Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
79s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 16:46
Behavioral task
behavioral1
Sample
16bdce172eb6025f4e92c7498e8504b8_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
16bdce172eb6025f4e92c7498e8504b8_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
16bdce172eb6025f4e92c7498e8504b8_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
16bdce172eb6025f4e92c7498e8504b8
-
SHA1
20badf5f1f5f522f42b5e7e5e027e31ce01e4011
-
SHA256
b11b0eefa2ef95dec61171c9a0d89b105a70feeae0498063d5e205a151383dbb
-
SHA512
756124de083c0ae4fb1178bea7a3dcf35b7be4b2270c23eca046d6d0fc8ed0708d600d2f1cf5e5a20b4730e35125a0051278b65ec43468740ae5172414d3ca56
-
SSDEEP
24576:knQr0LaXLDg2TFoGohUaHBTUuxo6JoaxOczRk3kl0IfUTFof:90L122uaHBTUuG6HOc1okjUI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4004 16bdce172eb6025f4e92c7498e8504b8_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4004 16bdce172eb6025f4e92c7498e8504b8_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/4864-0-0x0000000000400000-0x00000000004E0000-memory.dmp upx behavioral2/memory/4004-15-0x0000000000400000-0x00000000004E0000-memory.dmp upx behavioral2/files/0x00090000000233c2-13.dat upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4864 16bdce172eb6025f4e92c7498e8504b8_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 4864 16bdce172eb6025f4e92c7498e8504b8_JaffaCakes118.exe 4004 16bdce172eb6025f4e92c7498e8504b8_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4864 wrote to memory of 4004 4864 16bdce172eb6025f4e92c7498e8504b8_JaffaCakes118.exe 81 PID 4864 wrote to memory of 4004 4864 16bdce172eb6025f4e92c7498e8504b8_JaffaCakes118.exe 81 PID 4864 wrote to memory of 4004 4864 16bdce172eb6025f4e92c7498e8504b8_JaffaCakes118.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\16bdce172eb6025f4e92c7498e8504b8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\16bdce172eb6025f4e92c7498e8504b8_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\16bdce172eb6025f4e92c7498e8504b8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\16bdce172eb6025f4e92c7498e8504b8_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4004
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD51cd59b6b6a9c266b3211c2d6c74254fa
SHA1c3981b55ef8f7589a0e4109e76eb014499195338
SHA256fcdf5453b0ae907ad99bb75343c3d48f00360af7f16e472d70244e7df188f2f0
SHA5124fe4b9c37b64b649af1bb306a630c291dcf009195b43d4f0e0bde75bc673f3d3479965d1fac76377866fe0bb4b6a66bb4080260b20f895dd3629ed9d4e074c3f