Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 07:49
Behavioral task
behavioral1
Sample
5fa1e8b903222be7c74edce61dfa0435_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5fa1e8b903222be7c74edce61dfa0435_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5fa1e8b903222be7c74edce61dfa0435_JaffaCakes118.exe
-
Size
212KB
-
MD5
5fa1e8b903222be7c74edce61dfa0435
-
SHA1
0f4d80e03f5f17c6aa0880ea3c22edee48ee7298
-
SHA256
556a827f132cadd2d32f1f4d90b0a12e641b8124f70b79f6f8131ea0ea91f8b5
-
SHA512
590fa04022d0cbd85762ba1e5568c974674685b2c8d9337ebee2448a44bd66ea326844ab97c820cf087bf63ebfa70f1a8aa1ce53133190e060339eb029a76b71
-
SSDEEP
6144:h+LpzeANQVBXTBPgLKJDSTQL8jPY1SnKhrn3u4pu:h+LPNQVBFPgLKJDl2Y1SnKI4p
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1444 Vqykya.exe -
resource yara_rule behavioral2/memory/532-0-0x0000000000400000-0x000000000047E000-memory.dmp upx behavioral2/files/0x00090000000234c9-11.dat upx -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 5fa1e8b903222be7c74edce61dfa0435_JaffaCakes118.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job 5fa1e8b903222be7c74edce61dfa0435_JaffaCakes118.exe File created C:\Windows\Vqykya.exe 5fa1e8b903222be7c74edce61dfa0435_JaffaCakes118.exe File opened for modification C:\Windows\Vqykya.exe 5fa1e8b903222be7c74edce61dfa0435_JaffaCakes118.exe File created C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Vqykya.exe File opened for modification C:\Windows\Tasks\{62C40AA6-4406-467a-A5A5-DFDF1B559B7A}.job Vqykya.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 67992 1444 WerFault.exe 87 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Software\Microsoft\Internet Explorer\Main Vqykya.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe 1444 Vqykya.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 532 5fa1e8b903222be7c74edce61dfa0435_JaffaCakes118.exe 1444 Vqykya.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 532 wrote to memory of 1444 532 5fa1e8b903222be7c74edce61dfa0435_JaffaCakes118.exe 87 PID 532 wrote to memory of 1444 532 5fa1e8b903222be7c74edce61dfa0435_JaffaCakes118.exe 87 PID 532 wrote to memory of 1444 532 5fa1e8b903222be7c74edce61dfa0435_JaffaCakes118.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\5fa1e8b903222be7c74edce61dfa0435_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5fa1e8b903222be7c74edce61dfa0435_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\Vqykya.exeC:\Windows\Vqykya.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:1444 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 9003⤵
- Program crash
PID:67992
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1444 -ip 14441⤵PID:68012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
390B
MD57509c396b6284606d87fec6e0dc6cc4e
SHA1c3b5c032388080b965c130469bbfdab9e40730cc
SHA2561b22315d119f390733249059de2815c5129fd6b04a2f635f1481e0a26180a03a
SHA512e1f95267548a973a774db24f694c8645bb5402eb434566afb334bc028bdbde61488a53f462ca26d01378aacb2d4b10d60e407ce7d32876979e5e5e55b31004ee
-
Filesize
212KB
MD55fa1e8b903222be7c74edce61dfa0435
SHA10f4d80e03f5f17c6aa0880ea3c22edee48ee7298
SHA256556a827f132cadd2d32f1f4d90b0a12e641b8124f70b79f6f8131ea0ea91f8b5
SHA512590fa04022d0cbd85762ba1e5568c974674685b2c8d9337ebee2448a44bd66ea326844ab97c820cf087bf63ebfa70f1a8aa1ce53133190e060339eb029a76b71