Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 05:14
Behavioral task
behavioral1
Sample
f543a5a24bd2bc09121de19ce90a8697_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f543a5a24bd2bc09121de19ce90a8697_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f543a5a24bd2bc09121de19ce90a8697_JaffaCakes118.exe
-
Size
4.7MB
-
MD5
f543a5a24bd2bc09121de19ce90a8697
-
SHA1
1c84d481b74eb05f507dbe3abbad73d5d480991f
-
SHA256
745d89b49a8658aa910db4df7d1ecb6cabc2601750e18e9cc89f6ed7f0baf276
-
SHA512
a7817a426b3414167ab1ef22132167af9c656cdbef12c358f207d847ede9daa52ae5446924a1c2dee126d53de4a86c1737b08233e5b7d5e84c592fe3df98ee9a
-
SSDEEP
98304:c1wJ4X3IT06wWXuycm/iAofR5N1yvA1pYAWBcrKFrSJSnMsEXXnZuJK:cKKWYbycm/iAofR5vyvCYIeSfsAZuk
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 3132 f543a5a24bd2bc09121de19ce90a8697_JaffaCakes118.exe 3132 f543a5a24bd2bc09121de19ce90a8697_JaffaCakes118.exe 3132 f543a5a24bd2bc09121de19ce90a8697_JaffaCakes118.exe 3132 f543a5a24bd2bc09121de19ce90a8697_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\update = "C:\\Users\\Admin\\AppData\\Roaming\\WindowsExplorer.exe" reg.exe -
resource yara_rule behavioral2/memory/3620-0-0x00007FF70BFC0000-0x00007FF70C026000-memory.dmp upx behavioral2/memory/3620-24-0x00007FF70BFC0000-0x00007FF70C026000-memory.dmp upx behavioral2/memory/3132-26-0x00007FF70BFC0000-0x00007FF70C026000-memory.dmp upx behavioral2/memory/3132-29-0x00007FF70BFC0000-0x00007FF70C026000-memory.dmp upx behavioral2/memory/3620-38-0x00007FF70BFC0000-0x00007FF70C026000-memory.dmp upx -
Modifies registry key 1 TTPs 1 IoCs
pid Process 3928 reg.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3620 wrote to memory of 3132 3620 f543a5a24bd2bc09121de19ce90a8697_JaffaCakes118.exe 82 PID 3620 wrote to memory of 3132 3620 f543a5a24bd2bc09121de19ce90a8697_JaffaCakes118.exe 82 PID 3132 wrote to memory of 2840 3132 f543a5a24bd2bc09121de19ce90a8697_JaffaCakes118.exe 83 PID 3132 wrote to memory of 2840 3132 f543a5a24bd2bc09121de19ce90a8697_JaffaCakes118.exe 83 PID 2840 wrote to memory of 3928 2840 cmd.exe 85 PID 2840 wrote to memory of 3928 2840 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\f543a5a24bd2bc09121de19ce90a8697_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f543a5a24bd2bc09121de19ce90a8697_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\f543a5a24bd2bc09121de19ce90a8697_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f543a5a24bd2bc09121de19ce90a8697_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v update /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WindowsExplorer.exe""3⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v update /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WindowsExplorer.exe"4⤵
- Adds Run key to start application
- Modifies registry key
PID:3928
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD5f9b160a08dacc271b8b7ad1516d88330
SHA1762698430bbfe5b5d52756b969fe7a757ce07a33
SHA2567ddf74ac35a6dfa24c4f96acd058829fc934b798af910ed2a58d9b8ef8a26511
SHA5125f1666a63e1a5a9d788556899d2a1ddeb28a33c4aac9273c706c35fe7ff3feeb0138a2e75e6f9540560f8df5717a9b0e264684f27c13277db632cfccd506aa2a
-
Filesize
3.3MB
MD57d70c8d8fc3c80a0dd514a25ebcab3d7
SHA11bc65d764a012bba355d3a8f57a11e18fd3bb636
SHA2563cd15cca3e7db57da0a4808b6602261763c5e31f807083c59deaffcc0649b743
SHA5125e03aaec836bd429fe7577628161af4a18ee881338fd31f5634aec953f473ba078a888d6fa5af0d7a091048fa8516de28adf649a81f4a6b52325cb85a71ccf65
-
Filesize
1KB
MD5b81d4c45f249bcbbbcb0429143eda454
SHA1935f78d8e9c72a6ab47e8dbf791f20e6edccb685
SHA256f259b42e41d2474143e79d6e63db540bab266d7461c67d4156e63dcc8a230348
SHA5124441cd7c7c1e687513dce6912a78e43eee02e8aeeac31b27d47b1b0481475de54697a13e69ced7c85924a6b3aee3a95e8bbd11189b86267ed8efb16cbc89eefc
-
Filesize
2.0MB
MD516bbb7e72d190e6712d923dbc854a45f
SHA12913c4d3b9f0c708845252e863518d9bdaea5aac
SHA256a9d0fdc952d5bb1ba7f809a6fa7ba9418414d5a10f4a7d429f680eac22d6a322
SHA512906f16928e322addf52aad4e21265650b82853ae73e39ec60a80effd205d75bf5b4183bac1cd55f853bbcfdc84c4fb2694acff2098c32d93175aeefd3cdff5c9
-
Filesize
90KB
MD5a1950d15ae7fadd5b203639f3965f690
SHA1dd09dfee5577feca2ce25d9cc5091933ca580adb
SHA256baa75ad550784c5c5bada51cb565784a04f267fad708e6611b0cc3dc6ae0c1ed
SHA512b0ca2e27e0fa77a58c7a56d66bf01fca152cb784e11ced7e247b092864f5a81b6cde353adfe58193d660f9be7b37c8076a6ca75390d4b34228b5359a3a884c88