Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
49s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 18:28
Static task
static1
Behavioral task
behavioral1
Sample
2355d53b6c74d4f82caece8f581c677c_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2355d53b6c74d4f82caece8f581c677c_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
2355d53b6c74d4f82caece8f581c677c_JaffaCakes118.exe
-
Size
3.9MB
-
MD5
2355d53b6c74d4f82caece8f581c677c
-
SHA1
1283382c240f1de20ebdef88777c5a730d474804
-
SHA256
f48167ca066052f30743f28b8b07941aeef91f93c677460545c9a34395196f03
-
SHA512
45d135874cbaad555eb430825ca0510774ae0d5a3646f7c1e331fa44f7f1d7ff0b346e5e5f7ac6d56275bf083f33f9c251b81eed96c614f8857976d78b65d55e
-
SSDEEP
98304:kDDqF5y5Z749uqDODECL/stieg3iIyCwD/:TF58cDODECL/soeqi3B/
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2944 SeFastInstall.exe 2248 Maxthon.exe 2272 Maxthon.tmp -
resource yara_rule behavioral2/files/0x0007000000023412-7.dat upx behavioral2/memory/2944-9-0x0000000000400000-0x00000000004AB000-memory.dmp upx behavioral2/memory/2944-26-0x0000000000400000-0x00000000004AB000-memory.dmp upx behavioral2/memory/2944-32-0x0000000000400000-0x00000000004AB000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 SeFastInstall.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2944 SeFastInstall.exe 2944 SeFastInstall.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3188 wrote to memory of 2944 3188 2355d53b6c74d4f82caece8f581c677c_JaffaCakes118.exe 81 PID 3188 wrote to memory of 2944 3188 2355d53b6c74d4f82caece8f581c677c_JaffaCakes118.exe 81 PID 3188 wrote to memory of 2944 3188 2355d53b6c74d4f82caece8f581c677c_JaffaCakes118.exe 81 PID 3188 wrote to memory of 2248 3188 2355d53b6c74d4f82caece8f581c677c_JaffaCakes118.exe 82 PID 3188 wrote to memory of 2248 3188 2355d53b6c74d4f82caece8f581c677c_JaffaCakes118.exe 82 PID 3188 wrote to memory of 2248 3188 2355d53b6c74d4f82caece8f581c677c_JaffaCakes118.exe 82 PID 2248 wrote to memory of 2272 2248 Maxthon.exe 83 PID 2248 wrote to memory of 2272 2248 Maxthon.exe 83 PID 2248 wrote to memory of 2272 2248 Maxthon.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2355d53b6c74d4f82caece8f581c677c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2355d53b6c74d4f82caece8f581c677c_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\SeFastInstall.exeC:\Users\Admin\AppData\Local\Temp\SeFastInstall.exe2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
PID:2944
-
-
C:\Users\Admin\AppData\Local\Temp\Maxthon.exeC:\Users\Admin\AppData\Local\Temp\Maxthon.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\is-7SNA7.tmp\Maxthon.tmp"C:\Users\Admin\AppData\Local\Temp\is-7SNA7.tmp\Maxthon.tmp" /SL5="$70092,2728859,51712,C:\Users\Admin\AppData\Local\Temp\Maxthon.exe"3⤵
- Executes dropped EXE
PID:2272
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5cba303fa69aeb25bc0de8d091268b37a
SHA147b5a8b97ee6dcf7367cc7fc4f96533325f772ff
SHA256c8d9e0c23746fad6884814d047fbbfacb797c90bc13601aac114c171360493d4
SHA512ba2ea01f9e32fa0aeebb791c35ccf18b7800bfe8f76fc79e28d2cd646980fce302edfc70a667fd2bcbc4a1a953eeef6f22801d4da9d3eb4baf6b26eeb9376c6d
-
Filesize
222KB
MD586233d22d29833ef8e81e2b84734f74d
SHA1be18c7bad708929843eb74828ef986c9177df29d
SHA2569da46947678441028a0ebe57666ec43791b3ae5217d75c2c47c599c6fc016b72
SHA512f6bde93171977d3b20c8d7ab836b9962d887a064b79f3f6090dbcd308144b8801dc4043be33aab09446eab7244ebd95bbc8e01d1044f40578be1ea61afa7433d
-
Filesize
693KB
MD582e31dc1c0fa036f7dfaff76c13003cf
SHA12642671a2faf72af7d64e953b49e62f538d53824
SHA256db6aa814463fa84a36bd66efacfaa1b91f92ba658b7145fabf5f6ee018e4c634
SHA51286f09d6387fedf6cfec7edd1e93ad89898377e314baaf75dc090194c3af17339a592ba5342c5240be4f9a12bbc40f621062226660b32047843564037155b3641