Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 08:43
Static task
static1
Behavioral task
behavioral1
Sample
628e1d38b5427dba964dd53be24c054b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
628e1d38b5427dba964dd53be24c054b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
628e1d38b5427dba964dd53be24c054b_JaffaCakes118.exe
-
Size
2.5MB
-
MD5
628e1d38b5427dba964dd53be24c054b
-
SHA1
3b44b0d90d156b8c089869f697d6cd9aeaf3d082
-
SHA256
c12d4875003c8790cf37999e9c8449314648e86b08319a4f26c271f853ce449d
-
SHA512
587ea6539e9054787647fe833f95cbc54e1882f515da6916673e53a2711927ea36f9f52175551371589e1f9f2ae533cab59e792b85246a97751ec4fbd4b61e49
-
SSDEEP
49152:nh8dEYpdANaZWwn+0c0EHGh8eBYI8kpbmhE88ZcMT:0ZAN1wn+LdH5eBfx1ZcMT
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3636-1-0x0000000002740000-0x000000000277D000-memory.dmp upx behavioral2/memory/3636-40-0x0000000002740000-0x000000000277D000-memory.dmp upx behavioral2/memory/3636-37-0x0000000002740000-0x000000000277D000-memory.dmp upx behavioral2/memory/3636-45-0x0000000002740000-0x000000000277D000-memory.dmp upx behavioral2/memory/3636-42-0x0000000002740000-0x000000000277D000-memory.dmp upx behavioral2/memory/3636-33-0x0000000002740000-0x000000000277D000-memory.dmp upx behavioral2/memory/3636-31-0x0000000002740000-0x000000000277D000-memory.dmp upx behavioral2/memory/3636-29-0x0000000002740000-0x000000000277D000-memory.dmp upx behavioral2/memory/3636-27-0x0000000002740000-0x000000000277D000-memory.dmp upx behavioral2/memory/3636-25-0x0000000002740000-0x000000000277D000-memory.dmp upx behavioral2/memory/3636-23-0x0000000002740000-0x000000000277D000-memory.dmp upx behavioral2/memory/3636-19-0x0000000002740000-0x000000000277D000-memory.dmp upx behavioral2/memory/3636-17-0x0000000002740000-0x000000000277D000-memory.dmp upx behavioral2/memory/3636-16-0x0000000002740000-0x000000000277D000-memory.dmp upx behavioral2/memory/3636-9-0x0000000002740000-0x000000000277D000-memory.dmp upx behavioral2/memory/3636-5-0x0000000002740000-0x000000000277D000-memory.dmp upx behavioral2/memory/3636-46-0x0000000002740000-0x000000000277D000-memory.dmp upx behavioral2/memory/3636-36-0x0000000002740000-0x000000000277D000-memory.dmp upx behavioral2/memory/3636-21-0x0000000002740000-0x000000000277D000-memory.dmp upx behavioral2/memory/3636-13-0x0000000002740000-0x000000000277D000-memory.dmp upx behavioral2/memory/3636-11-0x0000000002740000-0x000000000277D000-memory.dmp upx behavioral2/memory/3636-7-0x0000000002740000-0x000000000277D000-memory.dmp upx behavioral2/memory/3636-3-0x0000000002740000-0x000000000277D000-memory.dmp upx behavioral2/memory/3636-2-0x0000000002740000-0x000000000277D000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3636 628e1d38b5427dba964dd53be24c054b_JaffaCakes118.exe 3636 628e1d38b5427dba964dd53be24c054b_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3636 628e1d38b5427dba964dd53be24c054b_JaffaCakes118.exe 3636 628e1d38b5427dba964dd53be24c054b_JaffaCakes118.exe 3636 628e1d38b5427dba964dd53be24c054b_JaffaCakes118.exe