Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2024, 00:30
Static task
static1
Behavioral task
behavioral1
Sample
4dc8c98cab3d714b84859a2dda2c9c11_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4dc8c98cab3d714b84859a2dda2c9c11_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
4dc8c98cab3d714b84859a2dda2c9c11_JaffaCakes118.exe
-
Size
46KB
-
MD5
4dc8c98cab3d714b84859a2dda2c9c11
-
SHA1
8221e0487e04d524385b68649350c6afeafa90ff
-
SHA256
e1034a97fcbd8b4a7d1b795f43483961d36e493d09f2a6d4de3aff7b7cf6e5f6
-
SHA512
2a6d0d482ba2ef9c195ee4135f70666bf13b34b053324e9ee12faad64a93ac045edcd8fefdbb6e409690a40186c32a6f2a1ef16ec2637780a349e0da09600524
-
SSDEEP
768:KOxZOgIryM1P3oO2y8UN2ivcTTJlu71TFA9nn0OjDDdmo/SK2OURvXZzOmRjh2V8:nSgy19JSVO1ONn511/tivXZzOmRF2VGl
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3528 rrlxlrx.exe 1352 nbbbbb.exe 2492 pdvpj.exe 1364 flxxxxx.exe 2356 nhhnhh.exe 1768 pjjdv.exe 3008 xrxrlll.exe 3148 nnbbhh.exe 2232 vvdvj.exe 3036 htbhtn.exe 1076 pjjdp.exe 4084 frxrfff.exe 3580 3tnbbb.exe 2392 jddjv.exe 1588 fxlxfxl.exe 2840 tnnnnn.exe 1796 ppjdv.exe 3264 fffxlll.exe 3512 hntnnn.exe 2652 vpvdp.exe 4252 xrfxxxr.exe 3412 3ntntt.exe 3608 fxxxlfr.exe 4596 hnbttt.exe 4944 pjdvp.exe 1180 rllfrrr.exe 1892 nnhbnn.exe 1560 vjvjd.exe 1720 flrlxrr.exe 4240 btttnh.exe 2000 htbtnn.exe 3916 xrlllll.exe 64 hhnnhh.exe 668 djppd.exe 4960 bbtbth.exe 612 fxfxxfl.exe 1280 tbntnn.exe 1420 1vdjj.exe 4500 7rxlfxx.exe 4116 vjvdj.exe 3876 xrfxxxf.exe 216 hthhhn.exe 2100 vdjdj.exe 4304 9xlfxxx.exe 4576 tntnhh.exe 4692 nhnntt.exe 3624 ppjdv.exe 4464 ffxxxxr.exe 4560 1thtnh.exe 4900 vddvp.exe 2136 rflfxxr.exe 4244 3hnnnn.exe 2360 jpvvv.exe 2932 rrlfrxr.exe 2156 1ffxxxx.exe 3724 ntbbbb.exe 2420 vpdvj.exe 3728 djjpp.exe 5108 flllrfr.exe 3800 bttnhn.exe 4468 jdjjj.exe 3344 rrxfrfr.exe 5004 hnhnnn.exe 1856 tbnnbn.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2136 wrote to memory of 3528 2136 4dc8c98cab3d714b84859a2dda2c9c11_JaffaCakes118.exe 82 PID 2136 wrote to memory of 3528 2136 4dc8c98cab3d714b84859a2dda2c9c11_JaffaCakes118.exe 82 PID 2136 wrote to memory of 3528 2136 4dc8c98cab3d714b84859a2dda2c9c11_JaffaCakes118.exe 82 PID 3528 wrote to memory of 1352 3528 rrlxlrx.exe 83 PID 3528 wrote to memory of 1352 3528 rrlxlrx.exe 83 PID 3528 wrote to memory of 1352 3528 rrlxlrx.exe 83 PID 1352 wrote to memory of 2492 1352 nbbbbb.exe 84 PID 1352 wrote to memory of 2492 1352 nbbbbb.exe 84 PID 1352 wrote to memory of 2492 1352 nbbbbb.exe 84 PID 2492 wrote to memory of 1364 2492 pdvpj.exe 85 PID 2492 wrote to memory of 1364 2492 pdvpj.exe 85 PID 2492 wrote to memory of 1364 2492 pdvpj.exe 85 PID 1364 wrote to memory of 2356 1364 flxxxxx.exe 86 PID 1364 wrote to memory of 2356 1364 flxxxxx.exe 86 PID 1364 wrote to memory of 2356 1364 flxxxxx.exe 86 PID 2356 wrote to memory of 1768 2356 nhhnhh.exe 87 PID 2356 wrote to memory of 1768 2356 nhhnhh.exe 87 PID 2356 wrote to memory of 1768 2356 nhhnhh.exe 87 PID 1768 wrote to memory of 3008 1768 pjjdv.exe 88 PID 1768 wrote to memory of 3008 1768 pjjdv.exe 88 PID 1768 wrote to memory of 3008 1768 pjjdv.exe 88 PID 3008 wrote to memory of 3148 3008 xrxrlll.exe 89 PID 3008 wrote to memory of 3148 3008 xrxrlll.exe 89 PID 3008 wrote to memory of 3148 3008 xrxrlll.exe 89 PID 3148 wrote to memory of 2232 3148 nnbbhh.exe 90 PID 3148 wrote to memory of 2232 3148 nnbbhh.exe 90 PID 3148 wrote to memory of 2232 3148 nnbbhh.exe 90 PID 2232 wrote to memory of 3036 2232 vvdvj.exe 91 PID 2232 wrote to memory of 3036 2232 vvdvj.exe 91 PID 2232 wrote to memory of 3036 2232 vvdvj.exe 91 PID 3036 wrote to memory of 1076 3036 htbhtn.exe 92 PID 3036 wrote to memory of 1076 3036 htbhtn.exe 92 PID 3036 wrote to memory of 1076 3036 htbhtn.exe 92 PID 1076 wrote to memory of 4084 1076 pjjdp.exe 93 PID 1076 wrote to memory of 4084 1076 pjjdp.exe 93 PID 1076 wrote to memory of 4084 1076 pjjdp.exe 93 PID 4084 wrote to memory of 3580 4084 frxrfff.exe 94 PID 4084 wrote to memory of 3580 4084 frxrfff.exe 94 PID 4084 wrote to memory of 3580 4084 frxrfff.exe 94 PID 3580 wrote to memory of 2392 3580 3tnbbb.exe 95 PID 3580 wrote to memory of 2392 3580 3tnbbb.exe 95 PID 3580 wrote to memory of 2392 3580 3tnbbb.exe 95 PID 2392 wrote to memory of 1588 2392 jddjv.exe 96 PID 2392 wrote to memory of 1588 2392 jddjv.exe 96 PID 2392 wrote to memory of 1588 2392 jddjv.exe 96 PID 1588 wrote to memory of 2840 1588 fxlxfxl.exe 97 PID 1588 wrote to memory of 2840 1588 fxlxfxl.exe 97 PID 1588 wrote to memory of 2840 1588 fxlxfxl.exe 97 PID 2840 wrote to memory of 1796 2840 tnnnnn.exe 98 PID 2840 wrote to memory of 1796 2840 tnnnnn.exe 98 PID 2840 wrote to memory of 1796 2840 tnnnnn.exe 98 PID 1796 wrote to memory of 3264 1796 ppjdv.exe 99 PID 1796 wrote to memory of 3264 1796 ppjdv.exe 99 PID 1796 wrote to memory of 3264 1796 ppjdv.exe 99 PID 3264 wrote to memory of 3512 3264 fffxlll.exe 100 PID 3264 wrote to memory of 3512 3264 fffxlll.exe 100 PID 3264 wrote to memory of 3512 3264 fffxlll.exe 100 PID 3512 wrote to memory of 2652 3512 hntnnn.exe 101 PID 3512 wrote to memory of 2652 3512 hntnnn.exe 101 PID 3512 wrote to memory of 2652 3512 hntnnn.exe 101 PID 2652 wrote to memory of 4252 2652 vpvdp.exe 102 PID 2652 wrote to memory of 4252 2652 vpvdp.exe 102 PID 2652 wrote to memory of 4252 2652 vpvdp.exe 102 PID 4252 wrote to memory of 3412 4252 xrfxxxr.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\4dc8c98cab3d714b84859a2dda2c9c11_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4dc8c98cab3d714b84859a2dda2c9c11_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2136 -
\??\c:\rrlxlrx.exec:\rrlxlrx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3528 -
\??\c:\nbbbbb.exec:\nbbbbb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1352 -
\??\c:\pdvpj.exec:\pdvpj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2492 -
\??\c:\flxxxxx.exec:\flxxxxx.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1364 -
\??\c:\nhhnhh.exec:\nhhnhh.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2356 -
\??\c:\pjjdv.exec:\pjjdv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1768 -
\??\c:\xrxrlll.exec:\xrxrlll.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3008 -
\??\c:\nnbbhh.exec:\nnbbhh.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3148 -
\??\c:\vvdvj.exec:\vvdvj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2232 -
\??\c:\htbhtn.exec:\htbhtn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3036 -
\??\c:\pjjdp.exec:\pjjdp.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1076 -
\??\c:\frxrfff.exec:\frxrfff.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4084 -
\??\c:\3tnbbb.exec:\3tnbbb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3580 -
\??\c:\jddjv.exec:\jddjv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2392 -
\??\c:\fxlxfxl.exec:\fxlxfxl.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1588 -
\??\c:\tnnnnn.exec:\tnnnnn.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2840 -
\??\c:\ppjdv.exec:\ppjdv.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1796 -
\??\c:\fffxlll.exec:\fffxlll.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3264 -
\??\c:\hntnnn.exec:\hntnnn.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3512 -
\??\c:\vpvdp.exec:\vpvdp.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2652 -
\??\c:\xrfxxxr.exec:\xrfxxxr.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4252 -
\??\c:\3ntntt.exec:\3ntntt.exe23⤵
- Executes dropped EXE
PID:3412 -
\??\c:\fxxxlfr.exec:\fxxxlfr.exe24⤵
- Executes dropped EXE
PID:3608 -
\??\c:\hnbttt.exec:\hnbttt.exe25⤵
- Executes dropped EXE
PID:4596 -
\??\c:\pjdvp.exec:\pjdvp.exe26⤵
- Executes dropped EXE
PID:4944 -
\??\c:\rllfrrr.exec:\rllfrrr.exe27⤵
- Executes dropped EXE
PID:1180 -
\??\c:\nnhbnn.exec:\nnhbnn.exe28⤵
- Executes dropped EXE
PID:1892 -
\??\c:\vjvjd.exec:\vjvjd.exe29⤵
- Executes dropped EXE
PID:1560 -
\??\c:\flrlxrr.exec:\flrlxrr.exe30⤵
- Executes dropped EXE
PID:1720 -
\??\c:\btttnh.exec:\btttnh.exe31⤵
- Executes dropped EXE
PID:4240 -
\??\c:\htbtnn.exec:\htbtnn.exe32⤵
- Executes dropped EXE
PID:2000 -
\??\c:\xrlllll.exec:\xrlllll.exe33⤵
- Executes dropped EXE
PID:3916 -
\??\c:\hhnnhh.exec:\hhnnhh.exe34⤵
- Executes dropped EXE
PID:64 -
\??\c:\djppd.exec:\djppd.exe35⤵
- Executes dropped EXE
PID:668 -
\??\c:\bbtbth.exec:\bbtbth.exe36⤵
- Executes dropped EXE
PID:4960 -
\??\c:\fxfxxfl.exec:\fxfxxfl.exe37⤵
- Executes dropped EXE
PID:612 -
\??\c:\tbntnn.exec:\tbntnn.exe38⤵
- Executes dropped EXE
PID:1280 -
\??\c:\1vdjj.exec:\1vdjj.exe39⤵
- Executes dropped EXE
PID:1420 -
\??\c:\7rxlfxx.exec:\7rxlfxx.exe40⤵
- Executes dropped EXE
PID:4500 -
\??\c:\vjvdj.exec:\vjvdj.exe41⤵
- Executes dropped EXE
PID:4116 -
\??\c:\xrfxxxf.exec:\xrfxxxf.exe42⤵
- Executes dropped EXE
PID:3876 -
\??\c:\hthhhn.exec:\hthhhn.exe43⤵
- Executes dropped EXE
PID:216 -
\??\c:\vdjdj.exec:\vdjdj.exe44⤵
- Executes dropped EXE
PID:2100 -
\??\c:\9xlfxxx.exec:\9xlfxxx.exe45⤵
- Executes dropped EXE
PID:4304 -
\??\c:\tntnhh.exec:\tntnhh.exe46⤵
- Executes dropped EXE
PID:4576 -
\??\c:\nhnntt.exec:\nhnntt.exe47⤵
- Executes dropped EXE
PID:4692 -
\??\c:\ppjdv.exec:\ppjdv.exe48⤵
- Executes dropped EXE
PID:3624 -
\??\c:\ffxxxxr.exec:\ffxxxxr.exe49⤵
- Executes dropped EXE
PID:4464 -
\??\c:\1thtnh.exec:\1thtnh.exe50⤵
- Executes dropped EXE
PID:4560 -
\??\c:\ttnhnn.exec:\ttnhnn.exe51⤵PID:4392
-
\??\c:\vddvp.exec:\vddvp.exe52⤵
- Executes dropped EXE
PID:4900 -
\??\c:\rflfxxr.exec:\rflfxxr.exe53⤵
- Executes dropped EXE
PID:2136 -
\??\c:\3hnnnn.exec:\3hnnnn.exe54⤵
- Executes dropped EXE
PID:4244 -
\??\c:\jpvvv.exec:\jpvvv.exe55⤵
- Executes dropped EXE
PID:2360 -
\??\c:\rrlfrxr.exec:\rrlfrxr.exe56⤵
- Executes dropped EXE
PID:2932 -
\??\c:\1ffxxxx.exec:\1ffxxxx.exe57⤵
- Executes dropped EXE
PID:2156 -
\??\c:\ntbbbb.exec:\ntbbbb.exe58⤵
- Executes dropped EXE
PID:3724 -
\??\c:\vpdvj.exec:\vpdvj.exe59⤵
- Executes dropped EXE
PID:2420 -
\??\c:\djjpp.exec:\djjpp.exe60⤵
- Executes dropped EXE
PID:3728 -
\??\c:\flllrfr.exec:\flllrfr.exe61⤵
- Executes dropped EXE
PID:5108 -
\??\c:\bttnhn.exec:\bttnhn.exe62⤵
- Executes dropped EXE
PID:3800 -
\??\c:\jdjjj.exec:\jdjjj.exe63⤵
- Executes dropped EXE
PID:4468 -
\??\c:\rrxfrfr.exec:\rrxfrfr.exe64⤵
- Executes dropped EXE
PID:3344 -
\??\c:\hnhnnn.exec:\hnhnnn.exe65⤵
- Executes dropped EXE
PID:5004 -
\??\c:\tbnnbn.exec:\tbnnbn.exe66⤵
- Executes dropped EXE
PID:1856 -
\??\c:\7vddp.exec:\7vddp.exe67⤵PID:1548
-
\??\c:\3llrlxl.exec:\3llrlxl.exe68⤵PID:5068
-
\??\c:\lrrrrrr.exec:\lrrrrrr.exe69⤵PID:3848
-
\??\c:\tnnthh.exec:\tnnthh.exe70⤵PID:3492
-
\??\c:\pddpj.exec:\pddpj.exe71⤵PID:5088
-
\??\c:\xxrfxxx.exec:\xxrfxxx.exe72⤵PID:3500
-
\??\c:\ntbbbb.exec:\ntbbbb.exe73⤵PID:4112
-
\??\c:\3djpd.exec:\3djpd.exe74⤵PID:4088
-
\??\c:\llxfxxr.exec:\llxfxxr.exe75⤵PID:3040
-
\??\c:\bthhnn.exec:\bthhnn.exe76⤵PID:2984
-
\??\c:\hntnbb.exec:\hntnbb.exe77⤵PID:4108
-
\??\c:\vjjjv.exec:\vjjjv.exe78⤵PID:3512
-
\??\c:\dpdpp.exec:\dpdpp.exe79⤵PID:2032
-
\??\c:\1rlrfrl.exec:\1rlrfrl.exe80⤵PID:4820
-
\??\c:\xrrxllf.exec:\xrrxllf.exe81⤵PID:5052
-
\??\c:\bhnnnn.exec:\bhnnnn.exe82⤵PID:4632
-
\??\c:\9pjjd.exec:\9pjjd.exe83⤵PID:2428
-
\??\c:\5jjjd.exec:\5jjjd.exe84⤵PID:2284
-
\??\c:\fxxlffx.exec:\fxxlffx.exe85⤵PID:1048
-
\??\c:\7hhhbb.exec:\7hhhbb.exe86⤵PID:2188
-
\??\c:\btbtth.exec:\btbtth.exe87⤵PID:1616
-
\??\c:\dppjv.exec:\dppjv.exe88⤵PID:3128
-
\??\c:\jdpjj.exec:\jdpjj.exe89⤵PID:3208
-
\??\c:\5xrrfxr.exec:\5xrrfxr.exe90⤵PID:2000
-
\??\c:\hbhhhn.exec:\hbhhhn.exe91⤵PID:4880
-
\??\c:\bnhnth.exec:\bnhnth.exe92⤵PID:3272
-
\??\c:\dpjpj.exec:\dpjpj.exe93⤵PID:3312
-
\??\c:\lllfrrl.exec:\lllfrrl.exe94⤵PID:2784
-
\??\c:\bhbthh.exec:\bhbthh.exe95⤵PID:3284
-
\??\c:\3jpjd.exec:\3jpjd.exe96⤵PID:1032
-
\??\c:\lffxrrr.exec:\lffxrrr.exe97⤵PID:1584
-
\??\c:\jpdvv.exec:\jpdvv.exe98⤵PID:2788
-
\??\c:\xffxlll.exec:\xffxlll.exe99⤵PID:3232
-
\??\c:\3bbtnn.exec:\3bbtnn.exe100⤵PID:4708
-
\??\c:\htbnnh.exec:\htbnnh.exe101⤵PID:952
-
\??\c:\pjjdv.exec:\pjjdv.exe102⤵PID:4304
-
\??\c:\9jpvp.exec:\9jpvp.exe103⤵PID:4576
-
\??\c:\ntbthh.exec:\ntbthh.exe104⤵PID:4692
-
\??\c:\3djdj.exec:\3djdj.exe105⤵PID:1100
-
\??\c:\xxxfxxx.exec:\xxxfxxx.exe106⤵PID:452
-
\??\c:\bbbbbb.exec:\bbbbbb.exe107⤵PID:2872
-
\??\c:\ddjjd.exec:\ddjjd.exe108⤵PID:3248
-
\??\c:\rlxrxxf.exec:\rlxrxxf.exe109⤵PID:4160
-
\??\c:\bttnnn.exec:\bttnnn.exe110⤵PID:1652
-
\??\c:\jpvpv.exec:\jpvpv.exe111⤵PID:3528
-
\??\c:\9frlffr.exec:\9frlffr.exe112⤵PID:2148
-
\??\c:\tnhhbb.exec:\tnhhbb.exe113⤵PID:2240
-
\??\c:\pdjjv.exec:\pdjjv.exe114⤵PID:2080
-
\??\c:\ffxrllf.exec:\ffxrllf.exe115⤵PID:2420
-
\??\c:\hnttnn.exec:\hnttnn.exe116⤵PID:1184
-
\??\c:\dvjdj.exec:\dvjdj.exe117⤵PID:5108
-
\??\c:\lfrlxxf.exec:\lfrlxxf.exe118⤵PID:2916
-
\??\c:\hbhhbb.exec:\hbhhbb.exe119⤵PID:956
-
\??\c:\vpvdd.exec:\vpvdd.exe120⤵PID:3344
-
\??\c:\ffrlfxx.exec:\ffrlfxx.exe121⤵PID:4964
-
\??\c:\vjddd.exec:\vjddd.exe122⤵PID:1864
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-