Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 09:46
Static task
static1
Behavioral task
behavioral1
Sample
4129fd88eb45ee0d870c96220f32d357_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4129fd88eb45ee0d870c96220f32d357_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4129fd88eb45ee0d870c96220f32d357_JaffaCakes118.exe
-
Size
253KB
-
MD5
4129fd88eb45ee0d870c96220f32d357
-
SHA1
575a6b036ac03ecf0934a64d79a57665f9cf184b
-
SHA256
8e414e83ad6b3f99bef714a2a023fd244a812bc990bc79d702534442c35050c2
-
SHA512
3f1c4c3d6c5f814b50f8ebb1f99d6c8b21fe660ad15ff7c00e8d520624b5bc05dd3a8896436e32ae013a1a0da4f6d98d4ec09277c9f182370e2c6ee46b599820
-
SSDEEP
6144:g/0uopAiF7tWm9d9qdH1lexDodpCGR4srdgUScDH:gJpQzqhexDod7R4XU
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2684 1.exe 4612 1.exe 1508 setup.exe -
resource yara_rule behavioral2/files/0x00070000000234d3-13.dat upx behavioral2/memory/1508-16-0x0000000000400000-0x0000000001118000-memory.dmp upx behavioral2/memory/1508-18-0x0000000000400000-0x0000000001118000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4129fd88eb45ee0d870c96220f32d357_JaffaCakes118.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2684 set thread context of 4612 2684 1.exe 88 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4612 1.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1072 wrote to memory of 2684 1072 4129fd88eb45ee0d870c96220f32d357_JaffaCakes118.exe 83 PID 1072 wrote to memory of 2684 1072 4129fd88eb45ee0d870c96220f32d357_JaffaCakes118.exe 83 PID 1072 wrote to memory of 2684 1072 4129fd88eb45ee0d870c96220f32d357_JaffaCakes118.exe 83 PID 2684 wrote to memory of 4612 2684 1.exe 88 PID 2684 wrote to memory of 4612 2684 1.exe 88 PID 2684 wrote to memory of 4612 2684 1.exe 88 PID 2684 wrote to memory of 4612 2684 1.exe 88 PID 2684 wrote to memory of 4612 2684 1.exe 88 PID 2684 wrote to memory of 4612 2684 1.exe 88 PID 2684 wrote to memory of 4612 2684 1.exe 88 PID 2684 wrote to memory of 4612 2684 1.exe 88 PID 1072 wrote to memory of 1508 1072 4129fd88eb45ee0d870c96220f32d357_JaffaCakes118.exe 89 PID 1072 wrote to memory of 1508 1072 4129fd88eb45ee0d870c96220f32d357_JaffaCakes118.exe 89 PID 1072 wrote to memory of 1508 1072 4129fd88eb45ee0d870c96220f32d357_JaffaCakes118.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\4129fd88eb45ee0d870c96220f32d357_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4129fd88eb45ee0d870c96220f32d357_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4612
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\setup.exe2⤵
- Executes dropped EXE
PID:1508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5f352c911c2ccb5a0ffc2be2fe5057633
SHA13b3db1e22eba45ba3c71c5771a991a61fa415291
SHA2563a5b8c5faf22d955f5ef36508dc8bc578a4b056ac3bb296feed2fe9cecc5e33f
SHA512d6b1426cedee674b28eb087e46a22996879865a8f88d54ac4e1b9f71948e7481ed6144cbe4fb7856954e8d767f240f4a7bbe76ffee92dcaca998b6129f1df0fb
-
Filesize
134KB
MD5d581068e84510083ddea45e821ebde36
SHA1beebba90686dafbd91dbb17ab37a9442ea9c5521
SHA256fa04f7f08277b74677628a224a096d4b9fe4cafb7eff9f9d92e2ad776085959d
SHA512aac289c9d7733da47fcd7c25062963a4ce8531fd011479c950c5ee5bada7dba6221cb30a0950ce8f3ee2cc9bbac8ecfedbf9947c18a889589e39473d9b6e98fa