.dmp

    Filesize

    4KB

  • memory/4412-8-0x0000000074950000-0x0000000075100000-memory.dmp

    Filesize

    7.7MB

  • memory/4412-9-0x0000000074950000-0x0000000075100000-memory.dmp

    Filesize

    7.7MB

  • memory/4412-10-0x0000000008D60000-0x0000000008DC6000-memory.dmp

    Filesize

    408KB

  • memory/4412-11-0x0000000074950000-0x0000000075100000-memory.dmp

    Filesize

    7.7MB

  • memory/4412-20-0x000000007495E000-0x000000007495F000-memory.dmp

    Filesize

    4KB

  • memory/4412-21-0x0000000074950000-0x0000000075100000-memory.dmp

    Filesize

    7.7MB