Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 09:53
Static task
static1
Behavioral task
behavioral1
Sample
04eb80dd59dd7ebe739b61cdfc6662c0_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
04eb80dd59dd7ebe739b61cdfc6662c0_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
04eb80dd59dd7ebe739b61cdfc6662c0_JaffaCakes118.exe
-
Size
491KB
-
MD5
04eb80dd59dd7ebe739b61cdfc6662c0
-
SHA1
d900163f1fc7fbd62b1720af9f7c100ae351ace5
-
SHA256
32224d8ce9b9eac3e7af9ce9a43dabf9580d93947ceb00f69c82d1c49a12f512
-
SHA512
b252ace8fb1ac3ce786b82caedb64d430619c110b1d04f2ec1cd521a68f432527dd55692bfbc7b00358161760ef1767d561a221f764f1136024cc5f442197ea9
-
SSDEEP
6144:u9tsz0ctIHFxQ/cKrL+i8HeRg7cQldsD7tLAB8:u6NtIPQ/rutgQlutI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3612 cWhNZ9fc.exe -
Executes dropped EXE 2 IoCs
pid Process 4076 cWhNZ9fc.exe 3612 cWhNZ9fc.exe -
Loads dropped DLL 4 IoCs
pid Process 2704 04eb80dd59dd7ebe739b61cdfc6662c0_JaffaCakes118.exe 2704 04eb80dd59dd7ebe739b61cdfc6662c0_JaffaCakes118.exe 3612 cWhNZ9fc.exe 3612 cWhNZ9fc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qpnrbELnhu = "C:\\ProgramData\\5lIyoApxT4vJo5\\cWhNZ9fc.exe" 04eb80dd59dd7ebe739b61cdfc6662c0_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4860 set thread context of 2704 4860 04eb80dd59dd7ebe739b61cdfc6662c0_JaffaCakes118.exe 91 PID 4076 set thread context of 3612 4076 cWhNZ9fc.exe 100 PID 3612 set thread context of 3552 3612 cWhNZ9fc.exe 105 -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4860 wrote to memory of 2704 4860 04eb80dd59dd7ebe739b61cdfc6662c0_JaffaCakes118.exe 91 PID 4860 wrote to memory of 2704 4860 04eb80dd59dd7ebe739b61cdfc6662c0_JaffaCakes118.exe 91 PID 4860 wrote to memory of 2704 4860 04eb80dd59dd7ebe739b61cdfc6662c0_JaffaCakes118.exe 91 PID 4860 wrote to memory of 2704 4860 04eb80dd59dd7ebe739b61cdfc6662c0_JaffaCakes118.exe 91 PID 4860 wrote to memory of 2704 4860 04eb80dd59dd7ebe739b61cdfc6662c0_JaffaCakes118.exe 91 PID 2704 wrote to memory of 4076 2704 04eb80dd59dd7ebe739b61cdfc6662c0_JaffaCakes118.exe 94 PID 2704 wrote to memory of 4076 2704 04eb80dd59dd7ebe739b61cdfc6662c0_JaffaCakes118.exe 94 PID 2704 wrote to memory of 4076 2704 04eb80dd59dd7ebe739b61cdfc6662c0_JaffaCakes118.exe 94 PID 4076 wrote to memory of 3612 4076 cWhNZ9fc.exe 100 PID 4076 wrote to memory of 3612 4076 cWhNZ9fc.exe 100 PID 4076 wrote to memory of 3612 4076 cWhNZ9fc.exe 100 PID 4076 wrote to memory of 3612 4076 cWhNZ9fc.exe 100 PID 4076 wrote to memory of 3612 4076 cWhNZ9fc.exe 100 PID 3612 wrote to memory of 3168 3612 cWhNZ9fc.exe 104 PID 3612 wrote to memory of 3168 3612 cWhNZ9fc.exe 104 PID 3612 wrote to memory of 3168 3612 cWhNZ9fc.exe 104 PID 3612 wrote to memory of 3552 3612 cWhNZ9fc.exe 105 PID 3612 wrote to memory of 3552 3612 cWhNZ9fc.exe 105 PID 3612 wrote to memory of 3552 3612 cWhNZ9fc.exe 105 PID 3612 wrote to memory of 3552 3612 cWhNZ9fc.exe 105 PID 3612 wrote to memory of 3552 3612 cWhNZ9fc.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\04eb80dd59dd7ebe739b61cdfc6662c0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\04eb80dd59dd7ebe739b61cdfc6662c0_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\04eb80dd59dd7ebe739b61cdfc6662c0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\04eb80dd59dd7ebe739b61cdfc6662c0_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\ProgramData\5lIyoApxT4vJo5\cWhNZ9fc.exe"C:\ProgramData\5lIyoApxT4vJo5\cWhNZ9fc.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\ProgramData\5lIyoApxT4vJo5\cWhNZ9fc.exe"C:\ProgramData\5lIyoApxT4vJo5\cWhNZ9fc.exe"4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Program Files (x86)\Common Files\Microsoft Shared\MSInfo\msinfo32.exe"C:\Program Files (x86)\Common Files\Microsoft Shared\MSInfo\msinfo32.exe" /i:36125⤵PID:3168
-
-
C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe"C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe" /i:36125⤵PID:3552
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3756 --field-trial-handle=2676,i,447940133669489189,1353734109898858672,262144 --variations-seed-version /prefetch:81⤵PID:316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
491KB
MD5aa8572f61495850bef1836b2bef8898c
SHA173bc432666df33c6ab15937cd660ea4cc22984fe
SHA256b3eeb717372c77188ab01bb471b8cf184b4fc7663ae4cd2a80c1af72de12008d
SHA5122a99c2d227c1ee69cdb5f13be3df72e7e425a6efc941eeebbc207363825a6152e950a9356bc69bcabfdda26ad2f67afa206324180b13091c160da8d9d593ec6d
-
Filesize
491KB
MD504eb80dd59dd7ebe739b61cdfc6662c0
SHA1d900163f1fc7fbd62b1720af9f7c100ae351ace5
SHA25632224d8ce9b9eac3e7af9ce9a43dabf9580d93947ceb00f69c82d1c49a12f512
SHA512b252ace8fb1ac3ce786b82caedb64d430619c110b1d04f2ec1cd521a68f432527dd55692bfbc7b00358161760ef1767d561a221f764f1136024cc5f442197ea9