Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 09:36
Behavioral task
behavioral1
Sample
3cd86189efbd280c1cef2e6b7bd1b4ea_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3cd86189efbd280c1cef2e6b7bd1b4ea_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3cd86189efbd280c1cef2e6b7bd1b4ea_JaffaCakes118.exe
-
Size
6.0MB
-
MD5
3cd86189efbd280c1cef2e6b7bd1b4ea
-
SHA1
7fced15cf82909bd4c7dbc7298af4ac6f8790fd7
-
SHA256
31db18a579aacce5af0fa3f9a539e08a58843d82b54ebc9416841f544689d817
-
SHA512
c7f44eb16dbd69103f5ed306e54b04d77b082c3f8c8c72a0c164da3af82bd58cd23dbe4df10c4ac495413f97e3602a8a6607a92eb6c3c9c673a4c34bdb12d294
-
SSDEEP
98304:QlktN4zX0Y4lqW7oQI4JQyrnIuSMWVgkNaB0fF13Nkrle7r1oUhFEzhkimHRDzz+:okgXF4p7ot4Dk5gkNaWF2Yr1oxazK
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5016-11-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-9-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-13-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-14-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-15-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-16-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-17-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-18-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-19-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-20-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-21-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-22-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-23-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-24-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-25-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-26-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-27-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-28-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-29-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-30-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-31-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-32-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-33-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-34-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-35-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-36-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-37-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-38-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-39-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-40-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-41-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-42-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-43-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-45-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-44-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-46-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-47-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-48-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-49-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-52-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-53-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-54-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-55-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-56-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-57-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-58-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-59-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-60-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-61-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-62-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-63-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-64-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-65-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect behavioral2/memory/5016-74-0x00000000000F0000-0x0000000000AE9000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 5016 3cd86189efbd280c1cef2e6b7bd1b4ea_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5016 3cd86189efbd280c1cef2e6b7bd1b4ea_JaffaCakes118.exe 5016 3cd86189efbd280c1cef2e6b7bd1b4ea_JaffaCakes118.exe 5016 3cd86189efbd280c1cef2e6b7bd1b4ea_JaffaCakes118.exe 5016 3cd86189efbd280c1cef2e6b7bd1b4ea_JaffaCakes118.exe