Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
51s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 05:58
Static task
static1
Behavioral task
behavioral1
Sample
14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe
-
Size
240KB
-
MD5
14e9af2b3b387642887c9e545ac248d2
-
SHA1
0d25004347da456697ef8c4ddbf8e8ecdc606972
-
SHA256
495ae62a0acba8cd23585cf6bbb8e35ca2944c9028816ec66ffe7248f63455e6
-
SHA512
590c3b34ff4e7536e673700f4e0b2fdde96a97b0c6f36e0a6387bb24806f16def37625bf62213fd348a14237984193b6b65ba9b9eb0194f0e39df8d65e1be32b
-
SSDEEP
6144:m8g/7ixgAHtuypsUb+MlLwIPXD5OkkQ4tMZqdQsyBd+ptEs:mzeWildh1wIPXD5OkkQ4uqdQD6
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4164 server.exe 4852 server.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4164 server.exe 4164 server.exe 4164 server.exe 4164 server.exe 4852 server.exe 4852 server.exe 4852 server.exe 4852 server.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1204 wrote to memory of 4164 1204 14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe 81 PID 1204 wrote to memory of 4164 1204 14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe 81 PID 1204 wrote to memory of 4164 1204 14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe 81 PID 4164 wrote to memory of 3532 4164 server.exe 56 PID 4164 wrote to memory of 3532 4164 server.exe 56 PID 4164 wrote to memory of 3532 4164 server.exe 56 PID 4164 wrote to memory of 3532 4164 server.exe 56 PID 1204 wrote to memory of 4852 1204 14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe 82 PID 1204 wrote to memory of 4852 1204 14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe 82 PID 1204 wrote to memory of 4852 1204 14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe 82 PID 4852 wrote to memory of 3532 4852 server.exe 56 PID 4852 wrote to memory of 3532 4852 server.exe 56 PID 4852 wrote to memory of 3532 4852 server.exe 56 PID 4852 wrote to memory of 3532 4852 server.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\14e9af2b3b387642887c9e545ac248d2_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4164
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4852
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5fa5391fcdd6bf8a40a0b9183d00b8c22
SHA1b489da2cf80ee8c3f7f93fba3432c10e463b4567
SHA256b629d536476f47e272a9ab722e2925c706747ae57f946e0c9bd6b7336568761f
SHA5123b58d52cec2b6f163bdb11dab7162ccb0fe663d2d748848aa36ac0ecfaa2fe8ce731b7446760e33a3afe63b53b9785988754381c19d36e01427cbcf707a721f0