Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 15:06
Behavioral task
behavioral1
Sample
a62c756d50eb6a46ea7c4be10d4fb069_JaffaCakes118.exe
Resource
win7-20240508-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
a62c756d50eb6a46ea7c4be10d4fb069_JaffaCakes118.exe
Resource
win10v2004-20240611-en
4 signatures
150 seconds
General
-
Target
a62c756d50eb6a46ea7c4be10d4fb069_JaffaCakes118.exe
-
Size
470KB
-
MD5
a62c756d50eb6a46ea7c4be10d4fb069
-
SHA1
52f0324689a4071e16097afd7959ed04a0ffcaa7
-
SHA256
bd69be2f37e4f3616f59d8a618efe059a8b6578662ca6431a40f3453fa740470
-
SHA512
847012a3845f354cd109aacafce79894cae48639ed5ab5a164557f97c2bef0e2cb365661f12f648e742069774c806294103d04466eefb1fb5a837b112835f79e
-
SSDEEP
12288:6CXsEser5llz/apLVjpXkj4kN4mwuYJkMYmQsbFGDnIQ:Nsg5llipLVjpUjH4mwxBboDl
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3980-0-0x0000000000400000-0x000000000051F000-memory.dmp upx behavioral2/memory/3980-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3980-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3980-46-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3980-44-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3980-48-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3980-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3980-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3980-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3980-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3980-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3980-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3980-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3980-26-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3980-24-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3980-22-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3980-20-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3980-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3980-10-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3980-8-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3980-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3980-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3980-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3980-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3980-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3980-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3980-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3980-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3980-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3980-50-0x0000000000400000-0x000000000051F000-memory.dmp upx behavioral2/memory/3980-54-0x0000000000400000-0x000000000051F000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3440 3980 WerFault.exe 80 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3980 a62c756d50eb6a46ea7c4be10d4fb069_JaffaCakes118.exe 3980 a62c756d50eb6a46ea7c4be10d4fb069_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3980 a62c756d50eb6a46ea7c4be10d4fb069_JaffaCakes118.exe 3980 a62c756d50eb6a46ea7c4be10d4fb069_JaffaCakes118.exe 3980 a62c756d50eb6a46ea7c4be10d4fb069_JaffaCakes118.exe 3980 a62c756d50eb6a46ea7c4be10d4fb069_JaffaCakes118.exe 3980 a62c756d50eb6a46ea7c4be10d4fb069_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a62c756d50eb6a46ea7c4be10d4fb069_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a62c756d50eb6a46ea7c4be10d4fb069_JaffaCakes118.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3980 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 22562⤵
- Program crash
PID:3440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3980 -ip 39801⤵PID:3208