Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 01:25
Static task
static1
Behavioral task
behavioral1
Sample
32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe
-
Size
34KB
-
MD5
32c5d755969a06e18e758d7c5a2727fa
-
SHA1
21249332e93c7c1ceef638c90ce281d78139818b
-
SHA256
89d0d21ef961666237d50fb7026618402401e1725576d62722208dfbea105e8a
-
SHA512
25dbb77e386163e75c197421639bcaf4aa5e40bbdc8e0ffc72d3351773ad98153561a3a0e45a103d705816c514ac2d102cf26393a5fc00062b6819f2a4d6ab54
-
SSDEEP
768:lziKS9wcQTBLy/fOjMlFTJue9XxkoS52HA:lziKaU8/6o3JxOk
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 548 32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adobe Optimizer = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\clocksytem.exe\"" 32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 548 set thread context of 3056 548 32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe 87 -
Program crash 1 IoCs
pid pid_target Process procid_target 4892 548 WerFault.exe 80 -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 548 32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe 548 32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe 3056 32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe 3056 32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe 3056 32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 548 wrote to memory of 3056 548 32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe 87 PID 548 wrote to memory of 3056 548 32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe 87 PID 548 wrote to memory of 3056 548 32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe 87 PID 548 wrote to memory of 3056 548 32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe 87 PID 548 wrote to memory of 3056 548 32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe 87 PID 548 wrote to memory of 3056 548 32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe 87 PID 548 wrote to memory of 3056 548 32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe 87 PID 548 wrote to memory of 3056 548 32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 548 -s 4202⤵
- Program crash
PID:4892
-
-
C:\Users\Admin\AppData\Local\Temp\32c5d755969a06e18e758d7c5a2727fa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\32c5d755969a06e18e758d7c5a2727fa_JaffaCakes1182⤵
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 548 -ip 5481⤵PID:3272
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
625KB
MD5eccf28d7e5ccec24119b88edd160f8f4
SHA198509587a3d37a20b56b50fd57f823a1691a034c
SHA256820c83c0533cfce2928e29edeaf6c255bc19ac9718b25a5656d99ffac30a03d6
SHA512c1c94bbb781625b2317f0a8178d3a10d891fb71bca8f82cd831c484e8ab125301b82a14fe2ff070dc99a496cc00234300fa5536401018c40d49d44ae89409670