Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 01:48
Static task
static1
Behavioral task
behavioral1
Sample
24377b2dcde874f463b161afcf4ee876_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
24377b2dcde874f463b161afcf4ee876_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
24377b2dcde874f463b161afcf4ee876_JaffaCakes118.exe
-
Size
591KB
-
MD5
24377b2dcde874f463b161afcf4ee876
-
SHA1
12cbb723fa27c7ee400609fbf4aeeb56a03b67b4
-
SHA256
6fc0709264338aed596b8f54b7f1c7b58c201cd081ef1aba6114c06918569eab
-
SHA512
f8b0aff3f47490b90ee653684a57f8f89ec6a6214337d18ef6add0d82f6421fb410bca8f4c8354df3c28ac8fb18db39ac35d6d6253dd576f605da80a7687c462
-
SSDEEP
12288:U6iDfz9quwmtmlDFOF3Z4mxxVLMmv/8ivmzMGcB7g:U6iDfz9e4QmXV8ivqF4M
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 856 svchost.exe -k -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svchost.exe -k 24377b2dcde874f463b161afcf4ee876_JaffaCakes118.exe File opened for modification C:\Windows\svchost.exe -k 24377b2dcde874f463b161afcf4ee876_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4404 1332 WerFault.exe 79 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1332 24377b2dcde874f463b161afcf4ee876_JaffaCakes118.exe Token: SeDebugPrivilege 856 svchost.exe -k -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 856 svchost.exe -k -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 856 wrote to memory of 964 856 svchost.exe -k 81 PID 856 wrote to memory of 964 856 svchost.exe -k 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\24377b2dcde874f463b161afcf4ee876_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\24377b2dcde874f463b161afcf4ee876_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1332 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1332 -s 7122⤵
- Program crash
PID:4404
-
-
C:\Windows\svchost.exe -k"C:\Windows\svchost.exe -k"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1332 -ip 13321⤵PID:1020
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
591KB
MD524377b2dcde874f463b161afcf4ee876
SHA112cbb723fa27c7ee400609fbf4aeeb56a03b67b4
SHA2566fc0709264338aed596b8f54b7f1c7b58c201cd081ef1aba6114c06918569eab
SHA512f8b0aff3f47490b90ee653684a57f8f89ec6a6214337d18ef6add0d82f6421fb410bca8f4c8354df3c28ac8fb18db39ac35d6d6253dd576f605da80a7687c462