Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 03:57
Behavioral task
behavioral1
Sample
14986692a6fc5bc7442950b056b1037e_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
14986692a6fc5bc7442950b056b1037e_JaffaCakes118.exe
-
Size
386KB
-
MD5
14986692a6fc5bc7442950b056b1037e
-
SHA1
a6f5600e87ae09b1c4cd694cac55084986ed3299
-
SHA256
4e23a91c94eb06e6e0b4a303f9fd9126cb74d6226168cdd3383db1c8901f27a9
-
SHA512
402901293ae900dbf28e1580ecbfaa5db88c0a0349dbb4cc2595359a6dab942ebba3d6824a4015afe5d27a1a06c5373221106cc4497b9307c889d969c1da7dc4
-
SSDEEP
12288:59xZ5yN3Cwaw//ikDju436I26h+OoS9Ot6:59vsky/7NKDm+16
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/468-0-0x0000000000020000-0x000000000016F000-memory.dmp upx behavioral2/memory/468-1-0x0000000000020000-0x000000000016F000-memory.dmp upx behavioral2/files/0x000700000002355f-6.dat upx behavioral2/memory/468-7-0x0000000000020000-0x000000000016F000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 468 wrote to memory of 3560 468 14986692a6fc5bc7442950b056b1037e_JaffaCakes118.exe 94 PID 468 wrote to memory of 3560 468 14986692a6fc5bc7442950b056b1037e_JaffaCakes118.exe 94 PID 468 wrote to memory of 3560 468 14986692a6fc5bc7442950b056b1037e_JaffaCakes118.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\14986692a6fc5bc7442950b056b1037e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\14986692a6fc5bc7442950b056b1037e_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\500.bat2⤵PID:3560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
386KB
MD514986692a6fc5bc7442950b056b1037e
SHA1a6f5600e87ae09b1c4cd694cac55084986ed3299
SHA2564e23a91c94eb06e6e0b4a303f9fd9126cb74d6226168cdd3383db1c8901f27a9
SHA512402901293ae900dbf28e1580ecbfaa5db88c0a0349dbb4cc2595359a6dab942ebba3d6824a4015afe5d27a1a06c5373221106cc4497b9307c889d969c1da7dc4
-
Filesize
177B
MD57d7c5881878f6592e605882b0c2be299
SHA1f812fe9cb5940ce1425a8e3f0c119c3983e3923f
SHA256e64216e1004e81e576a22904c5ccd27acd6248b74026784184d64f8187aafc45
SHA512ace1f96b81b5f898e8b086970375bf3cb9ed806fea19dc568d50a06770c578bfb7ff4835b9e892f782a05c8bfbdbc42a7174567165f1ec70a38450bbb1b9bbce