Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 17:29
Static task
static1
Behavioral task
behavioral1
Sample
35b13c91b3fd4240715ca17a1704f7c6_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
35b13c91b3fd4240715ca17a1704f7c6_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
35b13c91b3fd4240715ca17a1704f7c6_JaffaCakes118.exe
-
Size
131KB
-
MD5
35b13c91b3fd4240715ca17a1704f7c6
-
SHA1
936b20aa0f5acda2fef3d523060ee8b63a737336
-
SHA256
933313715594f05fb1ab3ff7631ec284ee797ae2f7e2fa17100bfdffd0095dff
-
SHA512
76b9f846da5097499302c82956e2a29fcf1f4d453b5bff12cddcf56600ce54490218ba9a43d7861c253680c138fb5c7201af5bc90945b53b593471bcda26b57c
-
SSDEEP
3072:iNEeUBe0fMZNydHLTGvtHYkdrp3DyZBKsb/:iNEeUBe8qNIGJVsBK6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 736 Ahuqua.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 35b13c91b3fd4240715ca17a1704f7c6_JaffaCakes118.exe File created C:\Windows\Ahuqua.exe 35b13c91b3fd4240715ca17a1704f7c6_JaffaCakes118.exe File opened for modification C:\Windows\Ahuqua.exe 35b13c91b3fd4240715ca17a1704f7c6_JaffaCakes118.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Ahuqua.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Ahuqua.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 35b13c91b3fd4240715ca17a1704f7c6_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Software\Microsoft\Internet Explorer\Main Ahuqua.exe Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Software\Microsoft\Internet Explorer\International Ahuqua.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe 736 Ahuqua.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 552 wrote to memory of 736 552 35b13c91b3fd4240715ca17a1704f7c6_JaffaCakes118.exe 86 PID 552 wrote to memory of 736 552 35b13c91b3fd4240715ca17a1704f7c6_JaffaCakes118.exe 86 PID 552 wrote to memory of 736 552 35b13c91b3fd4240715ca17a1704f7c6_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\35b13c91b3fd4240715ca17a1704f7c6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\35b13c91b3fd4240715ca17a1704f7c6_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\Ahuqua.exeC:\Windows\Ahuqua.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5309fc7d3bc53bb63ac42e359260ac740
SHA12064f80f811db79a33c4e51c10221454e30c74ae
SHA256ac11339ffa8f270c4f781e0a3922bb1c80d9dee6e4b6911ca34538ed9ae03caa
SHA51277dd27d30f4e13a0bcd6fd27ae7567c136d87393e5ee632bccf05b0a0d2bbcc2fc0fd777a8508e26cc4fc579c8da0ab56b7bf179b1adc70f28f7d0eee89fa5f8
-
Filesize
131KB
MD535b13c91b3fd4240715ca17a1704f7c6
SHA1936b20aa0f5acda2fef3d523060ee8b63a737336
SHA256933313715594f05fb1ab3ff7631ec284ee797ae2f7e2fa17100bfdffd0095dff
SHA51276b9f846da5097499302c82956e2a29fcf1f4d453b5bff12cddcf56600ce54490218ba9a43d7861c253680c138fb5c7201af5bc90945b53b593471bcda26b57c
-
Filesize
390B
MD579cfdac51cd19928aaa73452ca9020c6
SHA155f75a32fd1ba141c3c277f2086c7a10bf979736
SHA2562026bfffb33b3a9abb9af0c0b382f0c3055973c546caf11d5792d7ed44106ef0
SHA5122f05a1271fc3df9a7159c23afb855b2d5e331a21be2751dbb05d8de5cf90e60ba48a3298d72163a5945e11757d16803e54817f422e5037d75012fcb3666d6106