Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 17:18
Static task
static1
Behavioral task
behavioral1
Sample
429f15cc348a4fde9efe7674918ad905_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
429f15cc348a4fde9efe7674918ad905_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
429f15cc348a4fde9efe7674918ad905_JaffaCakes118.exe
-
Size
23KB
-
MD5
429f15cc348a4fde9efe7674918ad905
-
SHA1
a055bb652059fb58b8193033c4ad228ddd628a5d
-
SHA256
8c15547bfca61fdb10749f239d8f4c9956054983bbf85ef83ff9750227441ba5
-
SHA512
e8be894e23031196607af725f338dac195e44c3c4ed38afe768c69b35c124b2d8f04a0cd784752e2ab375fdb8ab7e794f026b88f8703ce056a7940f5bc068998
-
SSDEEP
384:uZiZ7ntrXGOuy6bkNIgeAo1Go0NQECpPQVFvA4FfqCQOsAWI4zuXJ6m1XVlt1:AYrXxi3x1Go+z0QzrJRQRAWIquXI4H
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4164 PING.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3004 429f15cc348a4fde9efe7674918ad905_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3004 wrote to memory of 844 3004 429f15cc348a4fde9efe7674918ad905_JaffaCakes118.exe 90 PID 3004 wrote to memory of 844 3004 429f15cc348a4fde9efe7674918ad905_JaffaCakes118.exe 90 PID 3004 wrote to memory of 844 3004 429f15cc348a4fde9efe7674918ad905_JaffaCakes118.exe 90 PID 844 wrote to memory of 4164 844 cmd.exe 92 PID 844 wrote to memory of 4164 844 cmd.exe 92 PID 844 wrote to memory of 4164 844 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\429f15cc348a4fde9efe7674918ad905_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\429f15cc348a4fde9efe7674918ad905_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\cmd.execmd.exe /c echo ping 127.1 -n 3 >nul 2>nul >c:\2.bat&echo del "C:\Users\Admin\AppData\Local\Temp\429f15cc348a4fde9efe7674918ad905_JaffaCakes118.exe">>c:\2.bat&echo del c:\2.bat>>c:\2.bat&c:\2.bat2⤵
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\PING.EXEping 127.1 -n 33⤵
- Runs ping.exe
PID:4164
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124B
MD5e5a7ffe249a66b1af2d80fdc25856377
SHA1ea23e2d7c3d84394ec35e5b34a425925dbe732fb
SHA25606c562b3e423398118c55dfeb7d23ed0b31d5d97ec04592830b7a1161752f972
SHA5128cbd95fa5d00f27d38af333664aaa3d9ac26438b0a52178a9994eaa7e1ce7a71781339cc55c9a0ce3ffd20e4e4a29a338f4b902aa76e4166540ef7e2188086c7