Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 06:21
Behavioral task
behavioral1
Sample
a9ed576a45d31c55b89b47692818ec36_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
a9ed576a45d31c55b89b47692818ec36_JaffaCakes118.exe
-
Size
7.4MB
-
MD5
a9ed576a45d31c55b89b47692818ec36
-
SHA1
97401500d68729adf176593049668edf1ece06eb
-
SHA256
83fc075e6f10aa06973e230e0ea27f6fe59713957bc4905bc7995ff371ecc9c3
-
SHA512
956dc95ac182bafffb170a536f73a382cc2825c16c88b73021d44d8a2611e3dd2f03abfd6fd2b73b2cd96817573f910fd9e1af8927ec0fa48e4b201a8fcdb80c
-
SSDEEP
196608:tuCUGeI179onJ5hrZERTyiU8AdZYJERepWrTut7GsQqb4:fl9c5hlERLAdZYyEpWruG
Malware Config
Signatures
-
Loads dropped DLL 14 IoCs
pid Process 244 a9ed576a45d31c55b89b47692818ec36_JaffaCakes118.exe 244 a9ed576a45d31c55b89b47692818ec36_JaffaCakes118.exe 244 a9ed576a45d31c55b89b47692818ec36_JaffaCakes118.exe 244 a9ed576a45d31c55b89b47692818ec36_JaffaCakes118.exe 244 a9ed576a45d31c55b89b47692818ec36_JaffaCakes118.exe 244 a9ed576a45d31c55b89b47692818ec36_JaffaCakes118.exe 244 a9ed576a45d31c55b89b47692818ec36_JaffaCakes118.exe 244 a9ed576a45d31c55b89b47692818ec36_JaffaCakes118.exe 244 a9ed576a45d31c55b89b47692818ec36_JaffaCakes118.exe 244 a9ed576a45d31c55b89b47692818ec36_JaffaCakes118.exe 244 a9ed576a45d31c55b89b47692818ec36_JaffaCakes118.exe 244 a9ed576a45d31c55b89b47692818ec36_JaffaCakes118.exe 244 a9ed576a45d31c55b89b47692818ec36_JaffaCakes118.exe 244 a9ed576a45d31c55b89b47692818ec36_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 pastebin.com 9 pastebin.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 api.ipify.org 7 api.ipify.org -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4948 wrote to memory of 244 4948 a9ed576a45d31c55b89b47692818ec36_JaffaCakes118.exe 85 PID 4948 wrote to memory of 244 4948 a9ed576a45d31c55b89b47692818ec36_JaffaCakes118.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9ed576a45d31c55b89b47692818ec36_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a9ed576a45d31c55b89b47692818ec36_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\a9ed576a45d31c55b89b47692818ec36_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a9ed576a45d31c55b89b47692818ec36_JaffaCakes118.exe"2⤵
- Loads dropped DLL
PID:244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99KB
MD58697c106593e93c11adc34faa483c4a0
SHA1cd080c51a97aa288ce6394d6c029c06ccb783790
SHA256ff43e813785ee948a937b642b03050bb4b1c6a5e23049646b891a66f65d4c833
SHA512724bbed7ce6f7506e5d0b43399fb3861dda6457a2ad2fafe734f8921c9a4393b480cdd8a435dbdbd188b90236cb98583d5d005e24fa80b5a0622a6322e6f3987
-
Filesize
83KB
MD56c7565c1efffe44cb0616f5b34faa628
SHA188dd24807da6b6918945201c74467ca75e155b99
SHA256fe63361f6c439c6aa26fd795af3fd805ff5b60b3b14f9b8c60c50a8f3449060a
SHA512822445c52bb71c884461230bb163ec5dee0ad2c46d42d01cf012447f2c158865653f86a933b52afdf583043b3bf8ba7011cc782f14197220d0325e409aa16e22
-
Filesize
122KB
MD529da9b022c16da461392795951ce32d9
SHA10e514a8f88395b50e797d481cbbed2b4ae490c19
SHA2563b4012343ef7a266db0b077bbb239833779192840d1e2c43dfcbc48ffd4c5372
SHA5125c7d83823f1922734625cf69a481928a5c47b6a3bceb7f24c9197175665b2e06bd1cfd745c55d1c5fe1572f2d8da2a1dcc1c1f5de0903477bb927aca22ecb26a
-
Filesize
63KB
MD5f377a418addeeb02f223f45f6f168fe6
SHA15d8d42dec5d08111e020614600bbf45091c06c0b
SHA2569551431425e9680660c6baf7b67a262040fd2efceb241e4c9430560c3c1fafac
SHA5126f60bfac34ed55ff5d6ae10c6ec5511906c983e0650e5d47dac7b8a97a2e0739266cae009449cced8dff59037e2dbfc92065fbbdfde2636d13679e1629650280
-
Filesize
157KB
MD5b5355dd319fb3c122bb7bf4598ad7570
SHA1d7688576eceadc584388a179eed3155716c26ef5
SHA256b9bc7f1d8aa8498cb8b5dc75bb0dbb6e721b48953a3f295870938b27267fb5f5
SHA5120e228aa84b37b4ba587f6d498cef85aa1ffec470a5c683101a23d13955a8110e1c0c614d3e74fb0aa2a181b852bceeec0461546d0de8bcbd3c58cf9dc0fb26f5
-
Filesize
77KB
MD5f5dd9c5922a362321978c197d3713046
SHA14fbc2d3e15f8bb21ecc1bf492f451475204426cd
SHA2564494992665305fc9401ed327398ee40064fe26342fe44df11d89d2ac1cc6f626
SHA512ce818113bb87c6e38fa85156548c6f207aaab01db311a6d8c63c6d900d607d7beff73e64d717f08388ece4b88bf8b95b71911109082cf4b0c0a9b0663b9a8e99
-
Filesize
149KB
MD5ef4755195cc9b2ff134ea61acde20637
SHA1d5ba42c97488da1910cf3f83a52f7971385642c2
SHA2568a86957b3496c8b679fcf22c287006108bfe0bb0aaffea17121c761a0744b470
SHA51263ad2601fb629e74cf60d980cec292b6e8349615996651b7c7f68991cdae5f89b28c11adb77720d7dbbd7700e55fdd5330a84b4a146386cf0c0418a8d61a8a71
-
Filesize
767KB
MD55cc6038909a8bbbf6907c512588934f0
SHA14b3eb5d9574d959f494ffe2bab21b670db62b134
SHA2562cb6d443ce1910b7d5538f4d3f40c22f0c98d6739520db4a2438c949bb4ac559
SHA5121b8af7b099e41decfe3c399802a9f17aaab701d51fa6a2714801c092270a420660457d007e938d3c9988e5cc4a2a09bf558064c0088923823c6d6ae7bfb86f40
-
Filesize
3.2MB
MD5cc4cbf715966cdcad95a1e6c95592b3d
SHA1d5873fea9c084bcc753d1c93b2d0716257bea7c3
SHA256594303e2ce6a4a02439054c84592791bf4ab0b7c12e9bbdb4b040e27251521f1
SHA5123b5af9fbbc915d172648c2b0b513b5d2151f940ccf54c23148cd303e6660395f180981b148202bef76f5209acc53b8953b1cb067546f90389a6aa300c1fbe477
-
Filesize
32KB
MD5eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
Filesize
673KB
MD5bc778f33480148efa5d62b2ec85aaa7d
SHA1b1ec87cbd8bc4398c6ebb26549961c8aab53d855
SHA2569d4cf1c03629f92662fc8d7e3f1094a7fc93cb41634994464b853df8036af843
SHA51280c1dd9d0179e6cc5f33eb62d05576a350af78b5170bfdf2ecda16f1d8c3c2d0e991a5534a113361ae62079fb165fff2344efd1b43031f1a7bfda696552ee173
-
Filesize
1KB
MD5a637f2ecb1e5102b39ebca4b5371d877
SHA188543c92fbb17bce12d36c0f8f03cc21b822e84a
SHA25639d75ffa1634ad1ecdb0a4d2b28ef47ca5017b4ec6a37b5a90af2cade8ed293f
SHA512497ddd284b2077889d5f48cbe8f7c631ab6385bd602a6186db28dff6355caf02da2327ea7ffa63014795dd1c7b4605430a700e373bc27696f57ec31668e0d4aa
-
Filesize
4.3MB
MD511c051f93c922d6b6b4829772f27a5be
SHA142fbdf3403a4bc3d46d348ca37a9f835e073d440
SHA2560eabf135bb9492e561bbbc5602a933623c9e461aceaf6eb1ceced635e363cd5c
SHA5121cdec23486cffcb91098a8b2c3f1262d6703946acf52aa2fe701964fb228d1411d9b6683bd54527860e10affc0e3d3de92a6ecf2c6c8465e9c8b9a7304e2a4a6
-
Filesize
26KB
MD57a442bbcc4b7aa02c762321f39487ba9
SHA10fcb5bbdd0c3d3c5943e557cc2a5b43e20655b83
SHA2561dd7bba480e65802657c31e6d20b1346d11bca2192575b45eb9760a4feb468ad
SHA5123433c46c7603ae0a73aa9a863b2aecd810f8c0cc6c2cd96c71ef6bde64c275e0fceb4ea138e46a5c9bf72f66dcdea3e9551cf2103188a1e98a92d8140879b34c
-
Filesize
1002KB
MD5298e85be72551d0cdd9ed650587cfdc6
SHA15a82bcc324fb28a5147b4e879b937fb8a56b760c
SHA256eb89af5911a60d892a685181c397d32b72c61dc2ad77dd45b8cac0fbb7602b84
SHA5123fafea5ff0d0b4e07f6354c37b367ada4da1b607186690c732364518a93c3fd2f5004014c9c3d23dde28db87d1cb9ae1259cda68b9ba757db59a59d387ac4e02
-
Filesize
1.1MB
MD58320c54418d77eba5d4553a5d6ec27f9
SHA1e5123cf166229aebb076b469459856a56fb16d7f
SHA2567e719ba47919b668acc62008079c586133966ed8b39fec18e312a773cb89edae
SHA512b9e6cdcb37d26ff9c573381bda30fa4cf1730361025cd502b67288c55744962bdd0a99790cedd4a48feef3139e3903265ab112ec545cb1154eaa2a91201f6b34