Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 07:41
Static task
static1
Behavioral task
behavioral1
Sample
073e2de813650c64b8a2cb477c545416_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
073e2de813650c64b8a2cb477c545416_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
073e2de813650c64b8a2cb477c545416_JaffaCakes118.exe
-
Size
10.5MB
-
MD5
073e2de813650c64b8a2cb477c545416
-
SHA1
89bf883df3b3c4d22405c8744eabf0781064c25f
-
SHA256
742e6dc265b165369150b429ba002f5f25c42c505de7481cefdaa4065ae83660
-
SHA512
e8751642ed28f86af6fa5f725797e0edf5dbc630454b21a8fe26d7e6ef2a393fccb2f606b8b9d00298436f56b07f2d00af0964704fd71901f0d20f150d196f61
-
SSDEEP
98304:EcKGjGHGOGjvaHGOGj7H9HGOGMGjvaHGOGjOHGOGMaHBj7cjGHGOGjvaHGOGj7HH:E0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1236 jnduia.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1236 jnduia.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1236 jnduia.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1236 jnduia.exe 1236 jnduia.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4676 wrote to memory of 1236 4676 073e2de813650c64b8a2cb477c545416_JaffaCakes118.exe 80 PID 4676 wrote to memory of 1236 4676 073e2de813650c64b8a2cb477c545416_JaffaCakes118.exe 80 PID 4676 wrote to memory of 1236 4676 073e2de813650c64b8a2cb477c545416_JaffaCakes118.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\073e2de813650c64b8a2cb477c545416_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\073e2de813650c64b8a2cb477c545416_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\jnduia.exeC:\Users\Admin\AppData\Local\Temp\jnduia.exe -run C:\Users\Admin\AppData\Local\Temp\073e2de813650c64b8a2cb477c545416_JaffaCakes118.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1236
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.8MB
MD5a61ab3e73caecbf7a58930b7ea408847
SHA1fc4d23766149db6dc6f7f97557111c759d206b9b
SHA256fdc3139ee660a6d0af1f8072e1056b3d75cc0b06b2985bb07dfd07a387fc6086
SHA512c3a2f9756dd8806c205f294ef55515c68427aabbde4da0d2fdbd9072568a8844f5813582f70de4b9c5037bbb2fbe8ec3020fe370947e0d6f4481af45bbf55312