Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    137s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/08/2024, 00:43

General

  • Target

    bfc7c93964cf84f5023f48170763f6c4_JaffaCakes118.jar

  • Size

    495KB

  • MD5

    bfc7c93964cf84f5023f48170763f6c4

  • SHA1

    d7be38e330f1d167046264653817d85e96d7fc46

  • SHA256

    26d0da59b1be24983bf1a92c2220352f524633dc48b6be0573d7ebcc4b904f4a

  • SHA512

    e9f867eeeb6e9f3438edbb897a079b3a917028240adf01e2a1384594e1db1ae90fc0173ebb89640743361d2e5860bbfc5e3e66d301936a98c16a0ecf5c9606df

  • SSDEEP

    12288:5Bx1HuhZy+3DkOlu6V745ixEdjGGV8I0a39mknX08BUYD9pOr:n7Huny+3DLl/09GGVCW9rE8jOr

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\bfc7c93964cf84f5023f48170763f6c4_JaffaCakes118.jar
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1352

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1352-2-0x000001B368F00000-0x000001B369170000-memory.dmp

    Filesize

    2.4MB

  • memory/1352-15-0x000001B369170000-0x000001B369180000-memory.dmp

    Filesize

    64KB

  • memory/1352-17-0x000001B369180000-0x000001B369190000-memory.dmp

    Filesize

    64KB

  • memory/1352-19-0x000001B369190000-0x000001B3691A0000-memory.dmp

    Filesize

    64KB

  • memory/1352-21-0x000001B3691A0000-0x000001B3691B0000-memory.dmp

    Filesize

    64KB

  • memory/1352-23-0x000001B3691B0000-0x000001B3691C0000-memory.dmp

    Filesize

    64KB

  • memory/1352-25-0x000001B3691C0000-0x000001B3691D0000-memory.dmp

    Filesize

    64KB

  • memory/1352-27-0x000001B3691D0000-0x000001B3691E0000-memory.dmp

    Filesize

    64KB

  • memory/1352-31-0x000001B3691E0000-0x000001B3691F0000-memory.dmp

    Filesize

    64KB

  • memory/1352-32-0x000001B368EE0000-0x000001B368EE1000-memory.dmp

    Filesize

    4KB

  • memory/1352-33-0x000001B368EE0000-0x000001B368EE1000-memory.dmp

    Filesize

    4KB

  • memory/1352-34-0x000001B368F00000-0x000001B369170000-memory.dmp

    Filesize

    2.4MB

  • memory/1352-35-0x000001B369170000-0x000001B369180000-memory.dmp

    Filesize

    64KB

  • memory/1352-37-0x000001B369180000-0x000001B369190000-memory.dmp

    Filesize

    64KB

  • memory/1352-38-0x000001B369190000-0x000001B3691A0000-memory.dmp

    Filesize

    64KB

  • memory/1352-39-0x000001B3691A0000-0x000001B3691B0000-memory.dmp

    Filesize

    64KB

  • memory/1352-40-0x000001B3691B0000-0x000001B3691C0000-memory.dmp

    Filesize

    64KB

  • memory/1352-41-0x000001B3691C0000-0x000001B3691D0000-memory.dmp

    Filesize

    64KB

  • memory/1352-42-0x000001B3691D0000-0x000001B3691E0000-memory.dmp

    Filesize

    64KB

  • memory/1352-43-0x000001B3691E0000-0x000001B3691F0000-memory.dmp

    Filesize

    64KB