Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 12:12
Static task
static1
Behavioral task
behavioral1
Sample
15f607efaa360da0c81b93751b6b9a32_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
15f607efaa360da0c81b93751b6b9a32_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
15f607efaa360da0c81b93751b6b9a32_JaffaCakes118.exe
-
Size
346KB
-
MD5
15f607efaa360da0c81b93751b6b9a32
-
SHA1
762cc35f8e415746688b7be91bca897ca29dc272
-
SHA256
0e095582a21fba60626e0316d6a42397e3037ec32566fd75c52955c18f912671
-
SHA512
25b0282ca41ba88ed20e4f7304c5f6d3da87cd63de7161a1aec19c48158c14c8b37b5d57cf2ce4c9cec65f09fb53e4d36cb1884ab79c809f6f87a9e9eae0d729
-
SSDEEP
3072:Sx+QMgSXupDSbLiAKWi63Q77NHhQjE3Ls8XLsEmSm/VGw8u0n1IM+CmNWqQ1CWw7:uTSeRSX0W9Q7JHsRam/Aw8uoxKfLkQ
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4124 set thread context of 4344 4124 15f607efaa360da0c81b93751b6b9a32_JaffaCakes118.exe 82 -
Program crash 1 IoCs
pid pid_target Process procid_target 5088 4344 WerFault.exe 82 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4124 15f607efaa360da0c81b93751b6b9a32_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4344 15f607efaa360da0c81b93751b6b9a32_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4124 wrote to memory of 4676 4124 15f607efaa360da0c81b93751b6b9a32_JaffaCakes118.exe 81 PID 4124 wrote to memory of 4676 4124 15f607efaa360da0c81b93751b6b9a32_JaffaCakes118.exe 81 PID 4124 wrote to memory of 4676 4124 15f607efaa360da0c81b93751b6b9a32_JaffaCakes118.exe 81 PID 4124 wrote to memory of 4344 4124 15f607efaa360da0c81b93751b6b9a32_JaffaCakes118.exe 82 PID 4124 wrote to memory of 4344 4124 15f607efaa360da0c81b93751b6b9a32_JaffaCakes118.exe 82 PID 4124 wrote to memory of 4344 4124 15f607efaa360da0c81b93751b6b9a32_JaffaCakes118.exe 82 PID 4124 wrote to memory of 4344 4124 15f607efaa360da0c81b93751b6b9a32_JaffaCakes118.exe 82 PID 4124 wrote to memory of 4344 4124 15f607efaa360da0c81b93751b6b9a32_JaffaCakes118.exe 82 PID 4124 wrote to memory of 4344 4124 15f607efaa360da0c81b93751b6b9a32_JaffaCakes118.exe 82 PID 4124 wrote to memory of 4344 4124 15f607efaa360da0c81b93751b6b9a32_JaffaCakes118.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\15f607efaa360da0c81b93751b6b9a32_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\15f607efaa360da0c81b93751b6b9a32_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\15f607efaa360da0c81b93751b6b9a32_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\15f607efaa360da0c81b93751b6b9a32_JaffaCakes118.exe2⤵PID:4676
-
-
C:\Users\Admin\AppData\Local\Temp\15f607efaa360da0c81b93751b6b9a32_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\15f607efaa360da0c81b93751b6b9a32_JaffaCakes118.exe2⤵
- Suspicious use of UnmapMainImage
PID:4344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4344 -s 123⤵
- Program crash
PID:5088
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4344 -ip 43441⤵PID:4900