Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 01:43
Behavioral task
behavioral1
Sample
06f5f483e4c2ffc3cd2ed5a6137080b0_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
06f5f483e4c2ffc3cd2ed5a6137080b0_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
06f5f483e4c2ffc3cd2ed5a6137080b0_JaffaCakes118.exe
-
Size
839KB
-
MD5
06f5f483e4c2ffc3cd2ed5a6137080b0
-
SHA1
77ab51d04ef70e989c55e5d59a8267b64eab7cd0
-
SHA256
9706874c3dd471c7b2830eb0913e7026b3743459196a47de0e49ead9773209c5
-
SHA512
05bd739bdab24bad7b6804cd8b2190cb15bef3a56c4e18d4d74f76f672dfa72a2120642e330580000502bab7f0104a8774c5c50cbc30d1098835cda4134a40a1
-
SSDEEP
12288:4ghm8FELJ17wCpNPjIqxuuECGDUg8Zy/cLONpB6Q:4km8eHLO7Bl
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3044 cmd.exe -
resource yara_rule behavioral1/memory/2992-0-0x0000000000400000-0x00000000004D3000-memory.dmp upx behavioral1/memory/2992-32-0x0000000000400000-0x00000000004D3000-memory.dmp upx behavioral1/files/0x0031000000015b13-36.dat upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2992 set thread context of 2988 2992 06f5f483e4c2ffc3cd2ed5a6137080b0_JaffaCakes118.exe 28 -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2720 reg.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2988 2992 06f5f483e4c2ffc3cd2ed5a6137080b0_JaffaCakes118.exe 28 PID 2992 wrote to memory of 2988 2992 06f5f483e4c2ffc3cd2ed5a6137080b0_JaffaCakes118.exe 28 PID 2992 wrote to memory of 2988 2992 06f5f483e4c2ffc3cd2ed5a6137080b0_JaffaCakes118.exe 28 PID 2992 wrote to memory of 2988 2992 06f5f483e4c2ffc3cd2ed5a6137080b0_JaffaCakes118.exe 28 PID 2992 wrote to memory of 2988 2992 06f5f483e4c2ffc3cd2ed5a6137080b0_JaffaCakes118.exe 28 PID 2992 wrote to memory of 2988 2992 06f5f483e4c2ffc3cd2ed5a6137080b0_JaffaCakes118.exe 28 PID 2992 wrote to memory of 2988 2992 06f5f483e4c2ffc3cd2ed5a6137080b0_JaffaCakes118.exe 28 PID 2992 wrote to memory of 2988 2992 06f5f483e4c2ffc3cd2ed5a6137080b0_JaffaCakes118.exe 28 PID 2988 wrote to memory of 2600 2988 06f5f483e4c2ffc3cd2ed5a6137080b0_JaffaCakes118.exe 29 PID 2988 wrote to memory of 2600 2988 06f5f483e4c2ffc3cd2ed5a6137080b0_JaffaCakes118.exe 29 PID 2988 wrote to memory of 2600 2988 06f5f483e4c2ffc3cd2ed5a6137080b0_JaffaCakes118.exe 29 PID 2988 wrote to memory of 2600 2988 06f5f483e4c2ffc3cd2ed5a6137080b0_JaffaCakes118.exe 29 PID 2992 wrote to memory of 3044 2992 06f5f483e4c2ffc3cd2ed5a6137080b0_JaffaCakes118.exe 31 PID 2992 wrote to memory of 3044 2992 06f5f483e4c2ffc3cd2ed5a6137080b0_JaffaCakes118.exe 31 PID 2992 wrote to memory of 3044 2992 06f5f483e4c2ffc3cd2ed5a6137080b0_JaffaCakes118.exe 31 PID 2992 wrote to memory of 3044 2992 06f5f483e4c2ffc3cd2ed5a6137080b0_JaffaCakes118.exe 31 PID 2600 wrote to memory of 2720 2600 cmd.exe 32 PID 2600 wrote to memory of 2720 2600 cmd.exe 32 PID 2600 wrote to memory of 2720 2600 cmd.exe 32 PID 2600 wrote to memory of 2720 2600 cmd.exe 32 PID 2600 wrote to memory of 2732 2600 cmd.exe 34 PID 2600 wrote to memory of 2732 2600 cmd.exe 34 PID 2600 wrote to memory of 2732 2600 cmd.exe 34 PID 2600 wrote to memory of 2732 2600 cmd.exe 34 PID 2600 wrote to memory of 2732 2600 cmd.exe 34 PID 2600 wrote to memory of 2732 2600 cmd.exe 34 PID 2600 wrote to memory of 2732 2600 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\06f5f483e4c2ffc3cd2ed5a6137080b0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\06f5f483e4c2ffc3cd2ed5a6137080b0_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\06f5f483e4c2ffc3cd2ed5a6137080b0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\06f5f483e4c2ffc3cd2ed5a6137080b0_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Start.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Associations /v ModRiskFileTypes /t REG_SZ /d .exe /f4⤵
- Modifies registry key
PID:2720
-
-
C:\Windows\SysWOW64\gpupdate.exegpupdate /force4⤵PID:2732
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\jnduf.bat2⤵
- Deletes itself
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200B
MD59cedeb0b293d2b5491225ef3d9eb2a8b
SHA1b607ef9bd319b6ec696c8dab8a314998d133298b
SHA2563fc59706783a0778da9121da52a63e34e47c82f436d5b14943e14fb418fd4f08
SHA512ec7d4544e32b1ea460895b1037a9eca2529eed45d6ee1644f83dfc4d4ad8f7c32a811ee4627bc6b243fb5d5c9e3e2b22060d6a2903692830ff1f114d2b9f3cfc
-
Filesize
305B
MD5ee463d412f0f4ba05234064b38293f8e
SHA1fb297ac11a9bb1385329de4614d0fe0f24ef09f4
SHA2564835978d0d36c1e3d636b87b5edbf43a4b87050fb5d53edc7c1e01720f844436
SHA512c4f113f6c069944e7a23ffff9079c78b11c92bd310e573ab52cc47f0b8e20795d619428a8e24a96bf1c54483a0208ad14f1214dcfe95944f05a8fd621359e059
-
Filesize
839KB
MD55e401819202fcbedbe90fcdc049885cb
SHA154dd8c98993f5086a0c8fd8d1e3962c0952fde85
SHA256d376f1d1c704545644e1623b9b7e598211e5bf125f6c77834ec1eac214540931
SHA512dfa22a710b0e5c7f69da926221de830d0782e727d92485fda45078ed54ad7bfdd82691e240ddddca613352822354226762d68f59dd6dfadcee480611f0de8212