Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 13:53
Behavioral task
behavioral1
Sample
67d686be4bccc2b8c85b44ab658bd7c1_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
67d686be4bccc2b8c85b44ab658bd7c1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
67d686be4bccc2b8c85b44ab658bd7c1_JaffaCakes118.exe
-
Size
662KB
-
MD5
67d686be4bccc2b8c85b44ab658bd7c1
-
SHA1
338598509cbee9eb73ccb70b0ff9671d88e365b2
-
SHA256
5b25741158811e9f414093c9748fd204681a6006e7203ea0ecbf1500ee3d03f3
-
SHA512
cd461e9b8e26ea97311e5e6b2a7151cf4487a96077d1a06d9fd9e4ea664a2c69121dc382ae863d67f3d6f7d8cce53d002fd6b5e9fda3298bcfa7974a837e845c
-
SSDEEP
12288:/IxOFf1Cc9grNSs/GQFenpEvWUuSRzZETUm8s2UDRcwbg9HnkrVUr:DJgrNSGG5npEv9uSzy8PgRcZHkrer
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3652-0-0x0000000000400000-0x00000000005AA000-memory.dmp upx behavioral2/memory/3652-113-0x0000000000400000-0x00000000005AA000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3652 67d686be4bccc2b8c85b44ab658bd7c1_JaffaCakes118.exe 3652 67d686be4bccc2b8c85b44ab658bd7c1_JaffaCakes118.exe 3652 67d686be4bccc2b8c85b44ab658bd7c1_JaffaCakes118.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a76da3ce02ce785f23575e1e074d8d01
SHA1b2c225e4dd943e9527cbbdc230a8335e22fd7596
SHA25690137377483795388c2b95d84c7a2f149a5f78af901233039a81ac8d02901934
SHA5120d6693a6e65b98c45888e73c58d2a08769102e94b5b96ca3bbed9b454d03a3c4d224361912bb3298269c08ac744d2db887e84bedf2356753d4d7c8d563bd80ec
-
Filesize
1KB
MD5a1f24a4a70bc0012da6aed2298799636
SHA197c501c101ec5dccadb1674154b88baf98de0add
SHA2568d833a409dc6b2163e3acef2fe60eb144ce9526ec1dc8a0fb18333dd572c6df0
SHA51272ca90f5e585dc48ab64ed0c9f021ccdce9c21b340633853e2a6ce558c95156d4872c8a434dfe97ff2e7f616af56688ed2b786fa21ae12e21c2442e046e33095