Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 08:54
Static task
static1
Behavioral task
behavioral1
Sample
387826e941f845b20554f14b91218175_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
387826e941f845b20554f14b91218175_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
387826e941f845b20554f14b91218175_JaffaCakes118.exe
-
Size
619KB
-
MD5
387826e941f845b20554f14b91218175
-
SHA1
d3accb61746b512fb56406569ed1b606cd204d27
-
SHA256
34c13af7595d40d59dbd826c70d74de7a851dbe059db9313cc2dd84e0649f41c
-
SHA512
8637af12e7a756d041ae47a1c7419a91552eaec837843c02f5b894458125eb0f370d5757df694520c1b81054af0aefa5640204d534deef3f53332d45e36d8756
-
SSDEEP
12288:9ufIQziUgIg4oCHT5B7PotSOx164gNIHNbZs8Lp97rWsVFqG5aDIB/nQ:uGUdg4bHVBbotSOjaIHhZJLp97rWsV1a
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3440 EXEF760.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3440 EXEF760.tmp 3440 EXEF760.tmp -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4940 wrote to memory of 3440 4940 387826e941f845b20554f14b91218175_JaffaCakes118.exe 85 PID 4940 wrote to memory of 3440 4940 387826e941f845b20554f14b91218175_JaffaCakes118.exe 85 PID 4940 wrote to memory of 3440 4940 387826e941f845b20554f14b91218175_JaffaCakes118.exe 85 PID 3440 wrote to memory of 2456 3440 EXEF760.tmp 87 PID 3440 wrote to memory of 2456 3440 EXEF760.tmp 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\387826e941f845b20554f14b91218175_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\387826e941f845b20554f14b91218175_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\EXEF760.tmp"C:\Users\Admin\AppData\Local\Temp\EXEF760.tmp" "C:\Users\Admin\AppData\Local\Temp\OFMF761.tmp" "C:\Users\Admin\AppData\Local\Temp\387826e941f845b20554f14b91218175_JaffaCakes118.exe" http://www.eomniform.com/OF5/nsplugins/OFMailX.cab http://www.eomniform.com/OF5/nsplugins/OFMailNP.jar http://www.eomniform.com/OF5/nsplugins/OFMailNP.xpi2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2456
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:3336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD52d2fd71efa30293b805806d7e8999f8f
SHA13ca3d43dbb456a33874c6f7707b6d55e32c2d911
SHA256edc16a9ae5e1fe484d301ed4680eefb85677e85712793fd69338c35f15febb99
SHA512639e50317f4da0f793d9f7d4bff3ee1afb8e9f929727ad47816a104b052a81047253631b078b85f0b6e056bdd37e4b67e2e468a760ab05b9b1eb4bf1efa31a01
-
Filesize
240KB
MD5cc2c743580ae9de7fd286a68c9bc6466
SHA1ed9a1e876267db8a61ee0133c8c90ac7f1327113
SHA25650033242a808035ad629c3b1a19d70683ffc8c1ae47c972a13be62a3468e1a91
SHA512f1b76fc8a5a9cb82a413d7a6a0fe3fae03a575ace1afa674c7304063f54f4a14ff4cd04daf15400e3f4e602abebe1bb4b247cd12b8cce986233253d3539da7b7