Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 12:32
Static task
static1
Behavioral task
behavioral1
Sample
6af40914a9f5be1504d60d3d093c3256_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6af40914a9f5be1504d60d3d093c3256_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
6af40914a9f5be1504d60d3d093c3256_JaffaCakes118.exe
-
Size
466KB
-
MD5
6af40914a9f5be1504d60d3d093c3256
-
SHA1
1a016380859599e52450f16bb374f11973a96290
-
SHA256
06203bd99393b55036964207c9e8733427796e9f77d410be70e743bba670d5ef
-
SHA512
5e7bad11750783d421b36be8ff88755abadcb8fa67c22785385c0a8b234716b14e50bdd21228d3b60586563b59403ba10531731122d06a479a6fcd2cca2b69b0
-
SSDEEP
6144:1uUNi3ppFiuCsLOEEwyGY/ng2RGTP5CiuWeSoV2p+pfTAd8RZR2fnm:1x4zXKEbYvg2GCiaS+2IREd8ROm
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3572 PING.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 816 wrote to memory of 3776 816 6af40914a9f5be1504d60d3d093c3256_JaffaCakes118.exe 96 PID 816 wrote to memory of 3776 816 6af40914a9f5be1504d60d3d093c3256_JaffaCakes118.exe 96 PID 816 wrote to memory of 3776 816 6af40914a9f5be1504d60d3d093c3256_JaffaCakes118.exe 96 PID 3776 wrote to memory of 3572 3776 cmd.exe 98 PID 3776 wrote to memory of 3572 3776 cmd.exe 98 PID 3776 wrote to memory of 3572 3776 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\6af40914a9f5be1504d60d3d093c3256_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6af40914a9f5be1504d60d3d093c3256_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\6af40914a9f5be1504d60d3d093c3256_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:3572
-
-