Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 07:47
Behavioral task
behavioral1
Sample
21966b15bbb4957362df4553e5d9c342_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
21966b15bbb4957362df4553e5d9c342_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
21966b15bbb4957362df4553e5d9c342_JaffaCakes118.exe
-
Size
502KB
-
MD5
21966b15bbb4957362df4553e5d9c342
-
SHA1
7f7fac5c779f1533ecab9b7642f5b773ec7effc7
-
SHA256
d2d4bd955a4207b39aee701613f9b28773d6e643842b100c7052825e82c7a47e
-
SHA512
42940fab792ce9fc669d3826b31d2f9fb34e2864c133d5230c703b1af601afe0e2cd8beaf90390bec8a2bcde802ca957c1e0715736eb485856bccc313591e697
-
SSDEEP
6144:Lp/bGrl1gl2y54R5k0gfNqQZatB1VzVYPjgxajb1DKr0qFdF+KjZaQMIhL:Lp/ul1glRuO8AatFzVYPjNjZKTFdx
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2592 Cbodua.exe -
resource yara_rule behavioral1/memory/2084-0-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral1/files/0x00080000000145c9-13.dat upx behavioral1/memory/2592-16-0x0000000000400000-0x000000000047F000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job 21966b15bbb4957362df4553e5d9c342_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job 21966b15bbb4957362df4553e5d9c342_JaffaCakes118.exe File created C:\Windows\Cbodua.exe 21966b15bbb4957362df4553e5d9c342_JaffaCakes118.exe File opened for modification C:\Windows\Cbodua.exe 21966b15bbb4957362df4553e5d9c342_JaffaCakes118.exe File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job Cbodua.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job Cbodua.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main Cbodua.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe 2592 Cbodua.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2592 Cbodua.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2084 21966b15bbb4957362df4553e5d9c342_JaffaCakes118.exe 2592 Cbodua.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2592 2084 21966b15bbb4957362df4553e5d9c342_JaffaCakes118.exe 28 PID 2084 wrote to memory of 2592 2084 21966b15bbb4957362df4553e5d9c342_JaffaCakes118.exe 28 PID 2084 wrote to memory of 2592 2084 21966b15bbb4957362df4553e5d9c342_JaffaCakes118.exe 28 PID 2084 wrote to memory of 2592 2084 21966b15bbb4957362df4553e5d9c342_JaffaCakes118.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\21966b15bbb4957362df4553e5d9c342_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\21966b15bbb4957362df4553e5d9c342_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\Cbodua.exeC:\Windows\Cbodua.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:2592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
502KB
MD521966b15bbb4957362df4553e5d9c342
SHA17f7fac5c779f1533ecab9b7642f5b773ec7effc7
SHA256d2d4bd955a4207b39aee701613f9b28773d6e643842b100c7052825e82c7a47e
SHA51242940fab792ce9fc669d3826b31d2f9fb34e2864c133d5230c703b1af601afe0e2cd8beaf90390bec8a2bcde802ca957c1e0715736eb485856bccc313591e697
-
Filesize
372B
MD5c2919100590e15c30650f3d1a17e391e
SHA11fbfb08d78b32ffa064f0657e9fd7a7683bef548
SHA2560fc5cd1e5249e0dbad9a6e4fe673cc81ca6ab33f5988c6acc1b56d08be0e2419
SHA51273d774ed359d3af60e1b0205a3a28aa2edd6b3cce95069b3fa6f27dafd5f11a2af548238cffd5b86e3e92a0346fcffb992f6656644a1c6f9ba014aae294c602d