Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 20:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3aaf0ba1fcebbd1aa550dad8628aa8cf_JaffaCakes118.exe
Resource
win7-20240708-en
5 signatures
150 seconds
General
-
Target
3aaf0ba1fcebbd1aa550dad8628aa8cf_JaffaCakes118.exe
-
Size
238KB
-
MD5
3aaf0ba1fcebbd1aa550dad8628aa8cf
-
SHA1
d7f892515c1dfa2b70bf902296dc9cfdc9211c73
-
SHA256
070dc93f21c71c398de666052a7db82b262c4942e6dfab0edb7d2c030fa7959b
-
SHA512
6a89285923460edd988fae4717257b751c4be6dad9a1c4fd546319e65845344be16feb847af1b4c4774a63d327574be2c1e216296f4bacfdd2a8ff91ad52480e
-
SSDEEP
3072:rbmGauThheVj5RVodsPXZI2uOoiFNimveVB46lbrqWj1JovB6O10nUp0yVF2TcVo:3LaAIApGjlGB48qokIcm0v2i0
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\win32.txt 3aaf0ba1fcebbd1aa550dad8628aa8cf_JaffaCakes118.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1084 1072 WerFault.exe 82 2848 1072 WerFault.exe 82 -
Runs net.exe
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1072 wrote to memory of 3740 1072 3aaf0ba1fcebbd1aa550dad8628aa8cf_JaffaCakes118.exe 83 PID 1072 wrote to memory of 3740 1072 3aaf0ba1fcebbd1aa550dad8628aa8cf_JaffaCakes118.exe 83 PID 1072 wrote to memory of 3740 1072 3aaf0ba1fcebbd1aa550dad8628aa8cf_JaffaCakes118.exe 83 PID 3740 wrote to memory of 3644 3740 net.exe 85 PID 3740 wrote to memory of 3644 3740 net.exe 85 PID 3740 wrote to memory of 3644 3740 net.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\3aaf0ba1fcebbd1aa550dad8628aa8cf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3aaf0ba1fcebbd1aa550dad8628aa8cf_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess2⤵
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess3⤵PID:3644
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 9962⤵
- Program crash
PID:1084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 9962⤵
- Program crash
PID:2848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 192 -p 1072 -ip 10721⤵PID:4032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1072 -ip 10721⤵PID:1284