Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26/05/2024, 02:55
Static task
static1
Behavioral task
behavioral1
Sample
741e97dd2501422eee2aab51214e022f_JaffaCakes118.jar
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
741e97dd2501422eee2aab51214e022f_JaffaCakes118.jar
Resource
win10v2004-20240508-en
General
-
Target
741e97dd2501422eee2aab51214e022f_JaffaCakes118.jar
-
Size
5KB
-
MD5
741e97dd2501422eee2aab51214e022f
-
SHA1
563d269eb08d177654e209287f20cea9287336e4
-
SHA256
d0af1675a786329b9011a1230b63fcb887636df4892043daf9a91261f01d0b89
-
SHA512
0d06c27fa259fdd327ed3e92b061d180b394cb483f0c0740fc14facf17e897c598c24ceb4c50a0ce657aa06df7784ddb47c05b83e72224339da7fa97de4bdc07
-
SSDEEP
96:9nAB1H2gQtJldmgYCwPVsMjTzUt0tpS+YlO+0NqURqMQHgbL/FYY5ujL4:pABEttiCwPpzs0HSfo+CqU8AbL/GKA0
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 3808 icacls.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2540 wrote to memory of 3808 2540 java.exe 84 PID 2540 wrote to memory of 3808 2540 java.exe 84
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\741e97dd2501422eee2aab51214e022f_JaffaCakes118.jar1⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\system32\icacls.exeC:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M2⤵
- Modifies file permissions
PID:3808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46B
MD50626dbb24fd81a86bcd8afa16a5b3d71
SHA1800ab6070d69e493ae792ac48e8a242c04b03ad9
SHA25636e4813834da57c9613f43bb342c69d1171fdf82908e4f0ff428fed4ec50233d
SHA512e5ee885788f7c7f918f573c7923fcf96c85d45854921ae5dd7e36984aafb060e8a25461a5fb990e677b61849e5b5e56ee8defebd930b2676443adfd4ed0cc081