Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 17:43
Behavioral task
behavioral1
Sample
4abbba17d1158f37abda51312782f6e3_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
4abbba17d1158f37abda51312782f6e3_JaffaCakes118.exe
-
Size
784KB
-
MD5
4abbba17d1158f37abda51312782f6e3
-
SHA1
3b4d76c3ac274fe1973c910947eb2e459e70cb73
-
SHA256
261608a863181039c2a9d58c0175ed8e56009480c1b4240621d12d4d0b78139a
-
SHA512
c7628b1118fb7305296daa8794a056ff0be4c6eef7279178409d215d3f126564150ca0d7b176b762c14d3e3967b5158004d2fe76457237074c35eb309c74a9da
-
SSDEEP
24576:L0sf561Cyo7HOBO/Pxkf7PcILYiJE5EuE9v2Ym:LLfBJOw/PbIyKv2
Malware Config
Signatures
-
XMRig Miner payload 8 IoCs
resource yara_rule behavioral1/memory/1932-1-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/1932-15-0x00000000030E0000-0x00000000033F2000-memory.dmp xmrig behavioral1/memory/1932-14-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2188-19-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral1/memory/2188-24-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/2188-33-0x0000000003220000-0x00000000033B3000-memory.dmp xmrig behavioral1/memory/2188-34-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral1/memory/1932-35-0x00000000030E0000-0x00000000033F2000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 2188 4abbba17d1158f37abda51312782f6e3_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2188 4abbba17d1158f37abda51312782f6e3_JaffaCakes118.exe -
Loads dropped DLL 1 IoCs
pid Process 1932 4abbba17d1158f37abda51312782f6e3_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1932-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral1/files/0x000a000000012270-10.dat upx behavioral1/memory/2188-17-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1932 4abbba17d1158f37abda51312782f6e3_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1932 4abbba17d1158f37abda51312782f6e3_JaffaCakes118.exe 2188 4abbba17d1158f37abda51312782f6e3_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2188 1932 4abbba17d1158f37abda51312782f6e3_JaffaCakes118.exe 31 PID 1932 wrote to memory of 2188 1932 4abbba17d1158f37abda51312782f6e3_JaffaCakes118.exe 31 PID 1932 wrote to memory of 2188 1932 4abbba17d1158f37abda51312782f6e3_JaffaCakes118.exe 31 PID 1932 wrote to memory of 2188 1932 4abbba17d1158f37abda51312782f6e3_JaffaCakes118.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4abbba17d1158f37abda51312782f6e3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4abbba17d1158f37abda51312782f6e3_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\4abbba17d1158f37abda51312782f6e3_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\4abbba17d1158f37abda51312782f6e3_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2188
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD55ebe6a3c58d2416b05312557197a9f08
SHA1a8c07b2388ad6c0b392d5a52d7e7f19d69d0830d
SHA2565d3a4a113d2bc8c547a2d7696dc6fb09c0e085cd3c89aa6bb19eb7bdab94df52
SHA5123e1f684573276f3a03e1a20165ac4ae2c44ca52dc035679deba6c7c3a6b66e221bf8c22aa0bc577cf6216640bd2ecdcac93ba1208df9cfd59a2e39fda7f2a811