Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/07/2024, 19:17

General

  • Target

    2d847cf3fcf801b293a5a60039ed453a_JaffaCakes118.exe

  • Size

    1.4MB

  • MD5

    2d847cf3fcf801b293a5a60039ed453a

  • SHA1

    4f59f5c7cdc95a7eb3b0f046ac5736bf5f73efbd

  • SHA256

    98aeab60865273ddcbbb2530be20d49cc5fd223dd2e5826b32f0028d48d7dae3

  • SHA512

    835dab9d546c5bf2476c1815115f4ec157c41292c9ba840bb317f16db2a77dc28d9dd87f15f9be9b54f0d476c22c1c7ad17edd1b49f685661ba7fe97b4411d69

  • SSDEEP

    24576:qk+++hBIRgRZnk4Y1KWmQo7JsL4YSjR3Rk1tWmIJTFTl0RXpzrq+AbDeukcNmca4:Yhz99u4YI3S12JBl0XzVxc8c3H

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d847cf3fcf801b293a5a60039ed453a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2d847cf3fcf801b293a5a60039ed453a_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4448
    • C:\Windows\SysWOW64\notepad.exe
      C:\Windows\system32\notepad.exe
      2⤵
      • Adds Run key to start application
      PID:1856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \??\c:\ProgramData\CafiarR\HygfvmE\DrsxgjP.exe

    Filesize

    1.4MB

    MD5

    2d847cf3fcf801b293a5a60039ed453a

    SHA1

    4f59f5c7cdc95a7eb3b0f046ac5736bf5f73efbd

    SHA256

    98aeab60865273ddcbbb2530be20d49cc5fd223dd2e5826b32f0028d48d7dae3

    SHA512

    835dab9d546c5bf2476c1815115f4ec157c41292c9ba840bb317f16db2a77dc28d9dd87f15f9be9b54f0d476c22c1c7ad17edd1b49f685661ba7fe97b4411d69

  • memory/1856-3-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/1856-4-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/1856-6-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/1856-2-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/1856-7-0x0000000002EF0000-0x0000000002EF1000-memory.dmp

    Filesize

    4KB

  • memory/1856-9-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/4448-0-0x0000000002110000-0x0000000002111000-memory.dmp

    Filesize

    4KB

  • memory/4448-5-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB