Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 05:09
Behavioral task
behavioral1
Sample
5a96aa3b1b819002ec689b7f4ed1c8f0_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
5a96aa3b1b819002ec689b7f4ed1c8f0_JaffaCakes118.exe
-
Size
784KB
-
MD5
5a96aa3b1b819002ec689b7f4ed1c8f0
-
SHA1
0e5f404a3f3c73a5124d0f122c8f8f032799e850
-
SHA256
6da9be8f74188087253907a373efff340ac3cd86376bea8ecbfde1ee297b153e
-
SHA512
a47aaa1146fc40a844b448867c26fb50f3c1948a4acc392bbeba2fb3e8901a5ef7d2f215a072a5b26089ff491ac9cb0a34da2fb29ade5c026f53f9ec0ad6eb6d
-
SSDEEP
12288:ACKt0sADGTOsBXgx1U4BwO5Dd1npiVsdhL8PeMfvzYMx4XyJYT9td+tQ:A2sAq6sBX2B9NzpisUYMx4iJYRt
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/1000-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1000-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4368-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4368-29-0x0000000005370000-0x0000000005503000-memory.dmp xmrig behavioral2/memory/4368-20-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/4368-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 4368 5a96aa3b1b819002ec689b7f4ed1c8f0_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4368 5a96aa3b1b819002ec689b7f4ed1c8f0_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/1000-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x00080000000234f1-11.dat upx behavioral2/memory/4368-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1000 5a96aa3b1b819002ec689b7f4ed1c8f0_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1000 5a96aa3b1b819002ec689b7f4ed1c8f0_JaffaCakes118.exe 4368 5a96aa3b1b819002ec689b7f4ed1c8f0_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1000 wrote to memory of 4368 1000 5a96aa3b1b819002ec689b7f4ed1c8f0_JaffaCakes118.exe 86 PID 1000 wrote to memory of 4368 1000 5a96aa3b1b819002ec689b7f4ed1c8f0_JaffaCakes118.exe 86 PID 1000 wrote to memory of 4368 1000 5a96aa3b1b819002ec689b7f4ed1c8f0_JaffaCakes118.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a96aa3b1b819002ec689b7f4ed1c8f0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5a96aa3b1b819002ec689b7f4ed1c8f0_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\5a96aa3b1b819002ec689b7f4ed1c8f0_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\5a96aa3b1b819002ec689b7f4ed1c8f0_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4368
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD526c8c1d400b732cfd05f23e08b094178
SHA1f3bcbf70084217d6c20127c36080a6ae979258f6
SHA256b984f4048c79bda72d7d8338d31543854023b8b935b28adfaccf1de31a399856
SHA512445dade4b765f67fe94020d1d5b71de68d7398e2140408b40ab09a66d67e9cea4dc144a5364191eaa57d6d7267fabf2cf0b465609eb1d11cbecfc05b2aa12f3d