Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 20:13
Static task
static1
Behavioral task
behavioral1
Sample
5d8004040cfbd8718d9922b20f9485c6_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5d8004040cfbd8718d9922b20f9485c6_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5d8004040cfbd8718d9922b20f9485c6_JaffaCakes118.exe
-
Size
323KB
-
MD5
5d8004040cfbd8718d9922b20f9485c6
-
SHA1
dd9e37a893068d0660980513c7aa89a49b0b0cf7
-
SHA256
f25e3d83c71de79521f9e88b9c1c25c7f7c3c40b1339a1791f31561f798d6f7b
-
SHA512
12af30b1f94f6b5598ab311c9acc8e78b91ed5d79485a6b915dbb8dfe5e70f15e09c89c492780a0f5c8552115c8d695cbaab282c045d9c09c250f54fb47047fa
-
SSDEEP
1536:qQvBHZgFLJzSLWTV/y45BnD8SlNDSzvHF5OaeCCVpguN4eSe+eooOoaoCoCo0oB+:9hZgFLGS/y45BAso
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2572 DelC1F8.tmp -
Executes dropped EXE 1 IoCs
pid Process 2572 DelC1F8.tmp -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\zxcv.vbs 5d8004040cfbd8718d9922b20f9485c6_JaffaCakes118.exe File opened for modification C:\WINDOWS\zxcv.vbs DelC1F8.tmp -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1504 wrote to memory of 1252 1504 5d8004040cfbd8718d9922b20f9485c6_JaffaCakes118.exe 83 PID 1504 wrote to memory of 1252 1504 5d8004040cfbd8718d9922b20f9485c6_JaffaCakes118.exe 83 PID 1504 wrote to memory of 1252 1504 5d8004040cfbd8718d9922b20f9485c6_JaffaCakes118.exe 83 PID 1504 wrote to memory of 2572 1504 5d8004040cfbd8718d9922b20f9485c6_JaffaCakes118.exe 92 PID 1504 wrote to memory of 2572 1504 5d8004040cfbd8718d9922b20f9485c6_JaffaCakes118.exe 92 PID 1504 wrote to memory of 2572 1504 5d8004040cfbd8718d9922b20f9485c6_JaffaCakes118.exe 92 PID 2572 wrote to memory of 2608 2572 DelC1F8.tmp 93 PID 2572 wrote to memory of 2608 2572 DelC1F8.tmp 93 PID 2572 wrote to memory of 2608 2572 DelC1F8.tmp 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d8004040cfbd8718d9922b20f9485c6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5d8004040cfbd8718d9922b20f9485c6_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\wscript.exe/nologo C:\WINDOWS\zxcv.vbs2⤵PID:1252
-
-
C:\Users\Admin\AppData\Local\Temp\DelC1F8.tmpC:\Users\Admin\AppData\Local\Temp\DelC1F8.tmp 492 "C:\Users\Admin\AppData\Local\Temp\5d8004040cfbd8718d9922b20f9485c6_JaffaCakes118.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\wscript.exe/nologo C:\WINDOWS\zxcv.vbs3⤵PID:2608
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
323KB
MD55d8004040cfbd8718d9922b20f9485c6
SHA1dd9e37a893068d0660980513c7aa89a49b0b0cf7
SHA256f25e3d83c71de79521f9e88b9c1c25c7f7c3c40b1339a1791f31561f798d6f7b
SHA51212af30b1f94f6b5598ab311c9acc8e78b91ed5d79485a6b915dbb8dfe5e70f15e09c89c492780a0f5c8552115c8d695cbaab282c045d9c09c250f54fb47047fa
-
Filesize
266KB
MD5e54857b4590a2097ae9c67d700aa0366
SHA13afeac8582f22e5af9bf8fc6bb45f0c85357dac7
SHA25679f7d1725133388d18b976f6e2fd89813d57aa6c809939f7c4526cf1e2e312ae
SHA51204d0aef7adec0d2d7f674fbf577a2295098f06cd1b4e9b311d4f62fb6c5c4e592f7666c01ceefc9677fdde42f6dca4a6e3376152f7d7a7b9e0d77fc49f4f322d