Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/07/2024, 10:42

General

  • Target

    62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe

  • Size

    51KB

  • MD5

    62ea64dbbee072e49bfa0becfb92c18d

  • SHA1

    7c061d9d546073c3937c437eff6812f1e9920ea3

  • SHA256

    3656d4ff1eb0e21419d94591d24fc5e460acd2e201b30ac40495ac7180ef4c5c

  • SHA512

    e0b0d728f3bcbf1b56e6e4d1190286ad35c250e8d9e9f463c41a59c8ce4ca264a0ccc98c6d63d06c487d596d73110118018cbab40c2a3c006e5039249130e044

  • SSDEEP

    768:7tPFqOzt2NK4HKhq/DTXMMjxykj0o9DX8B5pW2n:7tPFNzOqk/DTMMNyhop0J

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:456
    • C:\Users\Admin\AppData\Local\Temp\62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe"
      2⤵
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:2780
      • C:\Windows\tmps.exe
        "C:\Windows\tmps.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1236
        • C:\Windows\tmps.exe
          "C:\Windows\tmps.exe"
          4⤵
          • Executes dropped EXE
          PID:3016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\tmps.exe

    Filesize

    51KB

    MD5

    62ea64dbbee072e49bfa0becfb92c18d

    SHA1

    7c061d9d546073c3937c437eff6812f1e9920ea3

    SHA256

    3656d4ff1eb0e21419d94591d24fc5e460acd2e201b30ac40495ac7180ef4c5c

    SHA512

    e0b0d728f3bcbf1b56e6e4d1190286ad35c250e8d9e9f463c41a59c8ce4ca264a0ccc98c6d63d06c487d596d73110118018cbab40c2a3c006e5039249130e044

  • memory/2780-19-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/2780-4-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/2780-5-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/2780-2-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/3016-24-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/3016-26-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/3016-21-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/3016-22-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/3016-23-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/3016-17-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/3016-25-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/3016-18-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/3016-27-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/3016-28-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/3016-29-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/3016-30-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/3016-31-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/3016-32-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/3016-33-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB

  • memory/3016-34-0x0000000000400000-0x000000000044C000-memory.dmp

    Filesize

    304KB