Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 00:13
Static task
static1
Behavioral task
behavioral1
Sample
2e553d6d19fe7b18c54dccf130caf5dd_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2e553d6d19fe7b18c54dccf130caf5dd_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2e553d6d19fe7b18c54dccf130caf5dd_JaffaCakes118.exe
-
Size
37KB
-
MD5
2e553d6d19fe7b18c54dccf130caf5dd
-
SHA1
fef96d69409116d5193dbe8aa9be234b8273401b
-
SHA256
a48b369e5dd11734ed08c9e98e7501d24ed88993a4a4d4844457171e1c02a8de
-
SHA512
2bbb33ec0ae74a2fca8ba4f530bc7d1c0294ca0ebf0060664ad8480b2dfdaf5eeb4973f77bc6058d74c5d2cba51d12000edf27391b72d178761ee46698e10b2b
-
SSDEEP
768:edIZ/alwuAknNWuCMQpb0ruFm1YqTrmHwbLyMy5:edILlknNU4rOobbLyn5
Malware Config
Signatures
-
Unexpected DNS network traffic destination 5 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2220 set thread context of 4004 2220 2e553d6d19fe7b18c54dccf130caf5dd_JaffaCakes118.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4004 2e553d6d19fe7b18c54dccf130caf5dd_JaffaCakes118.exe 4004 2e553d6d19fe7b18c54dccf130caf5dd_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2220 wrote to memory of 4004 2220 2e553d6d19fe7b18c54dccf130caf5dd_JaffaCakes118.exe 85 PID 2220 wrote to memory of 4004 2220 2e553d6d19fe7b18c54dccf130caf5dd_JaffaCakes118.exe 85 PID 2220 wrote to memory of 4004 2220 2e553d6d19fe7b18c54dccf130caf5dd_JaffaCakes118.exe 85 PID 2220 wrote to memory of 4004 2220 2e553d6d19fe7b18c54dccf130caf5dd_JaffaCakes118.exe 85 PID 2220 wrote to memory of 4004 2220 2e553d6d19fe7b18c54dccf130caf5dd_JaffaCakes118.exe 85 PID 2220 wrote to memory of 4004 2220 2e553d6d19fe7b18c54dccf130caf5dd_JaffaCakes118.exe 85 PID 2220 wrote to memory of 4004 2220 2e553d6d19fe7b18c54dccf130caf5dd_JaffaCakes118.exe 85 PID 2220 wrote to memory of 4004 2220 2e553d6d19fe7b18c54dccf130caf5dd_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e553d6d19fe7b18c54dccf130caf5dd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2e553d6d19fe7b18c54dccf130caf5dd_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\2e553d6d19fe7b18c54dccf130caf5dd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2e553d6d19fe7b18c54dccf130caf5dd_JaffaCakes118.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4004
-