Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 14:07
Behavioral task
behavioral1
Sample
22a1168da41922234d198dd889158e68_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
22a1168da41922234d198dd889158e68_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
22a1168da41922234d198dd889158e68_JaffaCakes118.exe
-
Size
414KB
-
MD5
22a1168da41922234d198dd889158e68
-
SHA1
62f51fe1ee1051cea297ed81f2e3506aaa4ce487
-
SHA256
c3afc1a93d796294be1138f639e49a9783c191c47e8b7ffed4d808e303d57ec1
-
SHA512
59a22f82be771b73a723894ab85b18142567295b3b8f72f39eb3d6912c2a92de9ca1114927674bddd784c5d30c09f5640a0fe5464b22f00b5626c5f33772f961
-
SSDEEP
3072:EmVW8iTX/3RflkXq1+0cxxsWEL02fXcIp08Moe9DES+ZDYc:VM7jJlLxYTHYZM1UZsc
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3820-0-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral2/files/0x000700000002341e-6.dat upx behavioral2/memory/3820-34-0x0000000000400000-0x0000000000467000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\winxcfg.exe = "C:\\Windows\\system32\\winxcfg.exe" 22a1168da41922234d198dd889158e68_JaffaCakes118.exe -
Drops file in System32 directory 33 IoCs
description ioc Process File created C:\Windows\SysWOW64\macromd\honies letting dudes flush mouths full of hot cum.mpg.pif 22a1168da41922234d198dd889158e68_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\sluty cock sucking chick.mpg.pif 22a1168da41922234d198dd889158e68_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\amateur babe showing pink.mpg.pif 22a1168da41922234d198dd889158e68_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Harry Potter and the sorcerors stone.divx.exe 22a1168da41922234d198dd889158e68_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\cute blonde cheerleader dancing.mpg.pif 22a1168da41922234d198dd889158e68_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\both holes fucked by a massive fucking machin.mpg.pif 22a1168da41922234d198dd889158e68_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\stud fucking his blonde french maid.mpg.pif 22a1168da41922234d198dd889158e68_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\beautiful blonde gettin an anal fucking.mpg.pif 22a1168da41922234d198dd889158e68_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Blonde and Japanese girl bukkake.mpg.exe 22a1168da41922234d198dd889158e68_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Counter Strike CD Keygen.exe 22a1168da41922234d198dd889158e68_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\aimcracker.exe 22a1168da41922234d198dd889158e68_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\amateur swinger babe sucking on a couple of cocks.mpg.pif 22a1168da41922234d198dd889158e68_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\some fine amateur pussy shots from behind.mpg.pif 22a1168da41922234d198dd889158e68_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\babe leading pussy-whipped stud around by her cunt.mpg.pif 22a1168da41922234d198dd889158e68_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\babes with oversized hooters spreading.mpg.pif 22a1168da41922234d198dd889158e68_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\Website Hacker.exe 22a1168da41922234d198dd889158e68_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\AOL.exe 22a1168da41922234d198dd889158e68_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\macromd\cute blonde cheerleader dancing.mpg.pif 22a1168da41922234d198dd889158e68_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\two kinky old lezbos snapping the whip.mpg.pif 22a1168da41922234d198dd889158e68_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\horny housewife looking for some action.mpg.pif 22a1168da41922234d198dd889158e68_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\some hard sucking and fucking babes.mpg.pif 22a1168da41922234d198dd889158e68_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\krystal steal getting her bald clam filled.mpg.pif 22a1168da41922234d198dd889158e68_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\blonde showing her pussy to her neighbor.mpg.pif 22a1168da41922234d198dd889158e68_JaffaCakes118.exe File created C:\Windows\SysWOW64\winxcfg.exe 22a1168da41922234d198dd889158e68_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\nikki nova sex scene huge dick blowjob.mpg.exe 22a1168da41922234d198dd889158e68_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\AIM Account Hacker.exe 22a1168da41922234d198dd889158e68_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\busty blondie with cool ass.mpg.pif 22a1168da41922234d198dd889158e68_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\little chicken shy about exposing sweet cunt.mpg.pif 22a1168da41922234d198dd889158e68_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\2 horny babes doing 1 lucky dude.mpg.pif 22a1168da41922234d198dd889158e68_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\asian slut with puffy exotic lips.mpg.pif 22a1168da41922234d198dd889158e68_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\AIM Password Stealer.exe 22a1168da41922234d198dd889158e68_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\anastasia nude.exe 22a1168da41922234d198dd889158e68_JaffaCakes118.exe File created C:\Windows\SysWOW64\macromd\bad gal being tied and bound.mpg.pif 22a1168da41922234d198dd889158e68_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD549b35a10a943172df437820c54b203e5
SHA1eb1290d83af479e01aeac6e741cd4b58f3e74601
SHA256371fb7b3ad97a1ac64cd7e556b0e878fdcd102754eafaecdfdd44c2e51c21e6b
SHA512c3cdef38100a20181e14304d96688ece4b170040775722899b89d1d27823071b306a634e1bceddab11051a988c6dc5a637898a7f36303ce1b55ca0be86e1f510