Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
31809863772...18.exe
windows7-x64
71809863772...18.exe
windows10-2004-x64
7$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$TEMP/matrix33680.exe
windows7-x64
3$TEMP/matrix33680.exe
windows10-2004-x64
7Uninstall.exe
windows7-x64
7Uninstall.exe
windows10-2004-x64
7Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 23:59
Static task
static1
Behavioral task
behavioral1
Sample
18098637720bdce77eeb119276a3049d_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
18098637720bdce77eeb119276a3049d_JaffaCakes118.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
$TEMP/matrix33680.exe
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
$TEMP/matrix33680.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
Uninstall.exe
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
Uninstall.exe
Resource
win10v2004-20240508-en
General
-
Target
18098637720bdce77eeb119276a3049d_JaffaCakes118.exe
-
Size
114KB
-
MD5
18098637720bdce77eeb119276a3049d
-
SHA1
e67d9d54fdd8e08b5b252f76d3c9d012a12cba5a
-
SHA256
c8e26282d16d383a962f67616a11a1338377b4f1668c57e2e652b447916ab66b
-
SHA512
0e3a0cad5989d4a57d7c18dfe87fb98ef1e41bc70126eb180bedd7baecc4ff73136ced754ec4cf9d5a59cd07bb0f8cdf44a833afbb60be561f57e1d7dd35caba
-
SSDEEP
3072:WNyah0mJ8NAPp/hag8c5WDElgsHBiod+ddczWRxY:WwPsppaghX6sHb8uqRxY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2028 matrix33680.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3324 2028 WerFault.exe 83 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2992 wrote to memory of 2028 2992 18098637720bdce77eeb119276a3049d_JaffaCakes118.exe 83 PID 2992 wrote to memory of 2028 2992 18098637720bdce77eeb119276a3049d_JaffaCakes118.exe 83 PID 2992 wrote to memory of 2028 2992 18098637720bdce77eeb119276a3049d_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\18098637720bdce77eeb119276a3049d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\18098637720bdce77eeb119276a3049d_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\matrix33680.exeC:\Users\Admin\AppData\Local\Temp\matrix33680.exe2⤵
- Executes dropped EXE
PID:2028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 8763⤵
- Program crash
PID:3324
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2028 -ip 20281⤵PID:4416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5677dd6a715290bfa453cda92e6e00da4
SHA1540f607d63f8715feaf53bca2ae96f727a9b7299
SHA25681f17cc0d8b8c45468d024fcadca3242b1844989086103e7b5800c7a49861f63
SHA51289839fc24b284ebfb4b840d6516c924726f586ac20314e9a8a0d1bffe66a61afdb41afba2a6baaffd27251c94f7facb817bf9a972c43517d0192a1685db6b094