Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 08:09
Static task
static1
Behavioral task
behavioral1
Sample
48efd5e1d1766c95d53902649d1f185a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
48efd5e1d1766c95d53902649d1f185a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
48efd5e1d1766c95d53902649d1f185a_JaffaCakes118.exe
-
Size
717KB
-
MD5
48efd5e1d1766c95d53902649d1f185a
-
SHA1
11c95a5d17f71039feeb2fa131fefa5bf8791ad7
-
SHA256
a4c934099489b876056578a9be9f9f5e61697c242303ac8277d3e11c4e9a7c80
-
SHA512
86da0260ed81ca9657596dda1c72192ef91bbffd3b5348f83ccce279b3698a65769cf015fdebb3748facc854fc2c93717532577801092f6e332988f2c86f8d1f
-
SSDEEP
12288:LjWRsFmDaRO6mN+iHJ1O/Y2da9kBW9z9LKqGCALhuD8hWrUwRpGXp3Z:Lj4D36Mp1spk9kBW99uui88hWn+
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2712 Setup4300.Exe 2976 HoneyBucket.Exe 2840 HHUVLJMDER.Exe -
Loads dropped DLL 17 IoCs
pid Process 2548 48efd5e1d1766c95d53902649d1f185a_JaffaCakes118.exe 2712 Setup4300.Exe 2712 Setup4300.Exe 2712 Setup4300.Exe 2712 Setup4300.Exe 2712 Setup4300.Exe 2712 Setup4300.Exe 2976 HoneyBucket.Exe 2976 HoneyBucket.Exe 2976 HoneyBucket.Exe 2976 HoneyBucket.Exe 2976 HoneyBucket.Exe 2840 HHUVLJMDER.Exe 2840 HHUVLJMDER.Exe 2840 HHUVLJMDER.Exe 2840 HHUVLJMDER.Exe 2840 HHUVLJMDER.Exe -
Drops file in Program Files directory 16 IoCs
description ioc Process File created C:\Program Files\BadgeHelp\HoneyBucket\PrepFont0.Bmp HHUVLJMDER.Exe File created C:\Program Files\BadgeHelp\HoneyBucket\HHUVLJMDER.Exe Setup4300.Exe File created C:\Program Files\BadgeHelp\HoneyBucket\ADONFKMDER.DLL Setup4300.Exe File created C:\Program Files\BadgeHelp\Reg.Ico HHUVLJMDER.Exe File created C:\Program Files\BadgeHelp\HoneyBucket\LocalTickerList.Test HHUVLJMDER.Exe File opened for modification C:\Program Files\BadgeHelp\HoneyBucket\ADONFKMDER.DLL Setup4300.Exe File created C:\Program Files\BadgeHelp\HoneyBucket\WWVYBVWOOU.DLL HHUVLJMDER.Exe File created C:\Program Files\BadgeHelp\HoneyBucket\LocalTickerList.Txt HHUVLJMDER.Exe File opened for modification C:\Program Files\BadgeHelp\HoneyBucket\HHUVLJMDER.Exe Setup4300.Exe File created C:\Program Files\BadgeHelp\MasterTickerList.Test HHUVLJMDER.Exe File created C:\Program Files\BadgeHelp\MasterTickerList.Txt HHUVLJMDER.Exe File created C:\Program Files\BadgeHelp\HoneyBucket\TickerList.Txt HHUVLJMDER.Exe File created C:\Program Files\BadgeHelp\HoneyBucket\HoneyBucket.Exe Setup4300.Exe File created C:\Program Files\BadgeHelp\HoneyBucket\WordList.Tree HHUVLJMDER.Exe File created C:\Program Files\BadgeHelp\HoneyBucket\4300.Rep HHUVLJMDER.Exe File opened for modification C:\Program Files\BadgeHelp\HoneyBucket\WWVYBVWOOU.DLL HHUVLJMDER.Exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2712 2548 48efd5e1d1766c95d53902649d1f185a_JaffaCakes118.exe 29 PID 2548 wrote to memory of 2712 2548 48efd5e1d1766c95d53902649d1f185a_JaffaCakes118.exe 29 PID 2548 wrote to memory of 2712 2548 48efd5e1d1766c95d53902649d1f185a_JaffaCakes118.exe 29 PID 2548 wrote to memory of 2712 2548 48efd5e1d1766c95d53902649d1f185a_JaffaCakes118.exe 29 PID 2548 wrote to memory of 2712 2548 48efd5e1d1766c95d53902649d1f185a_JaffaCakes118.exe 29 PID 2548 wrote to memory of 2712 2548 48efd5e1d1766c95d53902649d1f185a_JaffaCakes118.exe 29 PID 2548 wrote to memory of 2712 2548 48efd5e1d1766c95d53902649d1f185a_JaffaCakes118.exe 29 PID 2712 wrote to memory of 2976 2712 Setup4300.Exe 30 PID 2712 wrote to memory of 2976 2712 Setup4300.Exe 30 PID 2712 wrote to memory of 2976 2712 Setup4300.Exe 30 PID 2712 wrote to memory of 2976 2712 Setup4300.Exe 30 PID 2712 wrote to memory of 2976 2712 Setup4300.Exe 30 PID 2712 wrote to memory of 2976 2712 Setup4300.Exe 30 PID 2712 wrote to memory of 2976 2712 Setup4300.Exe 30 PID 2976 wrote to memory of 2840 2976 HoneyBucket.Exe 31 PID 2976 wrote to memory of 2840 2976 HoneyBucket.Exe 31 PID 2976 wrote to memory of 2840 2976 HoneyBucket.Exe 31 PID 2976 wrote to memory of 2840 2976 HoneyBucket.Exe 31 PID 2976 wrote to memory of 2840 2976 HoneyBucket.Exe 31 PID 2976 wrote to memory of 2840 2976 HoneyBucket.Exe 31 PID 2976 wrote to memory of 2840 2976 HoneyBucket.Exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\48efd5e1d1766c95d53902649d1f185a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\48efd5e1d1766c95d53902649d1f185a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\Setup4300.Exe.\Setup4300.Exe HoneyBucket F2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Program Files\BadgeHelp\HoneyBucket\HoneyBucket.Exe"C:\Program Files\BadgeHelp\HoneyBucket\HoneyBucket.Exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Program Files\BadgeHelp\HoneyBucket\HHUVLJMDER.Exe"C:\Program Files\BadgeHelp\HoneyBucket\HHUVLJMDER.Exe" 3156637972 12561655144⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:2840
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD571f2c8206b1cba42de55f129eed0f7c4
SHA1d853dccbbb5fa40f6cecf8eba4160eb1ed6e88ab
SHA25652e841b757611c84d0d30936234cbe5b109457900b36e1f3cc9e1e4d1de74535
SHA512e12f68dc6aa13137c7130b7ee12f3f8833dc30d3cd8d73b81cdbdcd34565c965f57be3c0efd807645ae49ae43ec7e96e25bb57515a8b6ef9db359ea288f7f7b6
-
Filesize
571KB
MD537876c6ead468d82ba34647fdbd415bd
SHA1a02caee215619e8e68f7b908273734bf9d35223c
SHA25683314ad01d7fe000b4ca2f6137cc0a0c761040ed2763c250d1e103865d61370c
SHA5122b028b475f42d1aaf2337bd03ec7beea0ccfe2b5490d80e2db32318f58158d344dfe1972fc83d2e5cb76ecb4c0ba6d65364796dcfb9f3d234b1e419a5e84bd4d
-
Filesize
48KB
MD51ef39493ec85c61f7adcaf07ac5881d8
SHA17caadea494024c32d9e2532356bcfa23116902d8
SHA25626f65798edbf9d839d934cf41f537d1db939a9cb2be704f769248c064c8dd8c2
SHA512b416c0be992579847145a5ba19707e1bca3dc0b5bdaff622af18e7f998dfbf4ddba5553d1ac27b3c0f43699931e66761af5994e9082bff5e3a84a5df3a630eb4
-
Filesize
144KB
MD5ea1a4a4de3f9945ecf7d3c7dc5b77c79
SHA11b57553b0a57bb15141e298006fe9ced483d9897
SHA25647bd022cc024840cd100aeb6b8c36f3bdde3cc5aacc47d3a69b044ce46000388
SHA51251e71681128b7216d7f83d84c8c7377e30737fa1b444930a7fba97461e0f795976af13887960d8026b2ec83324453c9ade06527fe50ac1a4a3fa28134abff451