Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
92s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2024, 17:13
Static task
static1
Behavioral task
behavioral1
Sample
46c2a8e01bae82c90b64e3fd39ef847b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
46c2a8e01bae82c90b64e3fd39ef847b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
46c2a8e01bae82c90b64e3fd39ef847b_JaffaCakes118.exe
-
Size
9.0MB
-
MD5
46c2a8e01bae82c90b64e3fd39ef847b
-
SHA1
989f6d8694b82c2eccc3a4fc191fbcabf9897534
-
SHA256
79f3abde37cb28349d86bb33a4987d223c5258074037d6841abd16316c73d052
-
SHA512
ffcec59af754c7cd03eb190330104b01190a5247aa0bc8a16352a24b572e35a20f245c50687f32f02418c17acb936d2a8f140107829c2727a9aac5b379afdafa
-
SSDEEP
98304:PGHjLN2jLN3sjLu6LN3szLNY6LNdLN3s36LNdLR6LNLLN3s36LNT:oL0LqLbLILfLDLlLDLkL1LlLR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4916 sevmrzu.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4044 set thread context of 4916 4044 46c2a8e01bae82c90b64e3fd39ef847b_JaffaCakes118.exe 85 -
Program crash 1 IoCs
pid pid_target Process procid_target 1276 4916 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4044 46c2a8e01bae82c90b64e3fd39ef847b_JaffaCakes118.exe 4044 46c2a8e01bae82c90b64e3fd39ef847b_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4044 wrote to memory of 4916 4044 46c2a8e01bae82c90b64e3fd39ef847b_JaffaCakes118.exe 85 PID 4044 wrote to memory of 4916 4044 46c2a8e01bae82c90b64e3fd39ef847b_JaffaCakes118.exe 85 PID 4044 wrote to memory of 4916 4044 46c2a8e01bae82c90b64e3fd39ef847b_JaffaCakes118.exe 85 PID 4044 wrote to memory of 4916 4044 46c2a8e01bae82c90b64e3fd39ef847b_JaffaCakes118.exe 85 PID 4044 wrote to memory of 4916 4044 46c2a8e01bae82c90b64e3fd39ef847b_JaffaCakes118.exe 85 PID 4044 wrote to memory of 4916 4044 46c2a8e01bae82c90b64e3fd39ef847b_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\46c2a8e01bae82c90b64e3fd39ef847b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\46c2a8e01bae82c90b64e3fd39ef847b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\sevmrzu.exeC:\Users\Admin\AppData\Local\Temp\sevmrzu.exe2⤵
- Executes dropped EXE
PID:4916 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 243⤵
- Program crash
PID:1276
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4916 -ip 49161⤵PID:3352
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.1MB
MD503aa243227d3f0853bb7063d3dadcca1
SHA1b43786cfb68cfd0fe0c30014eaf1338b65f7ba6b
SHA256591fde3fc1a3c38d06565ffd100bb5c67ad03f2124eb991039de224b2409f041
SHA51273ae438772feea5387db787b874a91a9159b18718eba50fc820584bb85f938b09cf40071cbd1cbfa4c15755fb5aa0e50ffe79244dcc721323dc6508ebc3cef22