Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20/06/2024, 15:11
Static task
static1
Behavioral task
behavioral1
Sample
07257b0d004ba9db73a6ba6538121cfd_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
07257b0d004ba9db73a6ba6538121cfd_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
07257b0d004ba9db73a6ba6538121cfd_JaffaCakes118.exe
-
Size
360KB
-
MD5
07257b0d004ba9db73a6ba6538121cfd
-
SHA1
4ae2320ea56954fd66c98cf0cf4f0d95107063e8
-
SHA256
91bc78538798e0384f10a5ab90841d77f7a01341c9c6eb642beadb9789ed88d3
-
SHA512
2f7835f058c28670f7dc486d97fdc60650c4beb6ccf46c5c52cb4648ea7cc627009c85c6b25512ed39bbc5169bc7c020bc71eb0b0123bdb7d5f289471b394364
-
SSDEEP
6144:Vub9vidSyd/8wKko6y2vYMRpqSWqziVGQIbu3Cnd+vOCpYgfKAnzHwzSZAxJoS:e96dSymkdBvYMmSWhVoFnd+mCqg9Ibxz
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4020 Alertere.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3644 1304 WerFault.exe 94 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4020 set thread context of 1304 4020 Alertere.exe 94 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Alertere.exe 07257b0d004ba9db73a6ba6538121cfd_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4504 07257b0d004ba9db73a6ba6538121cfd_JaffaCakes118.exe 4504 07257b0d004ba9db73a6ba6538121cfd_JaffaCakes118.exe 4504 07257b0d004ba9db73a6ba6538121cfd_JaffaCakes118.exe 4504 07257b0d004ba9db73a6ba6538121cfd_JaffaCakes118.exe 4504 07257b0d004ba9db73a6ba6538121cfd_JaffaCakes118.exe 4504 07257b0d004ba9db73a6ba6538121cfd_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4020 wrote to memory of 1304 4020 Alertere.exe 94 PID 4020 wrote to memory of 1304 4020 Alertere.exe 94 PID 4020 wrote to memory of 1304 4020 Alertere.exe 94 PID 4020 wrote to memory of 1304 4020 Alertere.exe 94 PID 4020 wrote to memory of 1304 4020 Alertere.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\07257b0d004ba9db73a6ba6538121cfd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\07257b0d004ba9db73a6ba6538121cfd_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4504
-
C:\Windows\Alertere.exeC:\Windows\Alertere.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" 372552⤵PID:1304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1304 -s 123⤵
- Program crash
PID:3644
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1304 -ip 13041⤵PID:2052
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4088,i,6576818814118437872,11004518367271063231,262144 --variations-seed-version --mojo-platform-channel-handle=1428 /prefetch:81⤵PID:4080
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
360KB
MD507257b0d004ba9db73a6ba6538121cfd
SHA14ae2320ea56954fd66c98cf0cf4f0d95107063e8
SHA25691bc78538798e0384f10a5ab90841d77f7a01341c9c6eb642beadb9789ed88d3
SHA5122f7835f058c28670f7dc486d97fdc60650c4beb6ccf46c5c52cb4648ea7cc627009c85c6b25512ed39bbc5169bc7c020bc71eb0b0123bdb7d5f289471b394364