Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 01:20
Static task
static1
Behavioral task
behavioral1
Sample
7f0f35c50f67a8a383dfca21d12780a2_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
7f0f35c50f67a8a383dfca21d12780a2_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
7f0f35c50f67a8a383dfca21d12780a2_JaffaCakes118.exe
-
Size
564KB
-
MD5
7f0f35c50f67a8a383dfca21d12780a2
-
SHA1
5b8d4cbd1393b3bf156ed731102bb7f737dc632c
-
SHA256
470153e2955821a4063f2645f5eea53551c28d2980cb2f34b236e4b14c0cd289
-
SHA512
0f5d584e43e33de05a62aab7ee6c72dbb0eee1d82fb342fa569bf32d7aeb0c761c462835939d826e1b3dcb3ebe725be6480276a964d7aec5f49cb0b00521743b
-
SSDEEP
6144:eIwsII3emtkVXCMbMgotROuV8U7gXCMb:dxveCMAlCU7GCM
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4456 wrote to memory of 396 4456 7f0f35c50f67a8a383dfca21d12780a2_JaffaCakes118.exe 92 PID 4456 wrote to memory of 396 4456 7f0f35c50f67a8a383dfca21d12780a2_JaffaCakes118.exe 92 PID 396 wrote to memory of 428 396 csc.exe 94 PID 396 wrote to memory of 428 396 csc.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f0f35c50f67a8a383dfca21d12780a2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7f0f35c50f67a8a383dfca21d12780a2_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\tcgymhmz.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES65FE.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC65EE.tmp"3⤵PID:428
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD538bb1b9d9bdf63c8f6679da09ef357ef
SHA1e68318c7e345f3de72f7b6f36e9554284fef4ca4
SHA2566601efb53f1169946576f9d8f3c45230f69a6a22bb5686bb103fbeecb2137c6f
SHA51237d3e42537f90ba362ee597b4c475217d59b0743526f33a971a2b67f67aa67602b100e4904cb1df59732184fcbfddccb48166beb861a0f51a511f023d7aafe31
-
Filesize
220KB
MD5ec14e482af21c8ce8afb383be9718d21
SHA16ce3d136ce0a634f2def6671f6f6f9deec1b2599
SHA256c68e166ac1ed69505f82927755e5bd57ff3f8d498a146f715b48ecf59428f36b
SHA512aae0eccf5892144bc5d9a2b78f57e8d014bcbac4f824c47c81d828aedba85b3e6c8c420936acf157998ea6fc8ad2ac1c07f0ac241ed41c8e3c5c1a5fdd103491
-
Filesize
652B
MD51f1dc9aae0e93698c5ae37a4cd44cd6d
SHA1eea432bf08bf8b9d12f4d36c4c163896da7ad65f
SHA256a51b7cc4f0d79e4aad5e504fb0cf15ffc6da53a15039947971dc061bea19a3a4
SHA512058888ae94382fe77503c4635331882bf8ef9bc7900616cacd51c7fd0a42d952ac7868f8cfd41c4e0690bb535f8ed8e902df189045ea353f96f0a7eb3246c9eb
-
Filesize
484KB
MD5f810f2d788309d1a6e7808653dfb9bda
SHA13a3f99c446686ecfeb56ceeeab1b736ca2450f9b
SHA256b79cf5e7a68bf23d0d7cf4856e08e4bea2ba481dac9694aacf9a7c45449dc457
SHA512740ed8dadb01cf418f37004abf9404f3f76998ea114b51c492cefb84a827a09ba1e0a1e6d25d7deca689cd71e3d6855367d1e7511d42d3395f61b190975ef07d
-
Filesize
707B
MD52b566889e4748eb27a233d9937ba3d07
SHA1bd0577e1532bebae8ea80901050b2a11bb63429d
SHA2567df56f9967c33b93ce7d66815c566988bb080d43301497234d402ade09764697
SHA512809319a7b9a13374a26d00a34a9c307ff06267a6d057e4e6e96b8116f38445f5bba4b47b57de0eb21b74286c5487863285f1a8e25f4e5fdf3fd68b9c0ab2dfed