Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/05/2024, 02:47

General

  • Target

    82cf64a35971229b2f6a54233cc7eb3a_JaffaCakes118.exe

  • Size

    813KB

  • MD5

    82cf64a35971229b2f6a54233cc7eb3a

  • SHA1

    5c15bb935257da8c029083920cc344fefef263dd

  • SHA256

    18bd1d7e4e2b5939580a5bd854ae02c5e0c7f9c0f6ef6b24f08fad2a6c2df1a6

  • SHA512

    e98a0e812bedbeca93ce096712012806c5a933952bfb4ae3a4d34145233cbb08e08f727df3d6db3c0a4bc795fff8e45100cf7ae2a32ca67e50cf5cad56dd37eb

  • SSDEEP

    12288:eewXneXremht7E+E9uU+i4vKCZ8gkNWX8zrKf97dbP4wkNtM32k+jZIJtblm6Xm9:FwXnebemr789uFkCJIrKPV4yBm629

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Modifies registry class 34 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\82cf64a35971229b2f6a54233cc7eb3a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\82cf64a35971229b2f6a54233cc7eb3a_JaffaCakes118.exe"
    1⤵
    • Registers COM server for autorun
    • Checks whether UAC is enabled
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2440-2-0x0000000002F60000-0x00000000030E2000-memory.dmp

    Filesize

    1.5MB

  • memory/2440-11-0x0000000002F60000-0x00000000030E2000-memory.dmp

    Filesize

    1.5MB

  • memory/2440-10-0x0000000002F60000-0x00000000030E2000-memory.dmp

    Filesize

    1.5MB

  • memory/2440-9-0x0000000002F60000-0x00000000030E2000-memory.dmp

    Filesize

    1.5MB

  • memory/2440-12-0x0000000001560000-0x0000000001561000-memory.dmp

    Filesize

    4KB

  • memory/2440-14-0x0000000001560000-0x0000000001561000-memory.dmp

    Filesize

    4KB