Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 03:40
Static task
static1
Behavioral task
behavioral1
Sample
6d3a9e2fc11322a0a2bc4ad52ba110f6_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
6d3a9e2fc11322a0a2bc4ad52ba110f6_JaffaCakes118.exe
-
Size
724KB
-
MD5
6d3a9e2fc11322a0a2bc4ad52ba110f6
-
SHA1
ddf89fe6d83c707f636c1b73ac448b9f4b5f9de2
-
SHA256
6157555f6e84cf18fa58a08cdc89a469da2a1d5d4e3f3b10776c74d2fe007a56
-
SHA512
b8258516c371ab6e5bd0ade27359ef4f683a8d6bc7da6cb858e69022e4fa5ef45fddfd970218da061525f53e289517794a1caa3ef548ebcf6b6d07d807dd23d0
-
SSDEEP
12288:bfOkVygaG6x/Oo8hL67HanLgc8tcWJTyHY/GD:bmkkJxAL2HanLgcqcWJG
Malware Config
Extracted
formbook
3.9
pe
blackcatproud.com
kddgu.info
jhholiday.com
woshunwang.com
qrvou.info
yinuojie.com
404arabs.com
diaojieorg.com
hsyfjj.com
medusabotanicals.com
ghay5c.com
wm785.com
bikeandart.com
ygyroadside.info
whitewings.biz
4pointpartnersbv.com
tukangsedotwc.net
democrataward.com
systemtraffic2updating.win
thevlu.com
wbwxfw.com
angeladiscountmall.com
sisarservices.com
bajaringantangerang.com
betwin0000.com
spectrumreachdata.com
czzzw.com
aquaristik-ratgeber.com
caroloverland.com
heartygiftz.com
wanli118.com
ellieenichen.com
xn--fiqs8sxwbx9y.com
sergunsolarmarket.com
shuyiren.com
allsystemsupgradesnew.review
radiomenina.com
dbsdgc.link
fudaoshidai.com
bankratestoday.com
birch.media
saddesklunchclub.com
heretale.com
nela-art.com
koolmugz.com
recruitmydigitalpeople.guru
isitstable.com
sthonghu.com
savewithdaverna.com
netmaniacs.net
super-disco.com
desibazao.com
kdframingdrywall.com
rescuingtheperishing.com
silo.fund
mailitunes.com
china6ix.net
zohulu.com
computeremporium-mail.net
vfhzaogjgu.info
yysajp.com
buypropecia-generic.com
cryptbooks.com
gewoongoede-atikels.info
xymakdoc.com
Signatures
-
Formbook payload 1 IoCs
resource yara_rule behavioral2/memory/4248-3-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3208 set thread context of 4248 3208 6d3a9e2fc11322a0a2bc4ad52ba110f6_JaffaCakes118.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4248 6d3a9e2fc11322a0a2bc4ad52ba110f6_JaffaCakes118.exe 4248 6d3a9e2fc11322a0a2bc4ad52ba110f6_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3208 6d3a9e2fc11322a0a2bc4ad52ba110f6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3208 wrote to memory of 4248 3208 6d3a9e2fc11322a0a2bc4ad52ba110f6_JaffaCakes118.exe 85 PID 3208 wrote to memory of 4248 3208 6d3a9e2fc11322a0a2bc4ad52ba110f6_JaffaCakes118.exe 85 PID 3208 wrote to memory of 4248 3208 6d3a9e2fc11322a0a2bc4ad52ba110f6_JaffaCakes118.exe 85 PID 3208 wrote to memory of 4248 3208 6d3a9e2fc11322a0a2bc4ad52ba110f6_JaffaCakes118.exe 85 PID 3208 wrote to memory of 4248 3208 6d3a9e2fc11322a0a2bc4ad52ba110f6_JaffaCakes118.exe 85 PID 3208 wrote to memory of 4248 3208 6d3a9e2fc11322a0a2bc4ad52ba110f6_JaffaCakes118.exe 85 PID 3208 wrote to memory of 4248 3208 6d3a9e2fc11322a0a2bc4ad52ba110f6_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d3a9e2fc11322a0a2bc4ad52ba110f6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6d3a9e2fc11322a0a2bc4ad52ba110f6_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\6d3a9e2fc11322a0a2bc4ad52ba110f6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6d3a9e2fc11322a0a2bc4ad52ba110f6_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4248
-