Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 10:28
Static task
static1
Behavioral task
behavioral1
Sample
05268db45422d0d7372eda3ee89fe504_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
05268db45422d0d7372eda3ee89fe504_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
05268db45422d0d7372eda3ee89fe504_JaffaCakes118.exe
-
Size
301KB
-
MD5
05268db45422d0d7372eda3ee89fe504
-
SHA1
ab2ecc6323b5e492670993d5587f4c9176b7f1ee
-
SHA256
b278c83cb2bd5b1dccd6d5fab6d3bbc29fc5ba4149450935ee9a4d618d0f5066
-
SHA512
2be37a209b95ec679216ab2d617bce730d7c33e52026dfadc105966fb7a51e3ef33c24e34c0ba7e6b946aa4b786f822aab29992efde35da13955a7e0fc9abbe0
-
SSDEEP
6144:alByr8TQmfqSUKzjLgG124I6PzZXxq3HSU2wbqfq/ZToQN:aLygPYK/LF12bm903xMfCZUQN
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 744 Bitoot -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Bitoot 05268db45422d0d7372eda3ee89fe504_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Common Files\Bitoot 05268db45422d0d7372eda3ee89fe504_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Delete.bat 05268db45422d0d7372eda3ee89fe504_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 744 Bitoot -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 836 wrote to memory of 3960 836 05268db45422d0d7372eda3ee89fe504_JaffaCakes118.exe 86 PID 836 wrote to memory of 3960 836 05268db45422d0d7372eda3ee89fe504_JaffaCakes118.exe 86 PID 836 wrote to memory of 3960 836 05268db45422d0d7372eda3ee89fe504_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\05268db45422d0d7372eda3ee89fe504_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\05268db45422d0d7372eda3ee89fe504_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\Delete.bat2⤵PID:3960
-
-
C:\Program Files (x86)\Common Files\Bitoot"C:\Program Files (x86)\Common Files\Bitoot"1⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:744
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
301KB
MD505268db45422d0d7372eda3ee89fe504
SHA1ab2ecc6323b5e492670993d5587f4c9176b7f1ee
SHA256b278c83cb2bd5b1dccd6d5fab6d3bbc29fc5ba4149450935ee9a4d618d0f5066
SHA5122be37a209b95ec679216ab2d617bce730d7c33e52026dfadc105966fb7a51e3ef33c24e34c0ba7e6b946aa4b786f822aab29992efde35da13955a7e0fc9abbe0
-
Filesize
214B
MD596fd497cc751bca47811bae514b979ed
SHA1cefcba369e4fc6d3ee90768eed068952f05c2258
SHA25618a941cd54f3724e185fa0f1fde2565e0ce25f7b03f0cd3d5874bcf92d5f303a
SHA5129262f50745c04fd464819027eb131198b790108daa12956aa43f893fd59fe00565eea33cc217a7051aebb5cc5c916660b6c4dcc39c1a4f9518552150478c0ccb