Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2024, 12:45
Behavioral task
behavioral1
Sample
983299702cf8040a62599a3941b8770f_JaffaCakes118.exe
Resource
win7-20240215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
983299702cf8040a62599a3941b8770f_JaffaCakes118.exe
Resource
win10v2004-20240426-en
2 signatures
150 seconds
General
-
Target
983299702cf8040a62599a3941b8770f_JaffaCakes118.exe
-
Size
3.0MB
-
MD5
983299702cf8040a62599a3941b8770f
-
SHA1
85a3d17b7599e7647d16db33972f356c84fc7ac1
-
SHA256
1021a9bce2425cafad43435b174f0fab6f915e170cc08eb6abdb05af7c2d3c07
-
SHA512
81f5f33c4f2e5d466473c0060f2efc6bcc102bd638de1d6300a2524c645d6fd80309acdea44866e5c6757fdd9795c7bfa3ae8bf65a7a8e66c5829c888561de02
-
SSDEEP
98304:PaQ8XW1S2kZ1a+0dGCs7k3/cRLvOGZN209frmPdc8/Y:CQ8XiycdC7k3/8LOGZldmPdf/
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1336-0-0x0000000000400000-0x0000000000DF4000-memory.dmp upx behavioral2/memory/1336-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1336-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1336-48-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1336-50-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1336-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1336-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1336-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1336-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1336-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1336-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1336-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1336-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1336-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1336-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1336-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1336-20-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1336-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1336-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1336-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1336-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1336-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1336-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1336-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1336-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1336-10-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/1336-51-0x0000000000400000-0x0000000000DF4000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1336 983299702cf8040a62599a3941b8770f_JaffaCakes118.exe 1336 983299702cf8040a62599a3941b8770f_JaffaCakes118.exe 1336 983299702cf8040a62599a3941b8770f_JaffaCakes118.exe 1336 983299702cf8040a62599a3941b8770f_JaffaCakes118.exe 1336 983299702cf8040a62599a3941b8770f_JaffaCakes118.exe 1336 983299702cf8040a62599a3941b8770f_JaffaCakes118.exe