Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 03:47
Static task
static1
Behavioral task
behavioral1
Sample
2ee4a8b76f3f0bbbd1c96a6137bf1389_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2ee4a8b76f3f0bbbd1c96a6137bf1389_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2ee4a8b76f3f0bbbd1c96a6137bf1389_JaffaCakes118.exe
-
Size
277KB
-
MD5
2ee4a8b76f3f0bbbd1c96a6137bf1389
-
SHA1
4f5ae9261f2367f6c4d9d33e130fdfc3c4037480
-
SHA256
35fc81fc8a8bce9877d13c71ee495f3d55bf2ec3ed9db53cf0e6026d27a92f93
-
SHA512
d4fa12ab46fce9a5a3d41c46a4f498e009fd177b6e60f2100207f4f8f0d9d33a698e74e67f21e07b98d23167af4564812f9ffe975d790dcda4a88c0498ce728f
-
SSDEEP
6144:iFp+YQggheXTcqxv476l91LHyAO6jtk+9nbMjzWleHjxPGBf:iFpHQg4eXT3676lvLHzO6jtk2nbMuleD
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 868 wrote to memory of 2372 868 2ee4a8b76f3f0bbbd1c96a6137bf1389_JaffaCakes118.exe 87 PID 868 wrote to memory of 2372 868 2ee4a8b76f3f0bbbd1c96a6137bf1389_JaffaCakes118.exe 87 PID 868 wrote to memory of 2372 868 2ee4a8b76f3f0bbbd1c96a6137bf1389_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ee4a8b76f3f0bbbd1c96a6137bf1389_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ee4a8b76f3f0bbbd1c96a6137bf1389_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\.bat2⤵PID:2372
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
356B
MD5c51dfabf25bb481abb4128a6412dfdbd
SHA1d2dc404aee692111468efeb976520303bb87a224
SHA2569d987f72105109b875c6b01268b932de28e9b7ae1a0657d4fb9ce2dc698bc6bc
SHA51246b0a9d3ab51f5d0843a9920f2bd70b984bf48bbd1d8a8d1013a446cd9464595ead6682aebbbebbb1d5d1bac36323016cf3ada6828e60ce4c9ed58b1246570b0