Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/07/2024, 10:21

General

  • Target

    1aed33a84cd7d990e75e9a4fda1d65e4_JaffaCakes118.exe

  • Size

    298KB

  • MD5

    1aed33a84cd7d990e75e9a4fda1d65e4

  • SHA1

    37ed185e4ecfe5093546a5245e760607d3bf3141

  • SHA256

    d56eae9f96dd6e2601f9e8fff7d0b431c13e435391845890cd2078d0a62be8b2

  • SHA512

    0c3f97c1dfdf612466c4839c1c551aa97ee82f330c019d61a590ab1e9598c0fa4b1ef83f6280bdbfbdad32bf9d0537f1740f08c42772dcd1e2cf85ef952e48c3

  • SSDEEP

    6144:Q1db49+rEg024fpLZazEjvE/rbay19tSt4bO2BaDmeBJe59kIdi:QjkArEN249AyE/rbaMct4bO2/V8

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 16 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • AutoIT Executable 15 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\1aed33a84cd7d990e75e9a4fda1d65e4_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1aed33a84cd7d990e75e9a4fda1d65e4_JaffaCakes118.exe"
    1⤵
      PID:4972
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3924 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:2212

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Adminlog.html

        Filesize

        621B

        MD5

        31115d3b90cbe05fb485c24486586e48

        SHA1

        ce3085327fbaff2e83f5bc79eba2220736c4272a

        SHA256

        8b3ddc28f2b40de5fdacce4f1decd827a39e76d02f1d82e883056aa1e4ed24f8

        SHA512

        12f5c59e959280567acaf8124ea30bb48b39b23fb1e79bb066ccf49805dbdebdae8d58897239f1f20a6defa82da49f03a0af6f12a9ad8b0d5d4ede8d407a3ccb

      • memory/4972-18-0x0000000000400000-0x00000000004C1000-memory.dmp

        Filesize

        772KB

      • memory/4972-20-0x0000000000400000-0x00000000004C1000-memory.dmp

        Filesize

        772KB

      • memory/4972-13-0x0000000000400000-0x00000000004C1000-memory.dmp

        Filesize

        772KB

      • memory/4972-14-0x0000000000400000-0x00000000004C1000-memory.dmp

        Filesize

        772KB

      • memory/4972-15-0x0000000000400000-0x00000000004C1000-memory.dmp

        Filesize

        772KB

      • memory/4972-16-0x0000000000400000-0x00000000004C1000-memory.dmp

        Filesize

        772KB

      • memory/4972-1-0x0000000000400000-0x00000000004C1000-memory.dmp

        Filesize

        772KB

      • memory/4972-17-0x0000000000400000-0x00000000004C1000-memory.dmp

        Filesize

        772KB

      • memory/4972-19-0x0000000000400000-0x00000000004C1000-memory.dmp

        Filesize

        772KB

      • memory/4972-0-0x0000000000400000-0x00000000004C1000-memory.dmp

        Filesize

        772KB

      • memory/4972-21-0x0000000000400000-0x00000000004C1000-memory.dmp

        Filesize

        772KB

      • memory/4972-22-0x0000000000400000-0x00000000004C1000-memory.dmp

        Filesize

        772KB

      • memory/4972-23-0x0000000000400000-0x00000000004C1000-memory.dmp

        Filesize

        772KB

      • memory/4972-24-0x0000000000400000-0x00000000004C1000-memory.dmp

        Filesize

        772KB

      • memory/4972-25-0x0000000000400000-0x00000000004C1000-memory.dmp

        Filesize

        772KB

      • memory/4972-26-0x0000000000400000-0x00000000004C1000-memory.dmp

        Filesize

        772KB