Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/06/2024, 20:22

General

  • Target

    0aabbce1efd14327d50739e1e9be306b_JaffaCakes118.exe

  • Size

    298KB

  • MD5

    0aabbce1efd14327d50739e1e9be306b

  • SHA1

    b778875fff7e8d4df1a7e35108cc686d83c007d2

  • SHA256

    0c48ab92f21bc57cd8f1eb7aae4adb3541f9261da4bc065accdc4bd0fbecaf4c

  • SHA512

    40c62ce6c8fc06f5e00e7987141840937b8c15f370f72ddea676014f832471f1b60f824589e0de5a7eeb16dfc352fffe1e5869200ac96dbcdccda964914ece2e

  • SSDEEP

    6144:LEcEYCW+j1z1p5EmkC+h9A+x3X60zfriGZv2MaVl/s:xD4jV1gmkBhTJq0DrVJCVl/

Score
7/10

Malware Config

Signatures

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0aabbce1efd14327d50739e1e9be306b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0aabbce1efd14327d50739e1e9be306b_JaffaCakes118.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4364

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4364-2-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/4364-1-0x0000000000412000-0x0000000000416000-memory.dmp

    Filesize

    16KB

  • memory/4364-0-0x00000000006B0000-0x00000000006B1000-memory.dmp

    Filesize

    4KB

  • memory/4364-3-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/4364-5-0x0000000000412000-0x0000000000416000-memory.dmp

    Filesize

    16KB

  • memory/4364-4-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB