Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 17:20
Behavioral task
behavioral1
Sample
16d83b6332346b611c3566f0b383cad5_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
16d83b6332346b611c3566f0b383cad5_JaffaCakes118.exe
-
Size
784KB
-
MD5
16d83b6332346b611c3566f0b383cad5
-
SHA1
383863508a4e4c858000a35e587e67624062bf5d
-
SHA256
6c2954ce8e9baec9343adeccde04b74f6115012f2ea288a577800d5e9515d4a6
-
SHA512
c10e98a9d9f112433613b949dc46867b43d263f33f0238700d818230c7eceb7bc19e20e5c36cdb2224a564f61516404ca21240fc485c157ba43ad1faa9bdd7f4
-
SSDEEP
24576:ehkAtEpPPAHjzvYWCQeLdnvmm7gWDHjezDh3:SkfpQHPleAmsWTqh3
Malware Config
Signatures
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral2/memory/2320-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/2320-13-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4208-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4208-19-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/4208-29-0x0000000005370000-0x0000000005503000-memory.dmp xmrig behavioral2/memory/4208-30-0x00000000005A0000-0x000000000071F000-memory.dmp xmrig behavioral2/memory/4208-31-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 4208 16d83b6332346b611c3566f0b383cad5_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4208 16d83b6332346b611c3566f0b383cad5_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/2320-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x000800000002336e-11.dat upx behavioral2/memory/4208-12-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2320 16d83b6332346b611c3566f0b383cad5_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2320 16d83b6332346b611c3566f0b383cad5_JaffaCakes118.exe 4208 16d83b6332346b611c3566f0b383cad5_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2320 wrote to memory of 4208 2320 16d83b6332346b611c3566f0b383cad5_JaffaCakes118.exe 83 PID 2320 wrote to memory of 4208 2320 16d83b6332346b611c3566f0b383cad5_JaffaCakes118.exe 83 PID 2320 wrote to memory of 4208 2320 16d83b6332346b611c3566f0b383cad5_JaffaCakes118.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\16d83b6332346b611c3566f0b383cad5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\16d83b6332346b611c3566f0b383cad5_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\16d83b6332346b611c3566f0b383cad5_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\16d83b6332346b611c3566f0b383cad5_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4208
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD54f4781b615b47482367d00791bd134a4
SHA1f89c1cdafd7a768641c91c16738b0feb54a658d0
SHA2563c54da318df654bc973f3ea888d7d13f69c023fc2b7dcb2f6183212665d47158
SHA5129f97f0a42a3644c8cfceb3dd1f29a53854111375e82133cebeb3d94a56612432dc286ec5c24f1b261c1dd1ef97b6a40ac42ba25225b07c06e25a22016cfea815