Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 02:16
Static task
static1
Behavioral task
behavioral1
Sample
37532cf8af70102de592c292b2a6bd76_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
37532cf8af70102de592c292b2a6bd76_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
37532cf8af70102de592c292b2a6bd76_JaffaCakes118.exe
-
Size
4.0MB
-
MD5
37532cf8af70102de592c292b2a6bd76
-
SHA1
5ba072eeba22c0329c1c166462588a38549d6fe2
-
SHA256
7e026e49049e2d8e1847c91d762d7cfc5370a5b7b1d36e7a9fc46ae6d92107f3
-
SHA512
ff6ee7e2928cfd51e4a1fc5a4954ce5bf60fbb75195f884dee632624930c6f145fa7bdf1e57a522d6a7748e3f32f900854e057e21a2f5d911942930dc2f96e43
-
SSDEEP
98304:0+v5gqy7XODWOWTP6maZ+ghrcTJuwH2Fw0alYE0y0l1S+Mju4DS6H4Lj:Hvaq2zkCue2FwH+RvS+Mju76mj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 668 tuto.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Windows\\System32\\svchosts.exe" 37532cf8af70102de592c292b2a6bd76_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\avg = "C:\\Arquivos de programas\\avg.exe" 37532cf8af70102de592c292b2a6bd76_JaffaCakes118.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\PLUG.SYS 37532cf8af70102de592c292b2a6bd76_JaffaCakes118.exe File created C:\Windows\SysWOW64\svchosts.exe 37532cf8af70102de592c292b2a6bd76_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4424 37532cf8af70102de592c292b2a6bd76_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4424 wrote to memory of 4856 4424 37532cf8af70102de592c292b2a6bd76_JaffaCakes118.exe 87 PID 4424 wrote to memory of 4856 4424 37532cf8af70102de592c292b2a6bd76_JaffaCakes118.exe 87 PID 4424 wrote to memory of 4856 4424 37532cf8af70102de592c292b2a6bd76_JaffaCakes118.exe 87 PID 4856 wrote to memory of 668 4856 cmd.exe 89 PID 4856 wrote to memory of 668 4856 cmd.exe 89 PID 4856 wrote to memory of 668 4856 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\37532cf8af70102de592c292b2a6bd76_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\37532cf8af70102de592c292b2a6bd76_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\cmd.execmd /k C:\tuto.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\tuto.exeC:\tuto.exe3⤵
- Executes dropped EXE
PID:668
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5251b9e5ea854eca172eb5a1ea480c718
SHA1f2d3a641f762ebafce3fe60ba1bf764cd2a6bbec
SHA2564ea747bcd91bc5fc5025b7eb4d4cbba6672a00361285550cb4ca55ad57c95337
SHA512a850de833b3744d31ded0e72549b16614cea9f66a2c989505914de4600c4ffcde842a658d629e0980586cb2c424c3c946e148051a6c82f6ae987da8202d0f8bd