Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2024, 22:57
Static task
static1
Behavioral task
behavioral1
Sample
4724143e7b758926f4dfcb151eb7a29b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4724143e7b758926f4dfcb151eb7a29b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4724143e7b758926f4dfcb151eb7a29b_JaffaCakes118.exe
-
Size
125KB
-
MD5
4724143e7b758926f4dfcb151eb7a29b
-
SHA1
793960b51e8edb184ce2c62c76adeb87a933e910
-
SHA256
1bc82badd73d98a0096c156a32da464080c5c2f547d59283e935fe32a69806a4
-
SHA512
c0fb9b77a217c1708412a7c72d1a9183f6425a03895f3a34ff9e53521cc87e0900f4e6d927bdccfe4cb4595c2391b86c8e1ffd9b2aefe6dfd7497b96fc02fed6
-
SSDEEP
3072:EJgwBIxhn+dz7diTqkGqcZBUPs7dHNnu3lAzyDJkluJfBd8f:EuwWx8fScnUPey1BtB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1448 Hcycua.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 4724143e7b758926f4dfcb151eb7a29b_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 4724143e7b758926f4dfcb151eb7a29b_JaffaCakes118.exe File created C:\Windows\Hcycua.exe 4724143e7b758926f4dfcb151eb7a29b_JaffaCakes118.exe File opened for modification C:\Windows\Hcycua.exe 4724143e7b758926f4dfcb151eb7a29b_JaffaCakes118.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Hcycua.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Hcycua.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Software\Microsoft\Internet Explorer\Main Hcycua.exe Key created \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\Software\Microsoft\Internet Explorer\International Hcycua.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe 1448 Hcycua.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4996 wrote to memory of 1448 4996 4724143e7b758926f4dfcb151eb7a29b_JaffaCakes118.exe 86 PID 4996 wrote to memory of 1448 4996 4724143e7b758926f4dfcb151eb7a29b_JaffaCakes118.exe 86 PID 4996 wrote to memory of 1448 4996 4724143e7b758926f4dfcb151eb7a29b_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\4724143e7b758926f4dfcb151eb7a29b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4724143e7b758926f4dfcb151eb7a29b_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\Hcycua.exeC:\Windows\Hcycua.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
PID:1448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
125KB
MD54724143e7b758926f4dfcb151eb7a29b
SHA1793960b51e8edb184ce2c62c76adeb87a933e910
SHA2561bc82badd73d98a0096c156a32da464080c5c2f547d59283e935fe32a69806a4
SHA512c0fb9b77a217c1708412a7c72d1a9183f6425a03895f3a34ff9e53521cc87e0900f4e6d927bdccfe4cb4595c2391b86c8e1ffd9b2aefe6dfd7497b96fc02fed6
-
Filesize
390B
MD5d830f35b2e602d5341b4117ebb0266da
SHA1a12b16a5f4065c5e40e35ff10097642902641950
SHA25644ba0217ec47e4faaa6fbba7f3033df4b245db36078ab00021385ecabdc24809
SHA5128fb994338d688f08aeb03d28bd374e5c0d0ca38bcab156f43c4f1ad14412e8ae6a7f7a020ddfda5e429ee4dcd6fce1dd3beb0212a0c09d64fe56ec5d73e7a30a