Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 03:10
Static task
static1
Behavioral task
behavioral1
Sample
3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe
-
Size
408KB
-
MD5
3ff524b4338d2f401259a7fccdfc1b17
-
SHA1
6afe63c39d798d6bc634347f281aec529087e66d
-
SHA256
2b88ce07a2a0e92dba8c045da70f81753d121104443549f82a16844b286f2deb
-
SHA512
d2937dad49e1e0b8cb23a02d90a2ff670a67fda7f095f774fe170615616b712d35dd13325ade3ec31ecd9c1e7643fb4759b1db0b0ae3f89726fe2378362e6890
-
SSDEEP
6144:C7mU1aYIXB/X09QDZgK58JULqTODz8NKYQeKhwjMj22DC9OqyzcUjsyUf3mnn:C7msQRX0U58CLUAYDiwjmOyotyU+nn
Malware Config
Signatures
-
Checks for any installed AV software in registry 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Eset\Nod\CurrentVersion\Info 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2380 wrote to memory of 3856 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 89 PID 2380 wrote to memory of 3856 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 89 PID 2380 wrote to memory of 3856 2380 3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3ff524b4338d2f401259a7fccdfc1b17_JaffaCakes118.exe"1⤵
- Checks for any installed AV software in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\rmeslf.bat2⤵PID:3856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232B
MD5bf9c1e46ea65f8c2bfa0f675e577ce1e
SHA1f8b97bfa7e2bc38c0c7a4df13b7d68ec40b5c0d2
SHA256312c594125b31d684ddf793e86e8999f4d70a8df7e13abb05eafee01cc1a026a
SHA5121858b57ea5a190816707e456df4c89bf28580aadf0b7c53062866b676ba34e8d62b249a6f2140b09bdbe365259ecd08166018b15a1fbe6313dbd8a40219b9fde