Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 19:31
Behavioral task
behavioral1
Sample
2d8f429c96d92430c8c66679936bbc1f_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2d8f429c96d92430c8c66679936bbc1f_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2d8f429c96d92430c8c66679936bbc1f_JaffaCakes118.exe
-
Size
501KB
-
MD5
2d8f429c96d92430c8c66679936bbc1f
-
SHA1
a753880cfe0cb7051a0b9cf07531d04c13f7d032
-
SHA256
58bb782e0b4222b68641abad8f779125d73fc7d411b837d5a011a7feafd08141
-
SHA512
fcf28248d78a68a03dd707d7b88dfe7e020916726c9d6bb24c4dc0d932e6cdbca3dd90bff0984b46ce63ac4f367b80f1ff707b3065fa2deb57b1ca29ba04524f
-
SSDEEP
6144:y8lLSeKLxjiZjdhTv2tIyzJM/FAvzBF/nM+BNlocz4xWadXmRd7gJQa3:ymFT1yNM/Wvz/Z4WaSdUJP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2956 Vpevoa.exe -
resource yara_rule behavioral2/memory/2780-0-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral2/files/0x0007000000023452-11.dat upx behavioral2/memory/2956-14-0x0000000000400000-0x000000000047F000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Vpevoa.exe 2d8f429c96d92430c8c66679936bbc1f_JaffaCakes118.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Vpevoa.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Vpevoa.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 2d8f429c96d92430c8c66679936bbc1f_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 2d8f429c96d92430c8c66679936bbc1f_JaffaCakes118.exe File created C:\Windows\Vpevoa.exe 2d8f429c96d92430c8c66679936bbc1f_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 38444 2956 WerFault.exe 85 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-771719357-2485960699-3367710044-1000\Software\Microsoft\Internet Explorer\Main Vpevoa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe 2956 Vpevoa.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2956 2780 2d8f429c96d92430c8c66679936bbc1f_JaffaCakes118.exe 85 PID 2780 wrote to memory of 2956 2780 2d8f429c96d92430c8c66679936bbc1f_JaffaCakes118.exe 85 PID 2780 wrote to memory of 2956 2780 2d8f429c96d92430c8c66679936bbc1f_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d8f429c96d92430c8c66679936bbc1f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2d8f429c96d92430c8c66679936bbc1f_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\Vpevoa.exeC:\Windows\Vpevoa.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:2956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2956 -s 7283⤵
- Program crash
PID:38444
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2956 -ip 29561⤵PID:38476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
390B
MD5bc2a413e16be84082ba021608498bbda
SHA140de84af83e279fd07605764e57d96ec07dd96e3
SHA256db289cbca15ff49ddf9a1a61cd3c7b843cd7af7264396ea7f5bee5925cd0e5f3
SHA512fd93d9643db7a466bd1a9bf17663f04b84e7c89f39413c9c5abe7046e09cef49a3e4953478102a4e1a76fa939ae22a8503d5ac61cc9becd3dc4d11b01379d0d4
-
Filesize
501KB
MD52d8f429c96d92430c8c66679936bbc1f
SHA1a753880cfe0cb7051a0b9cf07531d04c13f7d032
SHA25658bb782e0b4222b68641abad8f779125d73fc7d411b837d5a011a7feafd08141
SHA512fcf28248d78a68a03dd707d7b88dfe7e020916726c9d6bb24c4dc0d932e6cdbca3dd90bff0984b46ce63ac4f367b80f1ff707b3065fa2deb57b1ca29ba04524f