Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 13:51
Behavioral task
behavioral1
Sample
5c3651edca0342304db8f81c68cfc299_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
5c3651edca0342304db8f81c68cfc299_JaffaCakes118.exe
-
Size
784KB
-
MD5
5c3651edca0342304db8f81c68cfc299
-
SHA1
a62d2815a22dd11a6cff065eed0bdb123620d67d
-
SHA256
0bee2e5b277918e3f18170ef3b930ba346beed9b677716451e8df98523542388
-
SHA512
1b62ddb0aa2d618458d6d240664bd027e54726b9fa5e982a05db1a2c8009db06f6bd1bdab7f5f387d63d642fe2992fbb57ded27e6c65f255ff571d1ccc4257e7
-
SSDEEP
24576:SrPeNbmaOKwT+ExEhjzjgd24rNvFhqTnmc:GPepQk+EhTgdVjh
Malware Config
Signatures
-
XMRig Miner payload 6 IoCs
resource yara_rule behavioral2/memory/1644-2-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/1644-12-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4788-15-0x0000000000400000-0x0000000000593000-memory.dmp xmrig behavioral2/memory/4788-21-0x0000000000400000-0x0000000000587000-memory.dmp xmrig behavioral2/memory/4788-20-0x00000000053D0000-0x0000000005563000-memory.dmp xmrig behavioral2/memory/4788-30-0x0000000000400000-0x0000000000587000-memory.dmp xmrig -
Deletes itself 1 IoCs
pid Process 4788 5c3651edca0342304db8f81c68cfc299_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 4788 5c3651edca0342304db8f81c68cfc299_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/1644-0-0x0000000000400000-0x0000000000712000-memory.dmp upx behavioral2/files/0x00090000000234b1-11.dat upx behavioral2/memory/4788-13-0x0000000000400000-0x0000000000712000-memory.dmp upx -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1644 5c3651edca0342304db8f81c68cfc299_JaffaCakes118.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1644 5c3651edca0342304db8f81c68cfc299_JaffaCakes118.exe 4788 5c3651edca0342304db8f81c68cfc299_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1644 wrote to memory of 4788 1644 5c3651edca0342304db8f81c68cfc299_JaffaCakes118.exe 85 PID 1644 wrote to memory of 4788 1644 5c3651edca0342304db8f81c68cfc299_JaffaCakes118.exe 85 PID 1644 wrote to memory of 4788 1644 5c3651edca0342304db8f81c68cfc299_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c3651edca0342304db8f81c68cfc299_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5c3651edca0342304db8f81c68cfc299_JaffaCakes118.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\5c3651edca0342304db8f81c68cfc299_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\5c3651edca0342304db8f81c68cfc299_JaffaCakes118.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4788
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
784KB
MD5fbb16cf456207fdee0754f0a5159aa2b
SHA13dd023e8a5ba66b4e0379ef6052676620f659377
SHA256be3fcdec968f00c4f6eef3fc0c77689c223bc4dafbcb203233dd8f04f2b73ad3
SHA512842a208f2a801386794fb5545f14dca79c8cf8874de68595858a76986303b8c5b04517f5141eea8454258ef855c4538ec32eee9d8bc40d511d4350cacda2c80f