Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/07/2024, 23:15

General

  • Target

    61cf4714edf855a2c62b86aaa3236fab_JaffaCakes118.exe

  • Size

    1.1MB

  • MD5

    61cf4714edf855a2c62b86aaa3236fab

  • SHA1

    76b327625e253a7b2728c7a3fee4478b6d718d61

  • SHA256

    e787c605f42483df51d1ea9ba298c3b987794182bffc9685715ad95b390b573a

  • SHA512

    a29fe116a3826ddc9cf5467434b9f26be8101d7b01c03f95c61c67255a97c7ecf44f51f2246b04d924bfac150c2779083ebd2106285fdd28827a420689571ca1

  • SSDEEP

    24576:wX/eO4qA611ZlZ38YrKkEROaL3v9Xjrh1TqM:7O4Zs1ZrbhEYUFXjFtF

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 49 IoCs
  • Suspicious use of SetThreadContext 25 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\61cf4714edf855a2c62b86aaa3236fab_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\61cf4714edf855a2c62b86aaa3236fab_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3532
    • C:\Users\Admin\AppData\Local\Temp\61cf4714edf855a2c62b86aaa3236fab_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\61cf4714edf855a2c62b86aaa3236fab_JaffaCakes118.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3584
      • C:\Users\Admin\AppData\Roaming\yiim.exe
        C:\Users\Admin\AppData\Local\Temp\61cf4714edf855a2c62b86aaa3236fab_JaffaCakes118.exe -dwup
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4108
        • C:\Users\Admin\AppData\Roaming\yiim.exe
          C:\Users\Admin\AppData\Local\Temp\61cf4714edf855a2c62b86aaa3236fab_JaffaCakes118.exe -dwup
          4⤵
          • Modifies WinLogon for persistence
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2704
          • C:\Users\Admin\AppData\Roaming\yiim.exe
            C:\Users\Admin\AppData\Roaming\yiim.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4052
            • C:\Users\Admin\AppData\Roaming\yiim.exe
              C:\Users\Admin\AppData\Roaming\yiim.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:4324
              • C:\Users\Admin\AppData\Roaming\yiim.exe
                C:\Users\Admin\AppData\Roaming\yiim.exe
                7⤵
                • Executes dropped EXE
                PID:4656
            • C:\Users\Admin\AppData\Roaming\yiim.exe
              C:\Users\Admin\AppData\Roaming\yiim.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:3928
              • C:\Users\Admin\AppData\Roaming\yiim.exe
                C:\Users\Admin\AppData\Roaming\yiim.exe
                7⤵
                • Executes dropped EXE
                PID:3492
            • C:\Users\Admin\AppData\Roaming\yiim.exe
              C:\Users\Admin\AppData\Roaming\yiim.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:1864
              • C:\Users\Admin\AppData\Roaming\yiim.exe
                C:\Users\Admin\AppData\Roaming\yiim.exe
                7⤵
                • Executes dropped EXE
                PID:2304
            • C:\Users\Admin\AppData\Roaming\yiim.exe
              C:\Users\Admin\AppData\Roaming\yiim.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:4164
              • C:\Users\Admin\AppData\Roaming\yiim.exe
                C:\Users\Admin\AppData\Roaming\yiim.exe
                7⤵
                • Executes dropped EXE
                PID:700
            • C:\Users\Admin\AppData\Roaming\yiim.exe
              C:\Users\Admin\AppData\Roaming\yiim.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:4936
              • C:\Users\Admin\AppData\Roaming\yiim.exe
                C:\Users\Admin\AppData\Roaming\yiim.exe
                7⤵
                • Executes dropped EXE
                PID:5112
            • C:\Users\Admin\AppData\Roaming\yiim.exe
              C:\Users\Admin\AppData\Roaming\yiim.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:4300
              • C:\Users\Admin\AppData\Roaming\yiim.exe
                C:\Users\Admin\AppData\Roaming\yiim.exe
                7⤵
                • Executes dropped EXE
                PID:4276
            • C:\Users\Admin\AppData\Roaming\yiim.exe
              C:\Users\Admin\AppData\Roaming\yiim.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:4016
              • C:\Users\Admin\AppData\Roaming\yiim.exe
                C:\Users\Admin\AppData\Roaming\yiim.exe
                7⤵
                • Executes dropped EXE
                PID:4884
            • C:\Users\Admin\AppData\Roaming\yiim.exe
              C:\Users\Admin\AppData\Roaming\yiim.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:1032
              • C:\Users\Admin\AppData\Roaming\yiim.exe
                C:\Users\Admin\AppData\Roaming\yiim.exe
                7⤵
                • Executes dropped EXE
                PID:772
            • C:\Users\Admin\AppData\Roaming\yiim.exe
              C:\Users\Admin\AppData\Roaming\yiim.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:824
              • C:\Users\Admin\AppData\Roaming\yiim.exe
                C:\Users\Admin\AppData\Roaming\yiim.exe
                7⤵
                • Executes dropped EXE
                PID:384
            • C:\Users\Admin\AppData\Roaming\yiim.exe
              C:\Users\Admin\AppData\Roaming\yiim.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:2364
              • C:\Users\Admin\AppData\Roaming\yiim.exe
                C:\Users\Admin\AppData\Roaming\yiim.exe
                7⤵
                • Executes dropped EXE
                PID:4380
            • C:\Users\Admin\AppData\Roaming\yiim.exe
              C:\Users\Admin\AppData\Roaming\yiim.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:4640
              • C:\Users\Admin\AppData\Roaming\yiim.exe
                C:\Users\Admin\AppData\Roaming\yiim.exe
                7⤵
                • Executes dropped EXE
                PID:2272
            • C:\Users\Admin\AppData\Roaming\yiim.exe
              C:\Users\Admin\AppData\Roaming\yiim.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:1036
              • C:\Users\Admin\AppData\Roaming\yiim.exe
                C:\Users\Admin\AppData\Roaming\yiim.exe
                7⤵
                • Executes dropped EXE
                PID:884
            • C:\Users\Admin\AppData\Roaming\yiim.exe
              C:\Users\Admin\AppData\Roaming\yiim.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:4728
              • C:\Users\Admin\AppData\Roaming\yiim.exe
                C:\Users\Admin\AppData\Roaming\yiim.exe
                7⤵
                • Executes dropped EXE
                PID:2252
            • C:\Users\Admin\AppData\Roaming\yiim.exe
              C:\Users\Admin\AppData\Roaming\yiim.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:4844
              • C:\Users\Admin\AppData\Roaming\yiim.exe
                C:\Users\Admin\AppData\Roaming\yiim.exe
                7⤵
                • Executes dropped EXE
                PID:3648
            • C:\Users\Admin\AppData\Roaming\yiim.exe
              C:\Users\Admin\AppData\Roaming\yiim.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:780
              • C:\Users\Admin\AppData\Roaming\yiim.exe
                C:\Users\Admin\AppData\Roaming\yiim.exe
                7⤵
                • Executes dropped EXE
                PID:1060
            • C:\Users\Admin\AppData\Roaming\yiim.exe
              C:\Users\Admin\AppData\Roaming\yiim.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:1556
              • C:\Users\Admin\AppData\Roaming\yiim.exe
                C:\Users\Admin\AppData\Roaming\yiim.exe
                7⤵
                • Executes dropped EXE
                PID:624
            • C:\Users\Admin\AppData\Roaming\yiim.exe
              C:\Users\Admin\AppData\Roaming\yiim.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:1084
              • C:\Users\Admin\AppData\Roaming\yiim.exe
                C:\Users\Admin\AppData\Roaming\yiim.exe
                7⤵
                • Executes dropped EXE
                PID:5076
            • C:\Users\Admin\AppData\Roaming\yiim.exe
              C:\Users\Admin\AppData\Roaming\yiim.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:2256
              • C:\Users\Admin\AppData\Roaming\yiim.exe
                C:\Users\Admin\AppData\Roaming\yiim.exe
                7⤵
                • Executes dropped EXE
                PID:4788
            • C:\Users\Admin\AppData\Roaming\yiim.exe
              C:\Users\Admin\AppData\Roaming\yiim.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:2144
              • C:\Users\Admin\AppData\Roaming\yiim.exe
                C:\Users\Admin\AppData\Roaming\yiim.exe
                7⤵
                • Executes dropped EXE
                PID:424
            • C:\Users\Admin\AppData\Roaming\yiim.exe
              C:\Users\Admin\AppData\Roaming\yiim.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:2480
              • C:\Users\Admin\AppData\Roaming\yiim.exe
                C:\Users\Admin\AppData\Roaming\yiim.exe
                7⤵
                • Executes dropped EXE
                PID:4240
            • C:\Users\Admin\AppData\Roaming\yiim.exe
              C:\Users\Admin\AppData\Roaming\yiim.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:1596
              • C:\Users\Admin\AppData\Roaming\yiim.exe
                C:\Users\Admin\AppData\Roaming\yiim.exe
                7⤵
                • Executes dropped EXE
                PID:3688
            • C:\Users\Admin\AppData\Roaming\yiim.exe
              C:\Users\Admin\AppData\Roaming\yiim.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:1164
              • C:\Users\Admin\AppData\Roaming\yiim.exe
                C:\Users\Admin\AppData\Roaming\yiim.exe
                7⤵
                • Executes dropped EXE
                PID:4396
            • C:\Users\Admin\AppData\Roaming\yiim.exe
              C:\Users\Admin\AppData\Roaming\yiim.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:5032
              • C:\Users\Admin\AppData\Roaming\yiim.exe
                C:\Users\Admin\AppData\Roaming\yiim.exe
                7⤵
                • Executes dropped EXE
                PID:3224

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\yiim.exe

    Filesize

    1.1MB

    MD5

    61cf4714edf855a2c62b86aaa3236fab

    SHA1

    76b327625e253a7b2728c7a3fee4478b6d718d61

    SHA256

    e787c605f42483df51d1ea9ba298c3b987794182bffc9685715ad95b390b573a

    SHA512

    a29fe116a3826ddc9cf5467434b9f26be8101d7b01c03f95c61c67255a97c7ecf44f51f2246b04d924bfac150c2779083ebd2106285fdd28827a420689571ca1

  • memory/384-83-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/700-49-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/772-76-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2304-42-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2704-15-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2704-16-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2704-51-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/2704-22-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/3492-35-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/3584-2-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/3584-3-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/3584-0-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/4052-21-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/4052-19-0x00000000001D0000-0x00000000001D1000-memory.dmp

    Filesize

    4KB

  • memory/4276-63-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/4380-89-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/4656-28-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/4884-69-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/5112-56-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB