Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 05:13
Static task
static1
Behavioral task
behavioral1
Sample
485e10850031d9d3ba803351bbaf4a48_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
485e10850031d9d3ba803351bbaf4a48_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
485e10850031d9d3ba803351bbaf4a48_JaffaCakes118.exe
-
Size
73KB
-
MD5
485e10850031d9d3ba803351bbaf4a48
-
SHA1
6c21c3acd7c8fcd9c276e443abcc38867d0b00ac
-
SHA256
f0dcb0cb61dc805903e35377a12a98d403e03fdabcbc5a9112374495f5ed62ff
-
SHA512
993fe1bcd84a3bff360611af61abe897f8503ceca06806e7e3744e912a7c2f0e8e1700e2c5057ac1cc6ac53ea0e39380db26f0c7a5a33b8e22ad72b7b8647bbb
-
SSDEEP
1536:3rUlDSCPWWum6e6mm/ASwwb5RUUgj0A+XFseSxnZkANj+:78DTOWuhe69/Xwwb5RUUgj0A+VgRZkAo
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ctfmon = "C:\\Windows\\TEMP\\services.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\msmmsgr = "C:\\Windows\\TEMP\\x\\services.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4752 set thread context of 3352 4752 485e10850031d9d3ba803351bbaf4a48_JaffaCakes118.exe 87 -
Modifies registry key 1 TTPs 2 IoCs
pid Process 1956 reg.exe 4664 reg.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3352 485e10850031d9d3ba803351bbaf4a48_JaffaCakes118.exe 3352 485e10850031d9d3ba803351bbaf4a48_JaffaCakes118.exe 3352 485e10850031d9d3ba803351bbaf4a48_JaffaCakes118.exe 3352 485e10850031d9d3ba803351bbaf4a48_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 4752 wrote to memory of 3516 4752 485e10850031d9d3ba803351bbaf4a48_JaffaCakes118.exe 85 PID 4752 wrote to memory of 3516 4752 485e10850031d9d3ba803351bbaf4a48_JaffaCakes118.exe 85 PID 4752 wrote to memory of 3516 4752 485e10850031d9d3ba803351bbaf4a48_JaffaCakes118.exe 85 PID 4752 wrote to memory of 4840 4752 485e10850031d9d3ba803351bbaf4a48_JaffaCakes118.exe 86 PID 4752 wrote to memory of 4840 4752 485e10850031d9d3ba803351bbaf4a48_JaffaCakes118.exe 86 PID 4752 wrote to memory of 4840 4752 485e10850031d9d3ba803351bbaf4a48_JaffaCakes118.exe 86 PID 4752 wrote to memory of 3352 4752 485e10850031d9d3ba803351bbaf4a48_JaffaCakes118.exe 87 PID 4752 wrote to memory of 3352 4752 485e10850031d9d3ba803351bbaf4a48_JaffaCakes118.exe 87 PID 4752 wrote to memory of 3352 4752 485e10850031d9d3ba803351bbaf4a48_JaffaCakes118.exe 87 PID 4752 wrote to memory of 3352 4752 485e10850031d9d3ba803351bbaf4a48_JaffaCakes118.exe 87 PID 4752 wrote to memory of 3352 4752 485e10850031d9d3ba803351bbaf4a48_JaffaCakes118.exe 87 PID 4752 wrote to memory of 3352 4752 485e10850031d9d3ba803351bbaf4a48_JaffaCakes118.exe 87 PID 4840 wrote to memory of 1956 4840 cmd.exe 90 PID 4840 wrote to memory of 1956 4840 cmd.exe 90 PID 4840 wrote to memory of 1956 4840 cmd.exe 90 PID 3516 wrote to memory of 4664 3516 cmd.exe 91 PID 3516 wrote to memory of 4664 3516 cmd.exe 91 PID 3516 wrote to memory of 4664 3516 cmd.exe 91 PID 3352 wrote to memory of 3452 3352 485e10850031d9d3ba803351bbaf4a48_JaffaCakes118.exe 56 PID 3352 wrote to memory of 3452 3352 485e10850031d9d3ba803351bbaf4a48_JaffaCakes118.exe 56 PID 3352 wrote to memory of 3452 3352 485e10850031d9d3ba803351bbaf4a48_JaffaCakes118.exe 56 PID 3352 wrote to memory of 3452 3352 485e10850031d9d3ba803351bbaf4a48_JaffaCakes118.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3452
-
C:\Users\Admin\AppData\Local\Temp\485e10850031d9d3ba803351bbaf4a48_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\485e10850031d9d3ba803351bbaf4a48_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v msmmsgr /t REG_SZ /d "C:\Windows\TEMP\x\services.exe" /f3⤵
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v msmmsgr /t REG_SZ /d "C:\Windows\TEMP\x\services.exe" /f4⤵
- Adds Run key to start application
- Modifies registry key
PID:4664
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v ctfmon /t REG_SZ /d "C:\Windows\TEMP\services.exe" /f3⤵
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v ctfmon /t REG_SZ /d "C:\Windows\TEMP\services.exe" /f4⤵
- Adds Run key to start application
- Modifies registry key
PID:1956
-
-
-
C:\Users\Admin\AppData\Local\Temp\485e10850031d9d3ba803351bbaf4a48_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\485e10850031d9d3ba803351bbaf4a48_JaffaCakes118.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3352
-
-