Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 21:57
Static task
static1
Behavioral task
behavioral1
Sample
4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe
-
Size
356KB
-
MD5
4b9418d95fc77669722d953c4f95299b
-
SHA1
c2267de207d9efa6943a04dace9dae57d3eff149
-
SHA256
215fcc962beb1adbe6ae295cf9363874aa1d74b8a2397cf7fed54315c031a9a4
-
SHA512
8b0495c5561113c4b7527f1eaf8e46a82ee8669e37bc2c8f4e8dd35dd11666a16ef822e46a8b36ba65541752332bef931af5b70ed3f57aff5d3b3f5ecff20c26
-
SSDEEP
6144:7vbx8x3ZYpRpmbXMXTP9598vATqn4ums/6GGt:7A8Rpmu5yY2nNG
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2168 402Jn9h9T6cotNm.exe -
Executes dropped EXE 2 IoCs
pid Process 2084 402Jn9h9T6cotNm.exe 2168 402Jn9h9T6cotNm.exe -
Loads dropped DLL 4 IoCs
pid Process 5116 4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe 5116 4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe 2168 402Jn9h9T6cotNm.exe 2168 402Jn9h9T6cotNm.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2650514177-1034912467-4025611726-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\N06rOGjgs = "C:\\ProgramData\\7GqporsLi5gQ\\402Jn9h9T6cotNm.exe" 4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 5044 set thread context of 5116 5044 4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe 86 PID 2084 set thread context of 2168 2084 402Jn9h9T6cotNm.exe 88 PID 2168 set thread context of 4484 2168 402Jn9h9T6cotNm.exe 90 -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 5044 wrote to memory of 5116 5044 4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe 86 PID 5044 wrote to memory of 5116 5044 4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe 86 PID 5044 wrote to memory of 5116 5044 4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe 86 PID 5044 wrote to memory of 5116 5044 4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe 86 PID 5044 wrote to memory of 5116 5044 4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe 86 PID 5116 wrote to memory of 2084 5116 4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe 87 PID 5116 wrote to memory of 2084 5116 4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe 87 PID 5116 wrote to memory of 2084 5116 4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe 87 PID 2084 wrote to memory of 2168 2084 402Jn9h9T6cotNm.exe 88 PID 2084 wrote to memory of 2168 2084 402Jn9h9T6cotNm.exe 88 PID 2084 wrote to memory of 2168 2084 402Jn9h9T6cotNm.exe 88 PID 2084 wrote to memory of 2168 2084 402Jn9h9T6cotNm.exe 88 PID 2084 wrote to memory of 2168 2084 402Jn9h9T6cotNm.exe 88 PID 2168 wrote to memory of 1760 2168 402Jn9h9T6cotNm.exe 89 PID 2168 wrote to memory of 1760 2168 402Jn9h9T6cotNm.exe 89 PID 2168 wrote to memory of 1760 2168 402Jn9h9T6cotNm.exe 89 PID 2168 wrote to memory of 4484 2168 402Jn9h9T6cotNm.exe 90 PID 2168 wrote to memory of 4484 2168 402Jn9h9T6cotNm.exe 90 PID 2168 wrote to memory of 4484 2168 402Jn9h9T6cotNm.exe 90 PID 2168 wrote to memory of 4484 2168 402Jn9h9T6cotNm.exe 90 PID 2168 wrote to memory of 4484 2168 402Jn9h9T6cotNm.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4b9418d95fc77669722d953c4f95299b_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\ProgramData\7GqporsLi5gQ\402Jn9h9T6cotNm.exe"C:\ProgramData\7GqporsLi5gQ\402Jn9h9T6cotNm.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\ProgramData\7GqporsLi5gQ\402Jn9h9T6cotNm.exe"C:\ProgramData\7GqporsLi5gQ\402Jn9h9T6cotNm.exe"4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Windows Media Player\wmpshare.exe"C:\Program Files (x86)\Windows Media Player\wmpshare.exe" /i:21685⤵PID:1760
-
-
C:\Program Files (x86)\Windows Mail\wabmig.exe"C:\Program Files (x86)\Windows Mail\wabmig.exe" /i:21685⤵PID:4484
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
356KB
MD54b9418d95fc77669722d953c4f95299b
SHA1c2267de207d9efa6943a04dace9dae57d3eff149
SHA256215fcc962beb1adbe6ae295cf9363874aa1d74b8a2397cf7fed54315c031a9a4
SHA5128b0495c5561113c4b7527f1eaf8e46a82ee8669e37bc2c8f4e8dd35dd11666a16ef822e46a8b36ba65541752332bef931af5b70ed3f57aff5d3b3f5ecff20c26
-
Filesize
356KB
MD54c5e13b0a021608d1286e6f3692f1408
SHA1997ba3f54b6a34ebe19254e3582344681d34b7c7
SHA25685da65b4955cff4e5dbbb11b7d2e4972083a7df977bd4c3955a45d1d98a9a260
SHA512e4e3acbb9a486342d8eb48be9bc77821feccfd3617b6c56a4b47e61b7048b8c738077e33d626b7d3441508ec99870462bf5230ee0f753d98ba6f8f7c287feeeb