Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/07/2024, 23:38

General

  • Target

    36dc4d3194a1fddad7f6ea99c0290fe0_JaffaCakes118.exe

  • Size

    39KB

  • MD5

    36dc4d3194a1fddad7f6ea99c0290fe0

  • SHA1

    65435ff19e33b5c0e41330761afd2702759a7948

  • SHA256

    1d844ea602bb548a4f79f553b4aef38f8809c96ed758287dc352769fcaec3f76

  • SHA512

    0a1b60167064791757f2d594cd1bbef0dde966be4999ebfec1c79cf18a66f2584501304fabbb431a354dd47292f67b463d56b1a54c775db82084863d33465c06

  • SSDEEP

    768:h2oI+E2mTvK0QVFHAQKn4QscxHATWxb8sHZLyMDDHkc:/Ip2mTva03scNHxb8s5L/DDHkc

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36dc4d3194a1fddad7f6ea99c0290fe0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\36dc4d3194a1fddad7f6ea99c0290fe0_JaffaCakes118.exe"
    1⤵
      PID:1908
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x3fc 0x304
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1028

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1908-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1908-1-0x00000000001C0000-0x0000000000200000-memory.dmp

      Filesize

      256KB

    • memory/1908-2-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1908-3-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1908-4-0x00000000001C0000-0x0000000000200000-memory.dmp

      Filesize

      256KB

    • memory/1908-5-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1908-6-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1908-7-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1908-8-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1908-9-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1908-10-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1908-11-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1908-12-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1908-13-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1908-14-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1908-15-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1908-16-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB