Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 09:38
Static task
static1
Behavioral task
behavioral1
Sample
670d09cb80ff2435e3976253ef231357_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
670d09cb80ff2435e3976253ef231357_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
670d09cb80ff2435e3976253ef231357_JaffaCakes118.exe
-
Size
14.0MB
-
MD5
670d09cb80ff2435e3976253ef231357
-
SHA1
694e711650bffa261a1a39f08dd939b9fdb298c5
-
SHA256
36af732ab60477ac753e2a6f351d8ce3c890c956d59d3d67d3b67de9ef3eaab0
-
SHA512
b58dda29d0d83b59449274503e8efa02ad341a6849954db1da0865525f782fc00ae888e6b5a150f6eb3b4a572bf901521e5afcac8e3905db3f68e5af1a8eabab
-
SSDEEP
196608:oL0LNLnZLcLo1L0LNLnsLNL4LfsLN0LNLnsLNLO:q
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 884 rtqgnfu.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4416 set thread context of 884 4416 670d09cb80ff2435e3976253ef231357_JaffaCakes118.exe 85 -
Program crash 1 IoCs
pid pid_target Process procid_target 1836 884 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4416 670d09cb80ff2435e3976253ef231357_JaffaCakes118.exe 4416 670d09cb80ff2435e3976253ef231357_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4416 wrote to memory of 884 4416 670d09cb80ff2435e3976253ef231357_JaffaCakes118.exe 85 PID 4416 wrote to memory of 884 4416 670d09cb80ff2435e3976253ef231357_JaffaCakes118.exe 85 PID 4416 wrote to memory of 884 4416 670d09cb80ff2435e3976253ef231357_JaffaCakes118.exe 85 PID 4416 wrote to memory of 884 4416 670d09cb80ff2435e3976253ef231357_JaffaCakes118.exe 85 PID 4416 wrote to memory of 884 4416 670d09cb80ff2435e3976253ef231357_JaffaCakes118.exe 85 PID 4416 wrote to memory of 884 4416 670d09cb80ff2435e3976253ef231357_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\670d09cb80ff2435e3976253ef231357_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\670d09cb80ff2435e3976253ef231357_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\rtqgnfu.exeC:\Users\Admin\AppData\Local\Temp\rtqgnfu.exe2⤵
- Executes dropped EXE
PID:884 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 884 -s 243⤵
- Program crash
PID:1836
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 884 -ip 8841⤵PID:1812
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24.7MB
MD5887d18cd7b98e937718d07273a2c5563
SHA13ecacca65a266504b63fcc97a94beb57bd59fa91
SHA256b9432bbf963e913fa4dff790c3147c67c0652c4fb8af34d32430a67ffb6047f8
SHA5124aa38f4bb7af42c9de37632a2c8fc81c08590d4b96d205d793c925fdb8fa347f7535576b10cd86587028fc2c77cda4cf316a6fe90dfc67fcc0d06cea41dad925