Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 10:42
Static task
static1
Behavioral task
behavioral1
Sample
62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe
-
Size
51KB
-
MD5
62ea64dbbee072e49bfa0becfb92c18d
-
SHA1
7c061d9d546073c3937c437eff6812f1e9920ea3
-
SHA256
3656d4ff1eb0e21419d94591d24fc5e460acd2e201b30ac40495ac7180ef4c5c
-
SHA512
e0b0d728f3bcbf1b56e6e4d1190286ad35c250e8d9e9f463c41a59c8ce4ca264a0ccc98c6d63d06c487d596d73110118018cbab40c2a3c006e5039249130e044
-
SSDEEP
768:7tPFqOzt2NK4HKhq/DTXMMjxykj0o9DX8B5pW2n:7tPFNzOqk/DTMMNyhop0J
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1236 tmps.exe 3016 tmps.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows UDP Control Center = "tmps.exe" 62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 456 set thread context of 2780 456 62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe 85 PID 1236 set thread context of 3016 1236 tmps.exe 93 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\tmps.exe 62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe File opened for modification C:\Windows\tmps.exe 62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 456 62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe 1236 tmps.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 456 wrote to memory of 2780 456 62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe 85 PID 456 wrote to memory of 2780 456 62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe 85 PID 456 wrote to memory of 2780 456 62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe 85 PID 456 wrote to memory of 2780 456 62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe 85 PID 456 wrote to memory of 2780 456 62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe 85 PID 456 wrote to memory of 2780 456 62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe 85 PID 456 wrote to memory of 2780 456 62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe 85 PID 456 wrote to memory of 2780 456 62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe 85 PID 2780 wrote to memory of 1236 2780 62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe 92 PID 2780 wrote to memory of 1236 2780 62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe 92 PID 2780 wrote to memory of 1236 2780 62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe 92 PID 1236 wrote to memory of 3016 1236 tmps.exe 93 PID 1236 wrote to memory of 3016 1236 tmps.exe 93 PID 1236 wrote to memory of 3016 1236 tmps.exe 93 PID 1236 wrote to memory of 3016 1236 tmps.exe 93 PID 1236 wrote to memory of 3016 1236 tmps.exe 93 PID 1236 wrote to memory of 3016 1236 tmps.exe 93 PID 1236 wrote to memory of 3016 1236 tmps.exe 93 PID 1236 wrote to memory of 3016 1236 tmps.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\Temp\62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\62ea64dbbee072e49bfa0becfb92c18d_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\tmps.exe"C:\Windows\tmps.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\tmps.exe"C:\Windows\tmps.exe"4⤵
- Executes dropped EXE
PID:3016
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
51KB
MD562ea64dbbee072e49bfa0becfb92c18d
SHA17c061d9d546073c3937c437eff6812f1e9920ea3
SHA2563656d4ff1eb0e21419d94591d24fc5e460acd2e201b30ac40495ac7180ef4c5c
SHA512e0b0d728f3bcbf1b56e6e4d1190286ad35c250e8d9e9f463c41a59c8ce4ca264a0ccc98c6d63d06c487d596d73110118018cbab40c2a3c006e5039249130e044