Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
79s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 02:51
Static task
static1
Behavioral task
behavioral1
Sample
2461cbdc6b7b7259ce26beddd0412885_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2461cbdc6b7b7259ce26beddd0412885_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
2461cbdc6b7b7259ce26beddd0412885_JaffaCakes118.exe
-
Size
416KB
-
MD5
2461cbdc6b7b7259ce26beddd0412885
-
SHA1
11e7d766f35628a2ff4830383780572d02c67777
-
SHA256
12c6ad5ace8558f895eba8af96aa4c6cd53cb6ca423a7d0cfd6af02f9100b429
-
SHA512
8ba5cedbee938e8e4991346d4fffa42090e82cf02a9237815a3ee2d80cbc59c3c1afd15525721f5d379db59167fb46330b918c5d40e896968e9d1701caa6bd95
-
SSDEEP
12288:eeRIVTWUOUyfGgIHpnxYt/boZJijE5s4qQXvvv:eGyWjUyfGtY5oZpn
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1732 svchost.exe 1300 clltaj.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\clltaj.exe svchost.exe File created C:\Windows\SysWOW64\clltaj.exe svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4800 set thread context of 1732 4800 2461cbdc6b7b7259ce26beddd0412885_JaffaCakes118.exe 83 -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4800 wrote to memory of 2008 4800 2461cbdc6b7b7259ce26beddd0412885_JaffaCakes118.exe 80 PID 4800 wrote to memory of 2008 4800 2461cbdc6b7b7259ce26beddd0412885_JaffaCakes118.exe 80 PID 4800 wrote to memory of 2008 4800 2461cbdc6b7b7259ce26beddd0412885_JaffaCakes118.exe 80 PID 2008 wrote to memory of 1800 2008 csc.exe 82 PID 2008 wrote to memory of 1800 2008 csc.exe 82 PID 2008 wrote to memory of 1800 2008 csc.exe 82 PID 4800 wrote to memory of 1732 4800 2461cbdc6b7b7259ce26beddd0412885_JaffaCakes118.exe 83 PID 4800 wrote to memory of 1732 4800 2461cbdc6b7b7259ce26beddd0412885_JaffaCakes118.exe 83 PID 4800 wrote to memory of 1732 4800 2461cbdc6b7b7259ce26beddd0412885_JaffaCakes118.exe 83 PID 4800 wrote to memory of 1732 4800 2461cbdc6b7b7259ce26beddd0412885_JaffaCakes118.exe 83 PID 4800 wrote to memory of 1732 4800 2461cbdc6b7b7259ce26beddd0412885_JaffaCakes118.exe 83 PID 4800 wrote to memory of 1732 4800 2461cbdc6b7b7259ce26beddd0412885_JaffaCakes118.exe 83 PID 4800 wrote to memory of 1732 4800 2461cbdc6b7b7259ce26beddd0412885_JaffaCakes118.exe 83 PID 4800 wrote to memory of 1732 4800 2461cbdc6b7b7259ce26beddd0412885_JaffaCakes118.exe 83 PID 4800 wrote to memory of 1732 4800 2461cbdc6b7b7259ce26beddd0412885_JaffaCakes118.exe 83 PID 4800 wrote to memory of 1732 4800 2461cbdc6b7b7259ce26beddd0412885_JaffaCakes118.exe 83 PID 1732 wrote to memory of 1300 1732 svchost.exe 84 PID 1732 wrote to memory of 1300 1732 svchost.exe 84 PID 1732 wrote to memory of 1300 1732 svchost.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2461cbdc6b7b7259ce26beddd0412885_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2461cbdc6b7b7259ce26beddd0412885_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\uov83wzj.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3CEB.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC3CEA.tmp"3⤵PID:1800
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\clltaj.exeC:\Windows\system32\clltaj.exe 1036 "C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Executes dropped EXE
PID:1300
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53d19ec2d3f6d51f035afed9bc389a1ac
SHA129f7372c358afad24f71e91df9140263ba8c245f
SHA256d1fb6c8d8785e7ef92ae3eae3baadb5886f2808c628c4dd79adf2781c9f212f2
SHA512620f42bfebadaaf36d49fa279be8f21ccf5727d743d35f4451f3ebbc519cba1e7b13853e8e90a9d01c78a7f0ffb83a8ebbde1c8cc506416a0fd0b78a1c81bd8e
-
Filesize
10KB
MD51d7b679a9be0728270c523ff26075e09
SHA152d22b0ef85b0c61a34e4ce85981ac6a493f8d7a
SHA2564a9c9d69cca5ba75a6b5d3cb150e94b4de830e2a26a1c2185afdee93d652657d
SHA5128f95941413eb8876cea65a01522450efaeb8aa0865fb5dd23a6998891358ac764ab3493766a4e289099689ec9692ddaf2d63fc66fba3babe1a1c1dbe0748a945
-
Filesize
1KB
MD5caf7ad8a6755ca9190121f60fc7d1886
SHA1434e415c5db0560ac70a22546ce138a9190d0fbd
SHA2567bfaa18112edd91b95795d1a080c3b768b585d1ed559e60d0d7368cfd9513d89
SHA512d9b924cb49c2ebcaf58cfd0ecaa7c026076c22ddc75008b40bc0f62a9d76d464e20cae93028974f73ee1232e6ad6f9927882a20f42a728ec6d821d030002f1ae
-
Filesize
652B
MD5ab360762682cae7e6ae928fdd3cd196f
SHA10f892813c7d034275ce931255e69bf191d7fc882
SHA2561d1f9ab2b3951625fb3d99e47203af1e2404c8bf1280d75bc886fb2d5a72c592
SHA51295535ebf8dd17dd916183cf5b62575de373d896e3ba3f616e7dc168678f4f1d24b37c9dadc6bd1ed934bfc9036210011e7d14c8049a097d675a0b28cab963315
-
Filesize
8KB
MD5164dc3f006aea54e9f83a8d96e366164
SHA1a32fb4dd0b29075a0f94000b61ee441be21c879e
SHA25638ce0b573e1aa8eac080f26b57829a5bbc49104f98305932cc8bc1e3cc226d14
SHA512b6391ccf6e150039056e98c82e47a45f328c699a130412863c633d1506af50c9babe2a299383ce1c32a8abdb7fe61a9b3724a5afda61605e2844114ca0e47ee7
-
Filesize
187B
MD599fba10454703aa41740c4bb4e067aab
SHA198b70199c2025869145eb41b2f86e2e6415fdef1
SHA256d12f2ea8110e27ae6fd42b9bf02c4d7450a1cd94f7b75ae1c3308ac35bb8eccc
SHA5126992fadc1fe2c38e68399ec1dcc5b906f4ce5068bbdac1c245968d4453a5a557a58465f9974f3821bff632eb841c3db96bfacabc5205b744c15c39a4f96a5c82