Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2024, 18:13
Static task
static1
Behavioral task
behavioral1
Sample
1c025b2ec518bbee9ba6ce9e975478b6_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1c025b2ec518bbee9ba6ce9e975478b6_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
1c025b2ec518bbee9ba6ce9e975478b6_JaffaCakes118.exe
-
Size
52KB
-
MD5
1c025b2ec518bbee9ba6ce9e975478b6
-
SHA1
8917b2f23641cd45d2a4aea6c5c53e14cf6e5e87
-
SHA256
6fdd9f8829a43f87a297256a6011388218b08b8e578cf1cd63dd5538a0a3b456
-
SHA512
91f55336415c311c475910d5cc2fa61f27e64f8734a175b14c98f9a382a87374dd3542419604b19e8d5f75cfd910bdf4923b194d56ebeb81acacd474bd81a514
-
SSDEEP
1536:OrgZ3TSfRbDqkFUgiNNco5mmLRLYzKbC:2jfRbWkFVc5m22zKbC
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run hmnylspq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\kRah6be4n7 = "C:\\ProgramData\\vqvavgjs\\hmnylspq.exe" hmnylspq.exe -
Executes dropped EXE 1 IoCs
pid Process 3776 hmnylspq.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3256 1c025b2ec518bbee9ba6ce9e975478b6_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3256 wrote to memory of 3776 3256 1c025b2ec518bbee9ba6ce9e975478b6_JaffaCakes118.exe 102 PID 3256 wrote to memory of 3776 3256 1c025b2ec518bbee9ba6ce9e975478b6_JaffaCakes118.exe 102 PID 3256 wrote to memory of 3776 3256 1c025b2ec518bbee9ba6ce9e975478b6_JaffaCakes118.exe 102 PID 3256 wrote to memory of 3816 3256 1c025b2ec518bbee9ba6ce9e975478b6_JaffaCakes118.exe 103 PID 3256 wrote to memory of 3816 3256 1c025b2ec518bbee9ba6ce9e975478b6_JaffaCakes118.exe 103 PID 3256 wrote to memory of 3816 3256 1c025b2ec518bbee9ba6ce9e975478b6_JaffaCakes118.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c025b2ec518bbee9ba6ce9e975478b6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1c025b2ec518bbee9ba6ce9e975478b6_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\ProgramData\vqvavgjs\hmnylspq.exeC:\ProgramData\vqvavgjs\hmnylspq.exe2⤵
- Adds policy Run key to start application
- Executes dropped EXE
PID:3776
-
-
C:\Windows\SysWOW64\cmd.exe/c del /f C:\Users\Admin\AppData\Local\Temp\1C025B~1.EXE.bak >> NUL2⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3592 --field-trial-handle=2328,i,5873823382323802923,13134441441264702821,262144 --variations-seed-version /prefetch:81⤵PID:684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD51c025b2ec518bbee9ba6ce9e975478b6
SHA18917b2f23641cd45d2a4aea6c5c53e14cf6e5e87
SHA2566fdd9f8829a43f87a297256a6011388218b08b8e578cf1cd63dd5538a0a3b456
SHA51291f55336415c311c475910d5cc2fa61f27e64f8734a175b14c98f9a382a87374dd3542419604b19e8d5f75cfd910bdf4923b194d56ebeb81acacd474bd81a514