Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/07/2024, 14:07

General

  • Target

    22a1168da41922234d198dd889158e68_JaffaCakes118.exe

  • Size

    414KB

  • MD5

    22a1168da41922234d198dd889158e68

  • SHA1

    62f51fe1ee1051cea297ed81f2e3506aaa4ce487

  • SHA256

    c3afc1a93d796294be1138f639e49a9783c191c47e8b7ffed4d808e303d57ec1

  • SHA512

    59a22f82be771b73a723894ab85b18142567295b3b8f72f39eb3d6912c2a92de9ca1114927674bddd784c5d30c09f5640a0fe5464b22f00b5626c5f33772f961

  • SSDEEP

    3072:EmVW8iTX/3RflkXq1+0cxxsWEL02fXcIp08Moe9DES+ZDYc:VM7jJlLxYTHYZM1UZsc

Score
7/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\22a1168da41922234d198dd889158e68_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\22a1168da41922234d198dd889158e68_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    PID:3820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\macromd\aimcracker.exe

    Filesize

    89KB

    MD5

    49b35a10a943172df437820c54b203e5

    SHA1

    eb1290d83af479e01aeac6e741cd4b58f3e74601

    SHA256

    371fb7b3ad97a1ac64cd7e556b0e878fdcd102754eafaecdfdd44c2e51c21e6b

    SHA512

    c3cdef38100a20181e14304d96688ece4b170040775722899b89d1d27823071b306a634e1bceddab11051a988c6dc5a637898a7f36303ce1b55ca0be86e1f510

  • memory/3820-0-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/3820-34-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB